[go: up one dir, main page]

CN119814405A - Service access method, device, computer equipment and storage medium - Google Patents

Service access method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN119814405A
CN119814405A CN202411870957.1A CN202411870957A CN119814405A CN 119814405 A CN119814405 A CN 119814405A CN 202411870957 A CN202411870957 A CN 202411870957A CN 119814405 A CN119814405 A CN 119814405A
Authority
CN
China
Prior art keywords
target
user terminal
access
service
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411870957.1A
Other languages
Chinese (zh)
Inventor
曾涛
蒋铭
安万里
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Technology Innovation Center
China Telecom Corp Ltd
Original Assignee
China Telecom Technology Innovation Center
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Technology Innovation Center, China Telecom Corp Ltd filed Critical China Telecom Technology Innovation Center
Priority to CN202411870957.1A priority Critical patent/CN119814405A/en
Publication of CN119814405A publication Critical patent/CN119814405A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

本申请公开了一种业务访问方法、装置、计算机设备和存储介质。属于移动通信技术领域,该方法具体可以包括:响应于用户终端发起的针对目标业务的业务访问请求,获取用户终端的目标终端标识。根据目标终端标识,确定用户终端对目标业务的访问权限具备情况。在访问权限具备情况为具备访问权限的情况下,基于目标终端标识,控制用户终端访问目标业务。基于本申请不仅大幅缩短了认证链路的长度,而且无需用户输入验证码或账号等信息,便可自动对用户终端进行验证,在保证了访问安全性的同时,大幅提升了认证效率,降低了认证的复杂度,不仅提升了业务访问的流畅性,而且提升了用户体验。

The present application discloses a service access method, device, computer equipment and storage medium. It belongs to the field of mobile communication technology. The method may specifically include: in response to a service access request for a target service initiated by a user terminal, obtaining a target terminal identification of the user terminal. According to the target terminal identification, determining whether the user terminal has access rights to the target service. In the case where the access rights are sufficient, the user terminal is controlled to access the target service based on the target terminal identification. Based on the present application, not only the length of the authentication link is greatly shortened, but also the user terminal can be automatically authenticated without the user entering a verification code or account number and other information. While ensuring access security, the authentication efficiency is greatly improved, the complexity of authentication is reduced, and not only the fluency of service access is improved, but also the user experience is improved.

Description

Service access method, device, computer equipment and storage medium
Technical Field
The present application relates to the field of mobile communications technologies, and in particular, to a service access method, a service access device, a computer device, and a storage medium.
Background
In the current enterprise and industry user network application scenario, the network connection needs are increasingly complex, especially for the enterprise all-optical networking (Fiber to the Room for Business, FTTR-B) scheme of high-value users. Such users are typically large-scale and include not only basic office network systems but also a variety of business systems including office automation (Office Automation, OA) systems, resource planning systems (ENTERPRISE RESOURCE PLANNING, ERP) and the like.
Network access to these business systems requires strict authentication authorization to ensure the legitimacy of the external users within the enterprise. However, the conventional authentication schemes are mostly dependent on the mode of verification codes or account numbers (combination of user names and passwords), and can realize basic authentication functions, but for users in enterprises, frequent multiple authentication and frequent login and logout operations seriously affect the smoothness and efficiency of offices.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a service access method, apparatus, computer device, and storage medium that can improve service access efficiency.
In a first aspect, the present application provides a service access method, applied to FTTR devices, where the method includes:
Responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identifier of the user terminal;
determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
In one embodiment, determining, according to the target terminal identifier, that the access right of the user terminal to the target service has the condition includes:
and determining that the access authority of the user terminal to the target service has the condition according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list.
In one embodiment, the method further comprises:
And receiving the candidate terminal identification sent by the authentication server through the middleware, and adding the candidate terminal identification to the target white list, wherein the middleware is configured in FTTR equipment.
In one embodiment, controlling the user terminal to access the target service based on the target terminal identification includes:
determining the service function authority of the user terminal to the target service according to the target terminal identification;
Determining a service access port based on the service function authority;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the method further comprises:
feeding back a permission authentication request to the user terminal when the access permission is not provided, wherein the permission authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal;
and receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
In one embodiment, the authentication response message further includes a service function authority of the user terminal;
correspondingly, in the case that the authentication response message includes an authentication passing result, controlling the user terminal to access the target service includes:
determining a service access port based on the service function authority under the condition that the authentication response message comprises an authentication passing result;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the method further comprises:
receiving a target terminal identification of a user terminal sent by an authentication server;
and adding the target terminal identification into the target white list, and configuring the storage time length of the target terminal identification in the target white list.
In one embodiment, the target terminal identification is at least one of a device media access control MAC address, a user identification card number, and a network identification.
In one embodiment, the authentication information includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number.
