CN105119884A - Method for verifying authority of network communication user - Google Patents

Method for verifying authority of network communication user Download PDF

Info

Publication number
CN105119884A
CN105119884A CN201510402811.9A CN201510402811A CN105119884A CN 105119884 A CN105119884 A CN 105119884A CN 201510402811 A CN201510402811 A CN 201510402811A CN 105119884 A CN105119884 A CN 105119884A
Authority
CN
China
Prior art keywords
user
client
service end
current
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510402811.9A
Other languages
Chinese (zh)
Inventor
张涢
王会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Meibeike Technology Co Ltd
Original Assignee
Shenzhen Meibeike Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Meibeike Technology Co Ltd filed Critical Shenzhen Meibeike Technology Co Ltd
Priority to CN201510402811.9A priority Critical patent/CN105119884A/en
Publication of CN105119884A publication Critical patent/CN105119884A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Power Engineering (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention belongs to the technical field of computer network communication, and discloses a method for verifying the authority of a network communication user. A client sends communication information of a functional protocol request to a server, and the functional protocol comprises user ID, sessionkey, current time stamp of the server and other business protocols. The step of obtaining the current time stamp of the server includes the client obtains the time stamp before the current functional protocol is sent, adding the user login time obtaining the client time stamp and subtracting the time stamp of the serve to obtain the time stamp difference. The server receives the communication information sent by the client, and determines whether the current communication is legal and whether the current protocol is legal. The validity of a service request sponsor and the requested protocol is completed, and the current communication is strictly protected against leakage.

