Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The service access method provided by the embodiment of the application can be applied to the application environment shown in figure 1. The FTTR device 104 obtains the target terminal identifier of the user terminal 102 in response to a service access request for the target service initiated by the user terminal 102. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. If the access right is provided, FTTR device 104 controls user terminal 102 to access the target service based on the target terminal identifier.
Of these, FTTR (Fiber to the Room, fiber-to-room) devices are core devices in a network deployment technology that aims to extend a fiber network directly to individual rooms of a residential or commercial building, providing high-speed, high-bandwidth network connections for each room. The FTTR technology, which is connected to each room by an optical fiber, ensures stability and high-speed transmission of the network, enabling users to enjoy consistent high-quality network services throughout the building. The FTTR device of the present application, which is mainly referred to as FTTR master device also called FTTR-B master device, is the core of FTTR network, and is responsible for converting the optical fiber network signals into signals that can be used by the user device, and distributing the signals to various rooms or working areas in the room.
The user terminal refers to terminal equipment at the user side, and can be intelligent terminals such as mobile phones and computers, and intelligent wearable equipment such as intelligent bracelets and intelligent watches.
In one embodiment, fig. 2 is a flow chart of a service access method according to an embodiment of the present application, and the method is applied to FTTR devices in fig. 1 for illustration, where the method includes the following steps:
s201, responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identification of the user terminal.
The user terminal refers to the terminal equipment which is connected with FTTR equipment and has service access requirements, and the user terminal refers to the terminal equipment at the user side, can be intelligent terminals such as mobile phones and computers, and can also be intelligent wearable equipment such as intelligent bracelets and intelligent watches. The target service refers to a service that needs to be accessed, for example, some external website, an internal office system, and the like. The service access request refers to a request message transmitted when requesting access to a target service. The target terminal identifier refers to a terminal identifier of the user terminal.
Optionally, the target terminal identifier in this embodiment is at least one of a device MAC address, a subscriber identity card (SIM (Subscriber Identity Module, subscriber identity card) card number), and a network identifier (e.g., SSID (SERVICE SET IDENTIFIER, service set identifier)). Preferably, the destination terminal identification uses a device MAC address.
Optionally, in this embodiment, in response to a service access request for a target service initiated by a user terminal, the FTTR device may automatically obtain, through a listening port (e.g., 80 ports), a target terminal identifier of the user terminal. For example, in response to a WEB access request for a WEB page initiated by a user terminal, the FTT device may obtain, through a listening port, an access request of the user terminal and a target terminal identifier of the user terminal.
S202, determining the condition of the access authority of the user terminal to the target service according to the target terminal identification.
The access right possessing request refers to whether the user terminal has the right to access the target service.
An optional implementation manner of the embodiment of the application is that an authentication request is initiated to an authentication server according to a target terminal identifier, so that the authentication server determines that the access authority of the user terminal to the target service is provided based on the target terminal identifier.
As another optional implementation manner of the embodiment of the application, according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list, the condition that the access authority of the user terminal to the target service is provided is determined. Specifically, FTTR equipment monitors a service access request initiated by a user terminal based on a first monitoring port (for example, 80 ports), acquires a target terminal identifier of the user terminal, forwards the service access request and the target terminal identifier to a second monitoring port (for example, 443 ports), the second monitoring port sends the service access request and the target terminal identifier to an authentication plug-in unit configured in FTTR equipment, and the authentication plug-in unit determines that the access authority of the user terminal to the target service has according to a matching result of the target terminal identifier and the candidate terminal identifier in a target white list. It should be noted that, in this embodiment, FTTR devices may also receive the candidate terminal identifier sent by the authentication server through the middleware and add the candidate terminal identifier to the target white list, where the middleware is configured in FTTR devices, and the middleware may be an MBUS (Meter-Bus) middleware. That is, the FTTR device of the present application may communicate with the authentication server through the middleware to receive the candidate terminal identifier sent by the authentication server, and store the candidate terminal identifier in a target whitelist, where the target whitelist may be called by the authentication plug-in.