In a second aspect, the present application provides a service access apparatus, configured in FTTR devices, where the method includes:
the acquisition module is used for responding to a service access request for a target service initiated by the user terminal and acquiring a target terminal identifier of the user terminal;
The determining module is used for determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
and the control module is used for controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
In a third aspect, the present application also provides a computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
Responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identifier of the user terminal;
determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
In a fourth aspect, the present application also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
Responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identifier of the user terminal;
determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
In a fifth aspect, the application also provides a computer program product comprising a computer program which, when executed by a processor, performs the steps of:
Responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identifier of the user terminal;
determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
The service access method, the device, the computer equipment and the storage medium are used for responding to the service access request for the target service initiated by the user terminal to acquire the target terminal identification of the user terminal. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided. Compared with the prior art that when a user initiates a service access request for a target service, an authentication server needs to initiate authentication for the user, and authenticates a user terminal according to information such as a user input verification code or an account number, so that the smoothness of service access is seriously affected. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. Under the condition that the access permission is provided with the access permission, the user terminal is controlled to access the target service based on the target terminal identification, so that the length of an authentication link is greatly shortened, the user is not required to input information such as a verification code or an account number, and the user terminal can be automatically verified, the authentication efficiency is greatly improved while the access security is ensured, the authentication complexity is reduced, the service access smoothness is improved, and the user experience is improved.
Drawings
Fig. 1 is an application environment diagram of a service access method provided in this embodiment;
fig. 2 is a flow chart of a first service access method provided in this embodiment;
fig. 3 is a schematic flow chart of a first access target service provided in this embodiment;
fig. 4 is a schematic flow chart of a second access target service provided in this embodiment;
Fig. 5 is a flow chart of a second service access method provided in this embodiment;
fig. 6 is a block diagram of a service access device according to the present embodiment;
fig. 7 is an internal structural diagram of the computer device provided in the present embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The service access method provided by the embodiment of the application can be applied to the application environment shown in figure 1. The FTTR device 104 obtains the target terminal identifier of the user terminal 102 in response to a service access request for the target service initiated by the user terminal 102. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. If the access right is provided, FTTR device 104 controls user terminal 102 to access the target service based on the target terminal identifier.
Of these, FTTR (Fiber to the Room, fiber-to-room) devices are core devices in a network deployment technology that aims to extend a fiber network directly to individual rooms of a residential or commercial building, providing high-speed, high-bandwidth network connections for each room. The FTTR technology, which is connected to each room by an optical fiber, ensures stability and high-speed transmission of the network, enabling users to enjoy consistent high-quality network services throughout the building. The FTTR device of the present application, which is mainly referred to as FTTR master device also called FTTR-B master device, is the core of FTTR network, and is responsible for converting the optical fiber network signals into signals that can be used by the user device, and distributing the signals to various rooms or working areas in the room.
The user terminal refers to terminal equipment at the user side, and can be intelligent terminals such as mobile phones and computers, and intelligent wearable equipment such as intelligent bracelets and intelligent watches.
In one embodiment, fig. 2 is a flow chart of a service access method according to an embodiment of the present application, and the method is applied to FTTR devices in fig. 1 for illustration, where the method includes the following steps:
s201, responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identification of the user terminal.
The user terminal refers to the terminal equipment which is connected with FTTR equipment and has service access requirements, and the user terminal refers to the terminal equipment at the user side, can be intelligent terminals such as mobile phones and computers, and can also be intelligent wearable equipment such as intelligent bracelets and intelligent watches. The target service refers to a service that needs to be accessed, for example, some external website, an internal office system, and the like. The service access request refers to a request message transmitted when requesting access to a target service. The target terminal identifier refers to a terminal identifier of the user terminal.
Optionally, the target terminal identifier in this embodiment is at least one of a device MAC address, a subscriber identity card (SIM (Subscriber Identity Module, subscriber identity card) card number), and a network identifier (e.g., SSID (SERVICE SET IDENTIFIER, service set identifier)). Preferably, the destination terminal identification uses a device MAC address.
Optionally, in this embodiment, in response to a service access request for a target service initiated by a user terminal, the FTTR device may automatically obtain, through a listening port (e.g., 80 ports), a target terminal identifier of the user terminal. For example, in response to a WEB access request for a WEB page initiated by a user terminal, the FTT device may obtain, through a listening port, an access request of the user terminal and a target terminal identifier of the user terminal.
S202, determining the condition of the access authority of the user terminal to the target service according to the target terminal identification.
The access right possessing request refers to whether the user terminal has the right to access the target service.
An optional implementation manner of the embodiment of the application is that an authentication request is initiated to an authentication server according to a target terminal identifier, so that the authentication server determines that the access authority of the user terminal to the target service is provided based on the target terminal identifier.