Description

For the method for calibration of network service user right
Technical field
The invention belongs to computer network communication technology field, be specifically related to a kind of method of calibration for network service user right.
Background technology
Constantly universal along with the development of network technology and various network application, shares by the mode of network service between people that specific file becomes people's routine work gradually, an indispensable part of living.Under the network communications environment of complexity, there is the possibility that vital document transferring content is divulged a secret, communication process is monitored, core technology is stolen, also may there is the malicious attack to terminal transmission equipment, therefore ensure that the fail safe of terminal network communication is most important.
Current most of terminal communication mode does not cause enough attention to the fail safe of communication.The account management of existing service end and control of authority major part all carry out managing and controlling for the direct called side of service, and for causing the original initiator of direct called side, are not then substantially differentiated.But also there are some systems to consider the difference of original initiator, but just specify the mode of original initiator to differentiate by direct called side, and whether legal to specified original initiator, then do not confirmed further.Therefore, these service systems existing lack perfect ID authentication mechanism, and revealing the communication information does not have corresponding prevention mechanism yet.
Summary of the invention
For the deficiency that above-mentioned prior art exists, the object of this invention is to provide a kind of method of calibration for network service user right, the method not only improves the legitimacy of the legitimacy of request service promoter and the agreement of request, but also carries out close protection to the leakage of present communications information.
Given this, the invention provides a kind of method of calibration for network service user right, the method comprises:
Client is to the communication information of service end sending function agreement request, described functional protocol comprises user ID, sessionkey, service end current time stamp and other service protocols, the concrete steps wherein obtaining described service end current time stamp are: client obtains the timestamp before current sending function agreement, add that user's landing time acquisition client time stabs the time tolerance deducting service end timestamp and obtain;
Service end receives the communication information that client sends, and judges to judge whether present communications whether be legitimate correspondence and Current protocol is legal agreement respectively successively.
As preferably, describedly judge present communications whether legal particular content is: according to receiving function agreement, obtain the timestamp that service end receives, then the timestamp timestamp that service end receives being deducted the current acquisition of service end calculates the absolute value of time tolerance, if when time tolerance is greater than given overtime threshold, then judge that present communications time-out is illegal and return client timeout information code; If when time tolerance is less than or equal to given overtime threshold, then judge that this communication is legitimate correspondence and continues the judgement whether Current protocol is legal agreement.
As preferably, describedly judge that whether Current protocol is the particular content of legal agreement and is: compare with the sessionkey that logs under user ID temporarily according to the sessionkey that client sends, if the same continue to operate according to other service protocols follow-up for legal agreement; If not identical, telex network agreement is illegal and return the illegal return code of client protocol.
As preferably, the communication information from described client to service end sending function agreement request before also comprise client Sign-On services end, concrete steps are as follows:
Client sends and logs in agreement to service end, and the wherein said agreement that logs in comprises active user ID and current phone mac address;
Service end obtains the logon information of active user according to active user ID and returns client user's logon information;
Client receives user's logon information, and when user's logon information user logon information is for upgrading local data base when logging in successful information, and record logs in successful information.
As preferred further, when service end logs in for active user ID according to the logon information that active user ID obtains active user, then judge that whether mac address is identical with registration mac address, if the same upgrade and log in data record and current login user is set to logon information, if not identical, return client reminding user and log in failure and ask user to utilize phone number to give user ID for change, to upgrade mac address.
As preferred further, when service end does not log in for active user No. ID according to the logon information that active user ID obtains active user, then continue to judge that whether mac address is that the mac address of registration is identical, if not identical, return client reminding user and log in failure and ask user to utilize phone number to give number for change, to upgrade mac address; If the same log in successfully, service end keeping records current time is stabbed, and upgrades and currently logs in successful information, return client and log in successful information.
As further preferred, described in return client the timestamp of user's logon information when comprising timestamp that user logs in and logged in by service end add the character string that the mac address unique value of active user's terminal is formed and change into the value Sessionkey of MD5 code.
As preferably, before client Sign-On services end, also comprise client registers service end, concrete steps are as follows:
Client sends log-in protocol to service end, and wherein said log-in protocol comprises active user's cell-phone number and mac address and user's name and user cipher;
Service end judges whether user is registered, if be judged as being registered, then return and re-registers; If judge not to be registered, then return client registers success, and return the unique identities user ID of this user in service end;
Client receives to succeed in registration after information and upgrades local data base, and current unique identities user ID write into Databasce is upgraded display interface.
The present invention compared with prior art has following beneficial effect: the present invention receives to the communication information of service end sending function agreement request and service end the communication information that client sends mainly through client and judges to judge successively respectively whether present communications whether be legitimate correspondence and Current protocol is legal agreement, not only improve the legitimacy of the legitimacy of request service promoter and the agreement of request, but also close protection is carried out to the leakage of present communications information.