And S203, controlling the user terminal to access the target service based on the target terminal identification when the access right is provided.
Optionally, in this embodiment, based on the target terminal identifier, the service function authority corresponding to the user terminal is determined, and based on the service function authority, the user terminal is controlled to access the target service. For example, the target service that the user terminal requests to access is an enterprise intranet (such as a comprehensive office system), and the service function authority of the user is a target function module that can only access the target service (such as a sales operation module), and then the user terminal is controlled to only access the target function module of the target service.
According to the service access method, the target terminal identification of the user terminal is obtained in response to the service access request for the target service initiated by the user terminal. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided. Compared with the prior art that when a user initiates a service access request for a target service, an authentication server needs to initiate authentication for the user, and authenticates a user terminal according to information such as a user input verification code or an account number, so that the smoothness of service access is seriously affected. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. Under the condition that the access permission is provided with the access permission, the user terminal is controlled to access the target service based on the target terminal identification, so that the length of an authentication link is greatly shortened, the user is not required to input information such as a verification code or an account number, and the user terminal can be automatically verified, the authentication efficiency is greatly improved while the access security is ensured, the authentication complexity is reduced, the service access smoothness is improved, and the user experience is improved.
In one embodiment, in order to more flexibly control the user terminal to access the target service, as shown in fig. 3, an optional implementation manner in S203 includes:
s301, determining the service function authority of the user terminal to the target service according to the target terminal identification.
The service function authority refers to the function authority of the user terminal in the target service.
An optional implementation manner of the embodiment of the application is that according to the target terminal identification, the identity information of the user corresponding to the target terminal identification is determined, according to the identity information of the user, the authority level of the user is determined, and according to the authority level, the service function authority of the user terminal to the target service is determined. It should be noted that the process may be performed by the FTTR device or may be performed by the FTTR device interacting with the authentication server.
As another alternative implementation manner of the embodiment of the application, the service function authority of the user terminal to the target service is determined according to the target terminal identifier and the authority list. Wherein, each terminal identification and the corresponding business function authority of each terminal identification are recorded in the authority list. It should be noted that this process may be performed by the FTTR device (specifically, may be performed by the authentication plug-in the FTTR device), or may be performed by the FTTR device interacting with the authentication server.
S302, determining a service access port based on the service function authority.
The service access port refers to a port of a service IP address corresponding to the target service, different functions in the target service can be accessed through different service access ports, the target service is assumed to be an internal office system, and different service functions of the internal office system can be accessed through different access ports.
Optionally, in this embodiment, the service access port may be determined according to the service function authority and the port list. Different candidate access ports and service functions corresponding to each candidate access port are recorded in the port list. And determining available service functions according to the service function authority, and taking candidate access ports corresponding to the available service functions as service access ports.
It should be noted that, the configuration of the service access port can be flexibly configured according to the requirement of the user, and the service access port is uploaded to the authentication server, and can be synchronized into the authentication plug-in by the authentication server through the middleware.
S303, controlling the user terminal to access the target service based on the service access port.
An optional implementation manner of the embodiment of the present application is to control the user terminal to access the target service through the service access port. In this case, the user terminal can only access the target function module in the target service corresponding to the own service function authority.
As another optional implementation manner of the embodiment of the present application, a service IP address corresponding to a target service and a service access port are fed back to a user terminal, so that the user terminal accesses the target service based on the service IP address and the service access port.
In this embodiment, the service function authority of the user terminal to the target service is determined according to the target terminal identifier. Based on the service function rights, a service access port is determined. And controlling the user terminal to access the target service based on the service access port. Based on the embodiment, the association binding of the target terminal identification and the service function authority is realized, the split-weight and split-domain management of the service access authorities of different users under different service scenes is realized, the risks of data leakage, malicious damage and the like caused by the same service authority are effectively avoided, the fine management of the user access authorities is realized for enterprise users, different service access authorities can be configured for different users, the human intervention and operation are avoided, and the safety of user access is improved.