As another optional implementation manner of the embodiment of the application, according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list, the condition that the access authority of the user terminal to the target service is provided is determined. Specifically, FTTR equipment monitors a service access request initiated by a user terminal based on a first monitoring port (for example, 80 ports), acquires a target terminal identifier of the user terminal, forwards the service access request and the target terminal identifier to a second monitoring port (for example, 443 ports), the second monitoring port sends the service access request and the target terminal identifier to an authentication plug-in unit configured in FTTR equipment, and the authentication plug-in unit determines that the access authority of the user terminal to the target service has according to a matching result of the target terminal identifier and the candidate terminal identifier in a target white list. It should be noted that, in this embodiment, FTTR devices may also receive the candidate terminal identifier sent by the authentication server through the middleware and add the candidate terminal identifier to the target white list, where the middleware is configured in FTTR devices, and the middleware may be an MBUS (Meter-Bus) middleware. That is, the FTTR device of the present application may communicate with the authentication server through the middleware to receive the candidate terminal identifier sent by the authentication server, and store the candidate terminal identifier in a target whitelist, where the target whitelist may be called by the authentication plug-in.
And S203, controlling the user terminal to access the target service based on the target terminal identification when the access right is provided.
Optionally, in this embodiment, based on the target terminal identifier, the service function authority corresponding to the user terminal is determined, and based on the service function authority, the user terminal is controlled to access the target service. For example, the target service that the user terminal requests to access is an enterprise intranet (such as a comprehensive office system), and the service function authority of the user is a target function module that can only access the target service (such as a sales operation module), and then the user terminal is controlled to only access the target function module of the target service.
According to the service access method, the target terminal identification of the user terminal is obtained in response to the service access request for the target service initiated by the user terminal. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided. Compared with the prior art that when a user initiates a service access request for a target service, an authentication server needs to initiate authentication for the user, and authenticates a user terminal according to information such as a user input verification code or an account number, so that the smoothness of service access is seriously affected. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. Under the condition that the access permission is provided with the access permission, the user terminal is controlled to access the target service based on the target terminal identification, so that the length of an authentication link is greatly shortened, the user is not required to input information such as a verification code or an account number, and the user terminal can be automatically verified, the authentication efficiency is greatly improved while the access security is ensured, the authentication complexity is reduced, the service access smoothness is improved, and the user experience is improved.
In one embodiment, in order to more flexibly control the user terminal to access the target service, as shown in fig. 3, an optional implementation manner in S203 includes:
s301, determining the service function authority of the user terminal to the target service according to the target terminal identification.
The service function authority refers to the function authority of the user terminal in the target service.
An optional implementation manner of the embodiment of the application is that according to the target terminal identification, the identity information of the user corresponding to the target terminal identification is determined, according to the identity information of the user, the authority level of the user is determined, and according to the authority level, the service function authority of the user terminal to the target service is determined. It should be noted that the process may be performed by the FTTR device or may be performed by the FTTR device interacting with the authentication server.
As another alternative implementation manner of the embodiment of the application, the service function authority of the user terminal to the target service is determined according to the target terminal identifier and the authority list. Wherein, each terminal identification and the corresponding business function authority of each terminal identification are recorded in the authority list. It should be noted that this process may be performed by the FTTR device (specifically, may be performed by the authentication plug-in the FTTR device), or may be performed by the FTTR device interacting with the authentication server.
S302, determining a service access port based on the service function authority.
The service access port refers to a port of a service IP address corresponding to the target service, different functions in the target service can be accessed through different service access ports, the target service is assumed to be an internal office system, and different service functions of the internal office system can be accessed through different access ports.
Optionally, in this embodiment, the service access port may be determined according to the service function authority and the port list. Different candidate access ports and service functions corresponding to each candidate access port are recorded in the port list. And determining available service functions according to the service function authority, and taking candidate access ports corresponding to the available service functions as service access ports.
It should be noted that, the configuration of the service access port can be flexibly configured according to the requirement of the user, and the service access port is uploaded to the authentication server, and can be synchronized into the authentication plug-in by the authentication server through the middleware.
S303, controlling the user terminal to access the target service based on the service access port.
An optional implementation manner of the embodiment of the present application is to control the user terminal to access the target service through the service access port. In this case, the user terminal can only access the target function module in the target service corresponding to the own service function authority.
As another optional implementation manner of the embodiment of the present application, a service IP address corresponding to a target service and a service access port are fed back to a user terminal, so that the user terminal accesses the target service based on the service IP address and the service access port.
In this embodiment, the service function authority of the user terminal to the target service is determined according to the target terminal identifier. Based on the service function rights, a service access port is determined. And controlling the user terminal to access the target service based on the service access port. Based on the embodiment, the association binding of the target terminal identification and the service function authority is realized, the split-weight and split-domain management of the service access authorities of different users under different service scenes is realized, the risks of data leakage, malicious damage and the like caused by the same service authority are effectively avoided, the fine management of the user access authorities is realized for enterprise users, different service access authorities can be configured for different users, the human intervention and operation are avoided, and the safety of user access is improved.
In one embodiment, in the case that the access right is not provided, as shown in fig. 4, an alternative implementation of the service access method includes:
s401, when the access right is not provided, feeding back a right authentication request to the user terminal.
The authority authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal. The rights authentication request refers to a request message requiring further authentication of the user terminal.