Accompanying drawing explanation
Fig. 1 is the basic flow sheet of method described in the embodiment of the present invention.
Fig. 2 is the operating diagram of the service end of client registers described in the embodiment of the present invention.
Fig. 3 is the operating diagram of the Sign-On services of client described in embodiment of the present invention end.
Fig. 4 is communication work schematic diagram between client and service end described in the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in detail.
As shown in Figures 1 to 4, embodiments provide a kind of method of calibration for network service user right, the method comprises client registers service end, client Sign-On services end, client and receives to the communication information of service end sending function agreement request and service end the communication information that client sends and judge to judge successively respectively whether present communications whether be legitimate correspondence and Current protocol is legal agreement.Wherein, described functional protocol comprises user ID, sessionkey, service end current time stamp and other service protocols, the concrete steps wherein obtaining described service end current time stamp are: client obtains the timestamp before current sending function agreement, add that user's landing time acquisition client time stabs the time tolerance deducting service end timestamp and obtain.
Describedly judge present communications whether legal particular content is: according to receiving function agreement, obtain the timestamp that service end receives, then the timestamp timestamp that service end receives being deducted the current acquisition of service end calculates the absolute value of time tolerance, if when time tolerance is greater than given overtime threshold, then judge that present communications time-out is illegal and return client timeout information code; If when time tolerance is less than or equal to given overtime threshold, then judge that this communication is legitimate correspondence and continues the judgement whether Current protocol is legal agreement.In this law inventive embodiments, described given overtime threshold defines according to actual demand, such as 25 seconds.The benefit that the present invention sets given overtime threshold like this after this communication connection request 25 seconds afterwards just without any use, if third party has intercepted and captured communication connection, within 25 seconds, afterwards just without any effect, thus improved the prevention ability of the communication information.
Describedly judge that whether Current protocol is the particular content of legal agreement and is: compare with the sessionkey that logs under user ID temporarily according to the sessionkey that client sends, if the same continue to operate according to other service protocols follow-up for legal agreement; If not identical, telex network agreement is illegal and return the illegal return code of client protocol.
The concrete steps of described client registers service end are that client sends log-in protocol to service end, and wherein said log-in protocol comprises active user's cell-phone number and mac address and user's name and user cipher; Service end judges whether user is registered, if be judged as being registered, then return and re-registers; If judge not to be registered, then return client registers success, and return the unique identities user ID of this user in service end;
Client receives to succeed in registration after information and upgrades local data base, and current unique identities user ID write into Databasce is upgraded display interface.
The concrete steps of described client Sign-On services end are that client transmission logs in agreement to service end, and the wherein said agreement that logs in comprises active user ID and current phone mac address; Service end obtains the logon information of active user according to active user ID and returns client user's logon information; Client receives user's logon information, and when user's logon information user logon information is for upgrading local data base when logging in successful information, and record logs in successful information.
When service end logs in for active user ID according to the logon information that active user ID obtains active user, then judge that whether mac address is identical with registration mac address, if the same upgrade and log in data record and current login user is set to logon information, if not identical, return client reminding user and log in failure and ask user to utilize phone number to give user ID for change, to upgrade mac address.
When service end does not log in for active user No. ID according to the logon information that active user ID obtains active user, then continue to judge that whether mac address is that the mac address of registration is identical, if not identical, return client reminding user and log in failure and ask user to utilize phone number to give number for change, to upgrade mac address; If the same log in successfully, service end keeping records current time is stabbed, and upgrades and currently logs in successful information, return client and log in successful information.In embodiments of the present invention, described in log in successful information and comprise timestamp when logging in successfully and keeping records sessionkey value, wherein this value sessionkey is the interim MD5 code that character string that mac address and current service end timestamp form is changed.
Timestamp when the described user's logon information returning client comprises timestamp that user logs in and logged in by service end adds the character string that the mac address unique value of active user's terminal is formed and changes into the value Sessionkey of MD5 code.In embodiments of the present invention, timestamp is current point in time, in the millisecond time, such as: 1435723932 XX when being converted to XXXX XX month XX day XX divide XX second, concrete example as: during 1 day 12 July in 2015 12 points 12 seconds.Wherein Sessionkey is after client Sign-On services end, and service end is one of unique judgment value that client prepares temporarily, and only effective during this period of time at this user's Sign-On services end, as published, this value empties.
The MD5 code composition that the character string that timestamp when this value Sessionkey is service end login adds the mac unique value composition of current user terminal changes into, this value Sessionkey is used to be whether mac address in order to judge active user is the same, but in order to avoid by mac address-transparent, change into MD code again so combine with timestamp, each like this to log in this Sessionkey all different.
Above content is only preferred embodiment of the present invention, and for those of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, this description should not be construed as limitation of the present invention.