In one embodiment, in the case that the access right is not provided, as shown in fig. 4, an alternative implementation of the service access method includes:
s401, when the access right is not provided, feeding back a right authentication request to the user terminal.
The authority authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal. The rights authentication request refers to a request message requiring further authentication of the user terminal.
An optional implementation manner of the embodiment of the present application is that, in a case that the access right is not provided, a right authentication request is fed back to the user terminal. The authority authentication request carries an authentication URL address of the authentication server. The user terminal requests the authentication server to feed back an authentication page to the user terminal based on the authentication URL address, fills in authentication information based on the authentication page, and sends the authentication information to the authentication server after triggering the submitting operation.
As another optional implementation manner of the embodiment of the present application, in a case where the access right is not provided, the first authentication request is sent to the authentication server, so that the authentication server feeds back the right authentication request to the user terminal based on the first authentication request. The authority authentication request comprises an authentication page, the user terminal fills in authentication information based on the authentication page, and sends the authentication information to the authentication server after triggering the submitting operation.
Optionally, the authentication message includes, but is not limited to, a user identification card number, an authentication code, a device MAC address, etc. The authentication server is facilitated to further authenticate the user terminal based on the authentication message. It should be noted that, in this embodiment, the target terminal identifier may be a device MAC address. The authentication information includes at least a user identification card number. The purpose is to further authenticate the user terminal based on authentication information, and increase the security of access.
Optionally, in this embodiment, the authentication information is used for the authentication server to authenticate the user terminal in combination with second authentication information, where the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number. For example, if the target terminal is identified as the device MAC address, after the enterprise user updates the new mobile phone, when the enterprise user requests access to the target service for the first time, the target whitelist of the FTTP device does not have the device MAC address of the new mobile phone, so that the access right is not provided, in this case, the user terminal needs to send a right authentication request to the user terminal, the user terminal sends authentication information to the authentication server, the authentication server sends first authentication information (for example, an authentication code) to the user terminal based on the user identification card number in the authentication information, the user terminal feeds back corresponding second authentication information to the authentication server, and the authentication server further authenticates the user terminal based on the second authentication information and the authentication information. Specifically, whether the first authentication information is identical to the second authentication information, whether the authentication information matches the information stored in advance, and the like.
Optionally, in this embodiment, when the authentication server authenticates the user terminal, the target terminal identifier of the user terminal is sent to FTTR equipment through the middleware. The user terminal receives the target terminal identification of the user terminal sent by the authentication server. And adding the target terminal identification into the target white list, and configuring the storage time length (also referred to as aging time length) of the target terminal identification in the target white list. The purpose of this embodiment is to dynamically update the target white list, when the user terminal accesses the target service again next time, the FTTR device can be directly authorized under the condition that the storage duration is valid, and further authentication needs to be performed through the authentication server, so that the access efficiency of the subsequent service access is improved.
S402, receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
Wherein the authentication response message is sent out after the authentication server further authenticates the user terminal based on the authentication information. The authentication response message includes an authentication result, such as an authentication pass result, an authentication fail result, and the like.
Optionally, in this embodiment, the authentication response message further includes a service function authority of the user terminal, and the service access port is determined based on the service function authority when the authentication response message includes an authentication passing result. And controlling the user terminal to access the target service based on the service access port. The specific implementation manner of this embodiment is described in detail in the foregoing embodiments, and will not be described herein.
Optionally, in this embodiment, when the authentication response message includes an authentication failure result, the permission authentication request is fed back to the user terminal again.
In the embodiment, when the access right is not provided, a right authentication request is fed back to the user terminal, wherein the right authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal. And receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result. In addition, the authentication information in this embodiment includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number. In the embodiment, when the access right is not provided, that is, when the primary authentication fails, authentication is performed again based on the authentication server, and the security of service access is effectively improved based on various authentication strategies.