An optional implementation manner of the embodiment of the present application is that, in a case that the access right is not provided, a right authentication request is fed back to the user terminal. The authority authentication request carries an authentication URL address of the authentication server. The user terminal requests the authentication server to feed back an authentication page to the user terminal based on the authentication URL address, fills in authentication information based on the authentication page, and sends the authentication information to the authentication server after triggering the submitting operation.
As another optional implementation manner of the embodiment of the present application, in a case where the access right is not provided, the first authentication request is sent to the authentication server, so that the authentication server feeds back the right authentication request to the user terminal based on the first authentication request. The authority authentication request comprises an authentication page, the user terminal fills in authentication information based on the authentication page, and sends the authentication information to the authentication server after triggering the submitting operation.
Optionally, the authentication message includes, but is not limited to, a user identification card number, an authentication code, a device MAC address, etc. The authentication server is facilitated to further authenticate the user terminal based on the authentication message. It should be noted that, in this embodiment, the target terminal identifier may be a device MAC address. The authentication information includes at least a user identification card number. The purpose is to further authenticate the user terminal based on authentication information, and increase the security of access.
Optionally, in this embodiment, the authentication information is used for the authentication server to authenticate the user terminal in combination with second authentication information, where the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number. For example, if the target terminal is identified as the device MAC address, after the enterprise user updates the new mobile phone, when the enterprise user requests access to the target service for the first time, the target whitelist of the FTTP device does not have the device MAC address of the new mobile phone, so that the access right is not provided, in this case, the user terminal needs to send a right authentication request to the user terminal, the user terminal sends authentication information to the authentication server, the authentication server sends first authentication information (for example, an authentication code) to the user terminal based on the user identification card number in the authentication information, the user terminal feeds back corresponding second authentication information to the authentication server, and the authentication server further authenticates the user terminal based on the second authentication information and the authentication information. Specifically, whether the first authentication information is identical to the second authentication information, whether the authentication information matches the information stored in advance, and the like.
Optionally, in this embodiment, when the authentication server authenticates the user terminal, the target terminal identifier of the user terminal is sent to FTTR equipment through the middleware. The user terminal receives the target terminal identification of the user terminal sent by the authentication server. And adding the target terminal identification into the target white list, and configuring the storage time length (also referred to as aging time length) of the target terminal identification in the target white list. The purpose of this embodiment is to dynamically update the target white list, when the user terminal accesses the target service again next time, the FTTR device can be directly authorized under the condition that the storage duration is valid, and further authentication needs to be performed through the authentication server, so that the access efficiency of the subsequent service access is improved.
S402, receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
Wherein the authentication response message is sent out after the authentication server further authenticates the user terminal based on the authentication information. The authentication response message includes an authentication result, such as an authentication pass result, an authentication fail result, and the like.
Optionally, in this embodiment, the authentication response message further includes a service function authority of the user terminal, and the service access port is determined based on the service function authority when the authentication response message includes an authentication passing result. And controlling the user terminal to access the target service based on the service access port. The specific implementation manner of this embodiment is described in detail in the foregoing embodiments, and will not be described herein.
Optionally, in this embodiment, when the authentication response message includes an authentication failure result, the permission authentication request is fed back to the user terminal again.
In the embodiment, when the access right is not provided, a right authentication request is fed back to the user terminal, wherein the right authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal. And receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result. In addition, the authentication information in this embodiment includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number. In the embodiment, when the access right is not provided, that is, when the primary authentication fails, authentication is performed again based on the authentication server, and the security of service access is effectively improved based on various authentication strategies.
In one embodiment, as shown in fig. 5, another alternative implementation manner of a service access method includes:
S501, receiving the candidate terminal identification sent by the authentication server through the middleware, and adding the candidate terminal identification to the target white list. Wherein, the middleware is configured in FTTR equipment.
S502, responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identification of the user terminal. The target terminal identifier is at least one of a device Media Access Control (MAC) address, a user identification card number and a network identifier.
S503, according to the matching result of the target terminal identification and the candidate terminal identification in the target white list, determining that the access authority of the user terminal to the target service has the condition.
S504, when the access authority is provided, determining the service function authority of the user terminal to the target service according to the target terminal identification.
S505, based on the service function authority, determining a service access port.
S506, when the access right is not provided, feeding back a right authentication request to the user terminal. The authority authentication request is used for indicating the user terminal to send authentication information to the authentication server, the authentication information at least comprises a user identification card number, the authentication information is used for enabling the authentication server to combine with second authentication information to authenticate the user terminal, and the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends first authentication information to the user terminal based on the user identification card number.
S507, receiving an authentication response message sent by the authentication server based on the authentication information, and determining a service access port based on the service function authority carried in the authentication response message under the condition that the authentication response message comprises an authentication passing result.
S508, the user terminal is controlled to access the target service based on the service access port.
It should be noted that, in this embodiment, the process of updating the target white list by FTTR devices is further included, which is specifically as follows:
In the case that the authentication server authenticates the user terminal, the authentication server transmits the target terminal identification of the user terminal to FTTR equipment, and FTTR equipment receives the target terminal identification of the user terminal transmitted by the authentication server.