Claims (8)

1., for a method of calibration for network service user right, the method comprises:
Client is to the communication information of service end sending function agreement request, described functional protocol comprises user ID, sessionkey, service end current time stamp and other service protocols, the concrete steps wherein obtaining described service end current time stamp are: client obtains the timestamp before current sending function agreement, add that user's landing time acquisition client time stabs the time tolerance deducting service end timestamp and obtain;
Service end receives the communication information that client sends, and judges to judge whether present communications whether be legitimate correspondence and Current protocol is legal agreement respectively successively.
2. the method for calibration for network service user right according to claim 1, it is characterized in that, describedly judge present communications whether legal particular content is: according to receiving function agreement, obtain the timestamp that service end receives, then the timestamp timestamp that service end receives being deducted the current acquisition of service end calculates the absolute value of time tolerance, if when time tolerance is greater than given overtime threshold, then judge that present communications time-out is illegal and return client timeout information code; If when time tolerance is less than or equal to given overtime threshold, then judge that this communication is legitimate correspondence and continues the judgement whether Current protocol is legal agreement.
3. the method for calibration for network service user right according to claim 1, it is characterized in that, describedly judge that whether Current protocol is the particular content of legal agreement and is: compare with the sessionkey that logs under user ID temporarily according to the sessionkey that client sends, if the same continue to operate according to other service protocols follow-up for legal agreement; If not identical, telex network agreement is illegal and return the illegal return code of client protocol.
4. the method for calibration for network service user right according to claim 1, is characterized in that, the communication information from described client to service end sending function agreement request before also comprise client Sign-On services end, concrete steps are as follows:
Client sends and logs in agreement to service end, and the wherein said agreement that logs in comprises active user ID and current phone mac address;
Service end obtains the logon information of active user according to active user ID and returns client user's logon information;
Client receives user's logon information, and when user's logon information user logon information is for upgrading local data base when logging in successful information, and record logs in successful information.
5. the method for calibration for network service user right according to claim 4, it is characterized in that, when service end logs in for active user ID according to the logon information that active user ID obtains active user, then judge that whether mac address is identical with registration mac address, if the same upgrade and log in data record and current login user is set to logon information, if not identical, return client reminding user and log in failure and ask user to utilize phone number to give user ID for change, to upgrade mac address.
6. the method for calibration for network service user right according to claim 4, it is characterized in that, when service end does not log in for active user No. ID according to the logon information that active user ID obtains active user, then continue to judge that whether mac address is that the mac address of registration is identical, if not identical, return client reminding user and log in failure and ask user to utilize phone number to give number for change, to upgrade mac address; If the same log in successfully, service end keeping records current time is stabbed, and upgrades and currently logs in successful information, return client and log in successful information.
7. the method for calibration for network service user right according to claim 4, it is characterized in that, described in return client the timestamp of user's logon information when comprising timestamp that user logs in and logged in by service end add the character string that the mac address unique value of active user's terminal is formed and change into the value Sessionkey of MD5 code.
8. the method for calibration for network service user right according to claim 4, is characterized in that, before client Sign-On services end, also comprise client registers service end, concrete steps are as follows:
Client sends log-in protocol to service end, and wherein said log-in protocol comprises active user's cell-phone number and mac address and user's name and user cipher;
Service end judges whether user is registered, if be judged as being registered, then return and re-registers; If judge not to be registered, then return client registers success, and return the unique identities user ID of this user in service end;
Client receives to succeed in registration after information and upgrades local data base, and current unique identities user ID write into Databasce is upgraded display interface.
CN201510402811.9A 2015-07-10 2015-07-10 Method for verifying authority of network communication user Pending CN105119884A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510402811.9A CN105119884A (en) 2015-07-10 2015-07-10 Method for verifying authority of network communication user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510402811.9A CN105119884A (en) 2015-07-10 2015-07-10 Method for verifying authority of network communication user

Publications (1)

Publication Number Publication Date
CN105119884A true CN105119884A (en) 2015-12-02

Family

ID=54667776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510402811.9A Pending CN105119884A (en) 2015-07-10 2015-07-10 Method for verifying authority of network communication user

Country Status (1)