In one embodiment, as shown in fig. 5, another alternative implementation manner of a service access method includes:
S501, receiving the candidate terminal identification sent by the authentication server through the middleware, and adding the candidate terminal identification to the target white list. Wherein, the middleware is configured in FTTR equipment.
S502, responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identification of the user terminal. The target terminal identifier is at least one of a device Media Access Control (MAC) address, a user identification card number and a network identifier.
S503, according to the matching result of the target terminal identification and the candidate terminal identification in the target white list, determining that the access authority of the user terminal to the target service has the condition.
S504, when the access authority is provided, determining the service function authority of the user terminal to the target service according to the target terminal identification.
S505, based on the service function authority, determining a service access port.
S506, when the access right is not provided, feeding back a right authentication request to the user terminal. The authority authentication request is used for indicating the user terminal to send authentication information to the authentication server, the authentication information at least comprises a user identification card number, the authentication information is used for enabling the authentication server to combine with second authentication information to authenticate the user terminal, and the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends first authentication information to the user terminal based on the user identification card number.
S507, receiving an authentication response message sent by the authentication server based on the authentication information, and determining a service access port based on the service function authority carried in the authentication response message under the condition that the authentication response message comprises an authentication passing result.
S508, the user terminal is controlled to access the target service based on the service access port.
It should be noted that, in this embodiment, the process of updating the target white list by FTTR devices is further included, which is specifically as follows:
In the case that the authentication server authenticates the user terminal, the authentication server transmits the target terminal identification of the user terminal to FTTR equipment, and FTTR equipment receives the target terminal identification of the user terminal transmitted by the authentication server.
And adding the target terminal identification into the target white list, and configuring the storage time length of the target terminal identification in the target white list.
In this embodiment, a target terminal identifier of a user terminal is obtained in response to a service access request for a target service initiated by the user terminal. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided. Compared with the prior art that when a user initiates a service access request for a target service, an authentication server needs to initiate authentication for the user, and authenticates a user terminal according to information such as a user input verification code or an account number, so that the smoothness of service access is seriously affected. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. Under the condition that the access permission is provided with the access permission, the user terminal is controlled to access the target service based on the target terminal identification, so that the length of an authentication link is greatly shortened, the user is not required to input information such as a verification code or an account number, and the user terminal can be automatically verified, the authentication efficiency is greatly improved while the access security is ensured, the authentication complexity is reduced, the service access smoothness is improved, and the user experience is improved.
It should be understood that, although the steps in the flowcharts related to the above embodiments are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a service access device for realizing the service access method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of one or more service access devices provided below may refer to the limitation of the service access method hereinabove, and will not be repeated herein.
In one embodiment, a block diagram of the service access apparatus in one embodiment is shown by fig. 6. As shown in fig. 6, there is provided a service access apparatus 1, which includes an acquisition module 10, a determination module 20, and a control module 30, wherein:
An obtaining module 10, configured to obtain a target terminal identifier of a user terminal in response to a service access request for a target service initiated by the user terminal;
the determining module 20 is configured to determine, according to the target terminal identifier, that the access right of the user terminal to the target service has a condition;
And the control module 30 is used for controlling the user terminal to access the target service based on the target terminal identifier when the access right is provided.
The service access device responds to a service access request for a target service initiated by the user terminal, and acquires a target terminal identifier of the user terminal. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided. Compared with the prior art that when a user initiates a service access request for a target service, an authentication server needs to initiate authentication for the user, and authenticates a user terminal according to information such as a user input verification code or an account number, so that the smoothness of service access is seriously affected. And determining that the access authority of the user terminal to the target service has the condition according to the target terminal identification. Under the condition that the access permission is provided with the access permission, the user terminal is controlled to access the target service based on the target terminal identification, so that the length of an authentication link is greatly shortened, the user is not required to input information such as a verification code or an account number, and the user terminal can be automatically verified, the authentication efficiency is greatly improved while the access security is ensured, the authentication complexity is reduced, the service access smoothness is improved, and the user experience is improved.