And adding the target terminal identification into the target white list, and configuring the storage time length of the target terminal identification in the target white list.
In this embodiment, a target terminal identifier of a user terminal is obtained in response to a service access request for a target service initiated by the user terminal. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided. Compared with the prior art that when a user initiates a service access request for a target service, an authentication server needs to initiate authentication for the user, and authenticates a user terminal according to information such as a user input verification code or an account number, so that the smoothness of service access is seriously affected. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. Under the condition that the access permission is provided with the access permission, the user terminal is controlled to access the target service based on the target terminal identification, so that the length of an authentication link is greatly shortened, the user is not required to input information such as a verification code or an account number, and the user terminal can be automatically verified, the authentication efficiency is greatly improved while the access security is ensured, the authentication complexity is reduced, the service access smoothness is improved, and the user experience is improved.
It should be understood that, although the steps in the flowcharts related to the above embodiments are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a service access device for realizing the service access method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of one or more service access devices provided below may refer to the limitation of the service access method hereinabove, and will not be repeated herein.
In one embodiment, a block diagram of the service access apparatus in one embodiment is shown by fig. 6. As shown in fig. 6, there is provided a service access apparatus 1, which includes an acquisition module 10, a determination module 20, and a control module 30, wherein:
An obtaining module 10, configured to obtain a target terminal identifier of a user terminal in response to a service access request for a target service initiated by the user terminal;
the determining module 20 is configured to determine, according to the target terminal identifier, that the access right of the user terminal to the target service has a condition;
And the control module 30 is used for controlling the user terminal to access the target service based on the target terminal identifier when the access right is provided.
The service access device responds to a service access request for a target service initiated by the user terminal, and acquires a target terminal identifier of the user terminal. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided. Compared with the prior art that when a user initiates a service access request for a target service, an authentication server needs to initiate authentication for the user, and authenticates a user terminal according to information such as a user input verification code or an account number, so that the smoothness of service access is seriously affected. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. Under the condition that the access permission is provided with the access permission, the user terminal is controlled to access the target service based on the target terminal identification, so that the length of an authentication link is greatly shortened, the user is not required to input information such as a verification code or an account number, and the user terminal can be automatically verified, the authentication efficiency is greatly improved while the access security is ensured, the authentication complexity is reduced, the service access smoothness is improved, and the user experience is improved.
In one embodiment, the determining module 20 of fig. 6 above is also specifically configured to:
and determining that the access authority of the user terminal to the target service has the condition according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list.
In one embodiment, the service access apparatus 1 in fig. 6 above further includes:
the first receiving module is used for receiving the candidate terminal identification sent by the authentication server through the middleware and adding the candidate terminal identification to the target white list, wherein the middleware is configured in FTTR equipment.
In one embodiment, the control module 30 of fig. 6 above is further specifically configured to:
determining the service function authority of the user terminal to the target service according to the target terminal identification;
Determining a service access port based on the service function authority;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the service access apparatus 1 in fig. 6 above further includes:
The system comprises a feedback module, a user terminal, an authentication server and a user terminal, wherein the feedback module is used for feeding back an authority authentication request to the user terminal when the access authority is not provided with the access authority, the authority authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal;
and the second receiving module is used for receiving an authentication response message sent by the authentication server based on the authentication information and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
In one embodiment, the authentication response message further includes a service function authority of the user terminal;
correspondingly, the second receiving module is further specifically configured to:
determining a service access port based on the service function authority under the condition that the authentication response message comprises an authentication passing result;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the service access apparatus 1 in fig. 6 above further includes:
the third receiving module is used for receiving the target terminal identification of the user terminal sent by the authentication server;
and the configuration module is used for adding the target terminal identification into the target white list and configuring the storage duration of the target terminal identification in the target white list.
In one embodiment, the target terminal identification is at least one of a device media access control MAC address, a user identification card number, and a network identification.
In one embodiment, the authentication information includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number.
The various modules in the service access apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a platform side, and the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing information related to the service access method. The network interface of the computer device is used for communicating with an external user side through a network connection. The computer program is executed by a processor to implement a service access method.
It will be appreciated by persons skilled in the art that the architecture shown in fig. 7 is merely a block diagram of some of the architecture relevant to the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements are applicable, and in particular, the computer device may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
Responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identifier of the user terminal;
determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
In one embodiment, the processor when executing the computer program further performs the steps of determining, according to the target terminal identifier, that the access right of the user terminal to the target service has the condition, including:
and determining that the access authority of the user terminal to the target service has the condition according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list.
In one embodiment, the processor when executing the computer program further performs the steps of:
And receiving the candidate terminal identification sent by the authentication server through the middleware, and adding the candidate terminal identification to the target white list, wherein the middleware is configured in FTTR equipment.