Country Link
CN (1) CN105119884A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939485A (en) * 2016-06-27 2016-09-14 武汉斗鱼网络科技有限公司 System and method for monitoring bullet screen service availability based on user bullet screen behaviors
CN108881130A (en) * 2017-05-16 2018-11-23 中国移动通信集团重庆有限公司 The method of controlling security and device of session control information
CN110445809A (en) * 2019-09-03 2019-11-12 深圳绿米联创科技有限公司 Network attack detecting method, device, system, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184204A (en) * 2007-12-25 2008-05-21 天柏宽带网络科技(北京)有限公司 Authentication method for interdynamic television service
US20080120719A1 (en) * 2006-11-18 2008-05-22 Friend Doug Login security daemon
CN102651006A (en) * 2011-02-25 2012-08-29 上海网环信息科技有限公司 Database table record locking method and device
CN102739659A (en) * 2012-06-16 2012-10-17 华南师范大学 Authentication method for preventing replay attack
US20130067288A1 (en) * 2011-09-09 2013-03-14 Microsoft Corporation Cooperative Client and Server Logging
CN103139200A (en) * 2013-01-06 2013-06-05 深圳市元征科技股份有限公司 Single sign-on method of web service
CN103179195A (en) * 2013-02-28 2013-06-26 河南有线电视网络集团有限公司 Authentication method and authentication system for page visiting
CN104410622A (en) * 2014-11-25 2015-03-11 珠海格力电器股份有限公司 Security Authentication Method, Client and System for Logging in Web System

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080120719A1 (en) * 2006-11-18 2008-05-22 Friend Doug Login security daemon
CN101184204A (en) * 2007-12-25 2008-05-21 天柏宽带网络科技(北京)有限公司 Authentication method for interdynamic television service
CN102651006A (en) * 2011-02-25 2012-08-29 上海网环信息科技有限公司 Database table record locking method and device
US20130067288A1 (en) * 2011-09-09 2013-03-14 Microsoft Corporation Cooperative Client and Server Logging
CN102739659A (en) * 2012-06-16 2012-10-17 华南师范大学 Authentication method for preventing replay attack
CN103139200A (en) * 2013-01-06 2013-06-05 深圳市元征科技股份有限公司 Single sign-on method of web service
CN103179195A (en) * 2013-02-28 2013-06-26 河南有线电视网络集团有限公司 Authentication method and authentication system for page visiting
CN104410622A (en) * 2014-11-25 2015-03-11 珠海格力电器股份有限公司 Security Authentication Method, Client and System for Logging in Web System

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939485A (en) * 2016-06-27 2016-09-14 武汉斗鱼网络科技有限公司 System and method for monitoring bullet screen service availability based on user bullet screen behaviors
CN105939485B (en) * 2016-06-27 2018-11-06 武汉斗鱼网络科技有限公司 System and method based on user's barrage behavior monitoring barrage service availability
CN108881130A (en) * 2017-05-16 2018-11-23 中国移动通信集团重庆有限公司 The method of controlling security and device of session control information
CN110445809A (en) * 2019-09-03 2019-11-12 深圳绿米联创科技有限公司 Network attack detecting method, device, system, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US8869253B2 (en) Electronic system for securing electronic services
CN106664302B (en) Method and system for revoking session using signaling
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
CN105516163B (en) A kind of login method and terminal device and communication system
CN110225050B (en) JWT token management method
CN105681470B (en) Communication means, server based on hypertext transfer protocol, terminal
CN102546648A (en) Resource access authorization method
CN108259502A (en) For obtaining the identification method of interface access rights, server-side and storage medium
CN110276197A (en) The method to be come into force in real time based on shared blacklist revocation JWT token
CN101873298A (en) Registration method, terminal, server and system
CN105681047B (en) A kind of CA certificate signs and issues method and system
CN101741860A (en) Computer remote security control method
US11165768B2 (en) Technique for connecting to a service
CN109274579A (en) It is a kind of that user's uniform authentication method is applied based on wechat platform more
CN104717063A (en) Software security protection method of mobile terminal
CN104753954A (en) Method for using fortress machine to guarantee network security
CN107113320B (en) Method, related equipment and system for downloading signed file
CN104717649A (en) Method for remote control over wiping of software data of mobile terminal
CN104657856A (en) Position certification based intelligent mobile client payment method and server system
CN105119884A (en) Method for verifying authority of network communication user
CN113839966A (en) Security management system based on micro-service
CN103957189A (en) Application program interaction method and device
CN104821951A (en) Safety communication method and device
CN108696538A (en) A kind of safety communicating method of the IMS systems based on key file
WO2007060016A2 (en) Self provisioning token

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151202

WD01 Invention patent application deemed withdrawn after publication