In one embodiment, the determining module 20 of fig. 6 above is also specifically configured to:
and determining that the access authority of the user terminal to the target service has the condition according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list.
In one embodiment, the service access apparatus 1 in fig. 6 above further includes:
the first receiving module is used for receiving the candidate terminal identification sent by the authentication server through the middleware and adding the candidate terminal identification to the target white list, wherein the middleware is configured in FTTR equipment.
In one embodiment, the control module 30 of fig. 6 above is further specifically configured to:
determining the service function authority of the user terminal to the target service according to the target terminal identification;
Determining a service access port based on the service function authority;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the service access apparatus 1 in fig. 6 above further includes:
The system comprises a feedback module, a user terminal, an authentication server and a user terminal, wherein the feedback module is used for feeding back an authority authentication request to the user terminal when the access authority is not provided with the access authority, the authority authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal;
and the second receiving module is used for receiving an authentication response message sent by the authentication server based on the authentication information and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
In one embodiment, the authentication response message further includes a service function authority of the user terminal;
correspondingly, the second receiving module is further specifically configured to:
determining a service access port based on the service function authority under the condition that the authentication response message comprises an authentication passing result;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the service access apparatus 1 in fig. 6 above further includes:
the third receiving module is used for receiving the target terminal identification of the user terminal sent by the authentication server;
and the configuration module is used for adding the target terminal identification into the target white list and configuring the storage duration of the target terminal identification in the target white list.
In one embodiment, the target terminal identification is at least one of a device media access control MAC address, a user identification card number, and a network identification.
In one embodiment, the authentication information includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number.
The various modules in the service access apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a platform side, and the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing information related to the service access method. The network interface of the computer device is used for communicating with an external user side through a network connection. The computer program is executed by a processor to implement a service access method.
It will be appreciated by persons skilled in the art that the architecture shown in fig. 7 is merely a block diagram of some of the architecture relevant to the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements are applicable, and in particular, the computer device may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
Responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identifier of the user terminal;
determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
In one embodiment, the processor when executing the computer program further performs the steps of determining, according to the target terminal identifier, that the access right of the user terminal to the target service has the condition, including:
and determining that the access authority of the user terminal to the target service has the condition according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list.
In one embodiment, the processor when executing the computer program further performs the steps of:
And receiving the candidate terminal identification sent by the authentication server through the middleware, and adding the candidate terminal identification to the target white list, wherein the middleware is configured in FTTR equipment.
In one embodiment, the processor when executing the computer program further performs the step of controlling the user terminal to access the target service based on the target terminal identification, comprising:
determining the service function authority of the user terminal to the target service according to the target terminal identification;
Determining a service access port based on the service function authority;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the processor when executing the computer program further performs the steps of:
feeding back a permission authentication request to the user terminal when the access permission is not provided, wherein the permission authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal;
and receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
In one embodiment, the processor when executing the computer program further performs the step of the authentication response message further comprising the service function rights of the user terminal;
correspondingly, in the case that the authentication response message includes an authentication passing result, controlling the user terminal to access the target service includes:
determining a service access port based on the service function authority under the condition that the authentication response message comprises an authentication passing result;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the processor when executing the computer program further performs the steps of:
receiving a target terminal identification of a user terminal sent by an authentication server;
and adding the target terminal identification into the target white list, and configuring the storage time length of the target terminal identification in the target white list.
In one embodiment, the processor when executing the computer program further performs the step of identifying the target terminal as at least one of a device media access control, MAC, address, user identification card number, and network identification.
In one embodiment, the processor when executing the computer program further performs the steps of authenticating that the information includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
Responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identifier of the user terminal;
determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
In one embodiment, the computer program when executed by the processor further performs the steps of determining, based on the target terminal identifier, that the user terminal has access rights to the target service, including:
and determining that the access authority of the user terminal to the target service has the condition according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list.