In one embodiment, the processor when executing the computer program further performs the step of controlling the user terminal to access the target service based on the target terminal identification, comprising:
determining the service function authority of the user terminal to the target service according to the target terminal identification;
Determining a service access port based on the service function authority;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the processor when executing the computer program further performs the steps of:
feeding back a permission authentication request to the user terminal when the access permission is not provided, wherein the permission authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal;
and receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
In one embodiment, the processor when executing the computer program further performs the step of the authentication response message further comprising the service function rights of the user terminal;
correspondingly, in the case that the authentication response message includes an authentication passing result, controlling the user terminal to access the target service includes:
determining a service access port based on the service function authority under the condition that the authentication response message comprises an authentication passing result;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the processor when executing the computer program further performs the steps of:
receiving a target terminal identification of a user terminal sent by an authentication server;
and adding the target terminal identification into the target white list, and configuring the storage time length of the target terminal identification in the target white list.
In one embodiment, the processor when executing the computer program further performs the step of identifying the target terminal as at least one of a device media access control, MAC, address, user identification card number, and network identification.
In one embodiment, the processor when executing the computer program further performs the steps of authenticating that the information includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
Responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identifier of the user terminal;
determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
In one embodiment, the computer program when executed by the processor further performs the steps of determining, based on the target terminal identifier, that the user terminal has access rights to the target service, including:
and determining that the access authority of the user terminal to the target service has the condition according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list.
In one embodiment, the computer program when executed by the processor further performs the steps of:
And receiving the candidate terminal identification sent by the authentication server through the middleware, and adding the candidate terminal identification to the target white list, wherein the middleware is configured in FTTR equipment.
In one embodiment, the computer program when executed by the processor further performs the step of controlling access to the target service by the user terminal based on the target terminal identification, comprising:
determining the service function authority of the user terminal to the target service according to the target terminal identification;
Determining a service access port based on the service function authority;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the computer program when executed by the processor further performs the steps of:
feeding back a permission authentication request to the user terminal when the access permission is not provided, wherein the permission authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal;
and receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
In one embodiment, the computer program when executed by the processor further performs the steps of the authentication response message further comprising a service function right of the user terminal;
correspondingly, in the case that the authentication response message includes an authentication passing result, controlling the user terminal to access the target service includes:
determining a service access port based on the service function authority under the condition that the authentication response message comprises an authentication passing result;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a target terminal identification of a user terminal sent by an authentication server;
and adding the target terminal identification into the target white list, and configuring the storage time length of the target terminal identification in the target white list.
In one embodiment, the computer program when executed by the processor further performs the step of the target terminal identification being at least one of a device media access control, MAC, address, user identification card number, and network identification.
In one embodiment, the computer program when executed by the processor further performs the steps of authenticating that the information includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of:
Responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identifier of the user terminal;
determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
In one embodiment, the computer program when executed by the processor further performs the steps of determining, based on the target terminal identifier, that the user terminal has access rights to the target service, including:
and determining that the access authority of the user terminal to the target service has the condition according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list.
In one embodiment, the computer program when executed by the processor further performs the steps of:
And receiving the candidate terminal identification sent by the authentication server through the middleware, and adding the candidate terminal identification to the target white list, wherein the middleware is configured in FTTR equipment.
In one embodiment, the computer program when executed by the processor further performs the step of controlling access to the target service by the user terminal based on the target terminal identification, comprising:
determining the service function authority of the user terminal to the target service according to the target terminal identification;
Determining a service access port based on the service function authority;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the computer program when executed by the processor further performs the steps of:
feeding back a permission authentication request to the user terminal when the access permission is not provided, wherein the permission authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal;
and receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
In one embodiment, the computer program when executed by the processor further performs the steps of the authentication response message further comprising a service function right of the user terminal;
correspondingly, in the case that the authentication response message includes an authentication passing result, controlling the user terminal to access the target service includes:
determining a service access port based on the service function authority under the condition that the authentication response message comprises an authentication passing result;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a target terminal identification of a user terminal sent by an authentication server;
and adding the target terminal identification into the target white list, and configuring the storage time length of the target terminal identification in the target white list.
In one embodiment, the computer program when executed by the processor further performs the step of the target terminal identification being at least one of a device media access control, MAC, address, user identification card number, and network identification.