In one embodiment, the computer program when executed by the processor further performs the steps of:
And receiving the candidate terminal identification sent by the authentication server through the middleware, and adding the candidate terminal identification to the target white list, wherein the middleware is configured in FTTR equipment.
In one embodiment, the computer program when executed by the processor further performs the step of controlling access to the target service by the user terminal based on the target terminal identification, comprising:
determining the service function authority of the user terminal to the target service according to the target terminal identification;
Determining a service access port based on the service function authority;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the computer program when executed by the processor further performs the steps of:
feeding back a permission authentication request to the user terminal when the access permission is not provided, wherein the permission authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal;
and receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
In one embodiment, the computer program when executed by the processor further performs the steps of the authentication response message further comprising a service function right of the user terminal;
correspondingly, in the case that the authentication response message includes an authentication passing result, controlling the user terminal to access the target service includes:
determining a service access port based on the service function authority under the condition that the authentication response message comprises an authentication passing result;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a target terminal identification of a user terminal sent by an authentication server;
and adding the target terminal identification into the target white list, and configuring the storage time length of the target terminal identification in the target white list.
In one embodiment, the computer program when executed by the processor further performs the step of the target terminal identification being at least one of a device media access control, MAC, address, user identification card number, and network identification.
In one embodiment, the computer program when executed by the processor further performs the steps of authenticating that the information includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of:
Responding to a service access request for a target service initiated by a user terminal, and acquiring a target terminal identifier of the user terminal;
determining the condition of the access authority of the user terminal to the target service according to the target terminal identification;
And controlling the user terminal to access the target service based on the target terminal identifier under the condition that the access right is provided.
In one embodiment, the computer program when executed by the processor further performs the steps of determining, based on the target terminal identifier, that the user terminal has access rights to the target service, including:
and determining that the access authority of the user terminal to the target service has the condition according to the matching result of the target terminal identifier and the candidate terminal identifier in the target white list.
In one embodiment, the computer program when executed by the processor further performs the steps of:
And receiving the candidate terminal identification sent by the authentication server through the middleware, and adding the candidate terminal identification to the target white list, wherein the middleware is configured in FTTR equipment.
In one embodiment, the computer program when executed by the processor further performs the step of controlling access to the target service by the user terminal based on the target terminal identification, comprising:
determining the service function authority of the user terminal to the target service according to the target terminal identification;
Determining a service access port based on the service function authority;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the computer program when executed by the processor further performs the steps of:
feeding back a permission authentication request to the user terminal when the access permission is not provided, wherein the permission authentication request is used for indicating the user terminal to send authentication information to the authentication server, and the authentication information is used for the authentication server to authenticate the user terminal;
and receiving an authentication response message sent by the authentication server based on the authentication information, and controlling the user terminal to access the target service under the condition that the authentication response message comprises an authentication passing result.
In one embodiment, the computer program when executed by the processor further performs the steps of the authentication response message further comprising a service function right of the user terminal;
correspondingly, in the case that the authentication response message includes an authentication passing result, controlling the user terminal to access the target service includes:
determining a service access port based on the service function authority under the condition that the authentication response message comprises an authentication passing result;
and controlling the user terminal to access the target service based on the service access port.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a target terminal identification of a user terminal sent by an authentication server;
and adding the target terminal identification into the target white list, and configuring the storage time length of the target terminal identification in the target white list.
In one embodiment, the computer program when executed by the processor further performs the step of the target terminal identification being at least one of a device media access control, MAC, address, user identification card number, and network identification.
In one embodiment, the computer program when executed by the processor further performs the steps of authenticating that the information includes at least a user identification card number;
The authentication information is used for the authentication server to authenticate the user terminal by combining with second authentication information, wherein the second authentication information is fed back by the user terminal based on the first authentication information after the authentication server sends the first authentication information to the user terminal based on the user identification card number.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magneto-resistive random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (PHASE CHANGE Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in various forms such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), etc. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and for brevity, all of the possible combinations of the technical features of the above embodiments are not described, however, only the combinations of the technical features are not contradictory, and should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.