In one embodiment, the computer program when executed by the processor further performs the steps of authenticating that the information includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magneto-resistive random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (PHASE CHANGE Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in various forms such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), etc. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and for brevity, all of the possible combinations of the technical features of the above embodiments are not described, however, only the combinations of the technical features are not contradictory, and should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (13)

1.一种业务访问方法,其特征在于,应用于光纤到房间FTTR设备,所述方法包括:1. A service access method, characterized in that it is applied to a fiber-to-the-room FTTR device, the method comprising: 响应于用户终端发起的针对目标业务的业务访问请求,获取所述用户终端的目标终端标识;In response to a service access request for a target service initiated by a user terminal, obtaining a target terminal identifier of the user terminal; 根据所述目标终端标识,确定所述用户终端对所述目标业务的访问权限具备情况;Determining, according to the target terminal identifier, whether the user terminal has access rights to the target service; 在所述访问权限具备情况为具备访问权限的情况下,基于所述目标终端标识,控制所述用户终端访问所述目标业务。When the access permission status is that the access permission is available, the user terminal is controlled to access the target service based on the target terminal identifier. 2.根据权利要求1所述的方法,其特征在于,所述根据所述目标终端标识,确定所述用户终端对所述目标业务的访问权限具备情况,包括:2. The method according to claim 1, wherein determining, based on the target terminal identifier, whether the user terminal has access rights to the target service comprises: 根据所述目标终端标识与目标白名单中的候选终端标识的匹配结果,确定所述用户终端对所述目标业务的访问权限具备情况。According to the matching result between the target terminal identifier and the candidate terminal identifiers in the target whitelist, it is determined whether the user terminal has access rights to the target service. 3.根据权利要求2所述的方法,其特征在于,所述方法还包括:3. The method according to claim 2, characterized in that the method further comprises: 接收认证服务器通过中间件发送的候选终端标识,并将所述候选终端标识添加至所述目标白名单;其中,所述中间件配置于FTTR设备中。Receive the candidate terminal identifier sent by the authentication server through the middleware, and add the candidate terminal identifier to the target whitelist; wherein the middleware is configured in the FTTR device. 4.根据权利要求1所述的方法,其特征在于,所述基于所述目标终端标识,控制所述用户终端访问所述目标业务,包括:4. The method according to claim 1, wherein controlling the user terminal to access the target service based on the target terminal identifier comprises: 根据所述目标终端标识,确定所述用户终端对所述目标业务的业务功能权限;Determining, according to the target terminal identifier, the service function authority of the user terminal for the target service; 基于所述业务功能权限,确定所述业务访问端口;Based on the business function authority, determining the business access port; 控制所述用户终端,基于所述业务访问端口访问所述目标业务。The user terminal is controlled to access the target service based on the service access port. 5.根据权利要求2所述的方法,其特征在于,所述方法还包括:5. The method according to claim 2, characterized in that the method further comprises: 在所述访问权限具备情况为不具备访问权限的情况下,向所述用户终端反馈权限认证请求;其中,所述权限认证请求用于指示所述用户终端向认证服务器发送认证信息,所述认证信息用于供所述认证服务器对所述用户终端进行认证;If the access right status is that the access right is not possessed, feeding back an access right authentication request to the user terminal; wherein the access right authentication request is used to instruct the user terminal to send authentication information to an authentication server, and the authentication information is used for the authentication server to authenticate the user terminal; 接收所述认证服务器基于所述认证信息发送的认证响应消息,并在所述认证响应消息包括认证通过结果的情况下,控制所述用户终端访问所述目标业务。An authentication response message sent by the authentication server based on the authentication information is received, and when the authentication response message includes an authentication success result, the user terminal is controlled to access the target service. 6.根据权利要求5所述的方法,其特征在于,所述认证响应消息还包括所述用户终端的业务功能权限;6. The method according to claim 5, characterized in that the authentication response message also includes the service function authority of the user terminal; 相应的,所述在所述认证响应消息包括认证通过结果的情况下,控制所述用户终端访问所述目标业务,包括:Correspondingly, when the authentication response message includes an authentication success result, controlling the user terminal to access the target service includes: 在所述认证响应消息包括认证通过结果的情况下,基于所述业务功能权限,确定所述业务访问端口;In a case where the authentication response message includes an authentication pass result, determining the service access port based on the service function authority; 控制所述用户终端,基于所述业务访问端口访问所述目标业务。The user terminal is controlled to access the target service based on the service access port. 7.根据权利要求5所述的方法,其特征在于,所述方法还包括:7. The method according to claim 5, characterized in that the method further comprises: 接收所述认证服务器发送的用户终端的目标终端标识;Receiving a target terminal identifier of a user terminal sent by the authentication server; 将所述目标终端标识添加至所述目标白名单中,并配置所述目标终端标识在所述目标白名单中的存储时长。The target terminal identifier is added to the target whitelist, and the storage duration of the target terminal identifier in the target whitelist is configured. 8.根据权利要求1-7中任一项所述的方法,其特征在于,所述目标终端标识为设备媒体接入控制MAC地址、用户识别卡号和网络标识中的至少一种。8. The method according to any one of claims 1 to 7, characterized in that the target terminal identifier is at least one of a device media access control MAC address, a user identification card number, and a network identifier. 9.根据权利要求5所述的方法,其特征在于,所述认证信息至少包括用户识别卡号;9. The method according to claim 5, characterized in that the authentication information at least includes a user identification card number; 所述认证信息用于供所述认证服务器结合第二验证信息,对所述用户终端进行认证;其中,所述第二验证信息是所述认证服务器基于所述用户识别卡号向所述用户终端发送第一验证信息后,由所述用户终端基于所述第一验证信息反馈的。The authentication information is used by the authentication server to authenticate the user terminal in combination with second authentication information; wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number. 10.一种业务访问装置,其特征在于,配置于FTTR设备,所述方法包括:10. A service access device, characterized in that it is configured in FTTR equipment, and the method comprises: 获取模块,用于响应于用户终端发起的针对目标业务的业务访问请求,获取所述用户终端的目标终端标识;An acquisition module, configured to acquire a target terminal identifier of a user terminal in response to a service access request for a target service initiated by the user terminal; 确定模块,用于根据所述目标终端标识,确定所述用户终端对所述目标业务的访问权限具备情况;A determination module, configured to determine, based on the target terminal identifier, whether the user terminal has access rights to the target service; 控制模块,用于在所述访问权限具备情况为具备访问权限的情况下,基于所述目标终端标识,控制所述用户终端访问所述目标业务。The control module is used to control the user terminal to access the target service based on the target terminal identifier when the access permission status is that the access permission is available. 11.一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,其特征在于,所述处理器执行所述计算机程序时实现权利要求1至9中任一项所述的方法的步骤。11. A computer device, comprising a memory and a processor, wherein the memory stores a computer program, wherein the processor implements the steps of the method according to any one of claims 1 to 9 when executing the computer program. 12.一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1至9中任一项所述的方法的步骤。12. A computer-readable storage medium having a computer program stored thereon, wherein when the computer program is executed by a processor, the steps of the method according to any one of claims 1 to 9 are implemented. 13.一种计算机程序产品,包括计算机程序,其特征在于,该计算机程序被处理器执行时实现权利要求1至9中任一项所述的方法的步骤。13. A computer program product, comprising a computer program, characterized in that when the computer program is executed by a processor, the steps of the method according to any one of claims 1 to 9 are implemented.
CN202411870957.1A 2024-12-18 2024-12-18 Service access method, device, computer equipment and storage medium Pending CN119814405A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411870957.1A CN119814405A (en) 2024-12-18 2024-12-18 Service access method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411870957.1A CN119814405A (en) 2024-12-18 2024-12-18 Service access method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN119814405A true CN119814405A (en) 2025-04-11

Family

ID=95255392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411870957.1A Pending CN119814405A (en) 2024-12-18 2024-12-18 Service access method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN119814405A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200388094A1 (en) * 2019-06-05 2020-12-10 Moca System Inc. Access control device, access control system and access control method using the same
CN113079134A (en) * 2021-03-19 2021-07-06 南方电网数字电网研究院有限公司 Mobile terminal access method, mobile terminal access device, computer equipment and medium
CN117857223A (en) * 2024-03-07 2024-04-09 四川天邑康和通信股份有限公司 Black-white list realization method, device, equipment and medium based on FTTR master-slave management
CN118694608A (en) * 2024-08-23 2024-09-24 四川天邑康和通信股份有限公司 PORTAL authentication method, device and storage medium applied to FTTR gateway

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200388094A1 (en) * 2019-06-05 2020-12-10 Moca System Inc. Access control device, access control system and access control method using the same
CN113079134A (en) * 2021-03-19 2021-07-06 南方电网数字电网研究院有限公司 Mobile terminal access method, mobile terminal access device, computer equipment and medium
CN117857223A (en) * 2024-03-07 2024-04-09 四川天邑康和通信股份有限公司 Black-white list realization method, device, equipment and medium based on FTTR master-slave management
CN118694608A (en) * 2024-08-23 2024-09-24 四川天邑康和通信股份有限公司 PORTAL authentication method, device and storage medium applied to FTTR gateway

Similar Documents

Publication Publication Date Title
CN105827691B (en) Internet of things equipment control method and device
CN111935110B (en) Method and device for controlling permission of tenant to access container instance
EP2658207B1 (en) Authorization method and terminal device
JP3415456B2 (en) Network system, command use authority control method, and storage medium storing control program
EP2408140B1 (en) Method, control point, apparatus and communication system for configuring access right
JP2010531516A (en) Device provisioning and domain join emulation over insecure networks
CN114692195B (en) Document processing method, device, equipment and storage medium
CN105072135A (en) A cloud file sharing authorization and authentication method and system
CN102713926A (en) Classified information leakage prevention system, classified information leakage prevention method and classified information leakage prevention programme
JP4722641B2 (en) Connection management system, connection management program, and connection management method
CN104836814A (en) Cloud-end access control method of intelligent hardware and corresponding device
US12395396B2 (en) Techniques for accessing logical networks via a virtualized gateway
WO2022193494A1 (en) Permission control method, server, terminal, storage medium, and computer program
CN109495431B (en) Access control method, device and system, and switch
CN108769186A (en) service authority control method and device
CN103812900A (en) Data synchronization method, device and system
CN108053088A (en) A kind of Subscriber Management System, method and apparatus
CN108289074B (en) User account login method and device
JP2009245268A (en) Business management system
US20160099928A1 (en) Systems and methods for managing connections for universal plug-and-play devices
CN105743922A (en) Method, device and system for inter-domain communication
CN103489023A (en) Barcode-based data exchange method
CN114070616A (en) Distributed session sharing method and system based on redis cache
CN110310118B (en) User information verification method, device, equipment and medium based on block chain
CN119814405A (en) Service access method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination