WO2009115017A1 - 网络认证服务系统和方法 - Google Patents
网络认证服务系统和方法 Download PDFInfo
- Publication number
- WO2009115017A1 WO2009115017A1 PCT/CN2009/070753 CN2009070753W WO2009115017A1 WO 2009115017 A1 WO2009115017 A1 WO 2009115017A1 CN 2009070753 W CN2009070753 W CN 2009070753W WO 2009115017 A1 WO2009115017 A1 WO 2009115017A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- message
- packet
- server
- client
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Definitions
- the present invention relates to the field of network communications, and in particular, to a network authentication service system and method. Background technique
- Web services As Web services evolve from technical concepts to practical applications, Web services will be an extremely important model for future application architectures. Web services have language and platform-independent features, so their advantages are becoming more apparent when linking applications across the enterprise and across the Internet. Web services use Extensible Markup Language (XML) for data exchange. By default, XML is plaintext encoded. At the same time, most Web services use Hypertext Transfer Protocol (HTTP) as the transport protocol. HTTP also uses plaintext to transmit data, which causes unencrypted information to be transmitted over unencrypted transport protocols, thereby threatening the confidentiality of information transmission.
- XML Extensible Markup Language
- HTTP Hypertext Transfer Protocol
- the enterprise has the following basic requirements for the security of Web services: First, the data should not be seen by the third party when transmitting on the Internet; secondly, the sender and the receiver of the data can determine the source of the data; again, the sender and the receiver of the data can determine The data has not been tampered with during the transfer.
- the above-mentioned Web service method cannot meet the basic requirements of the enterprise for security.
- the enterprise adopts different methods, such as Secure Socket Layer (SSL) to solve the problem that the data is not viewed by a third party during transmission.
- SSL Secure Socket Layer
- Embodiments of the present invention provide a network authentication service system and method, which are implemented to meet different enterprises. Security requirements for web services.
- An embodiment of the present invention provides a network authentication service system, which corresponds to a network application layer, and includes: a network service security device, configured to intercept a packet of a network application layer interaction;
- the authentication server is configured to perform authentication processing on the packet intercepted by the network service security device.
- the embodiment of the invention provides a network authentication service method, including:
- Blocking the request packet of the network application layer encrypting the request packet to obtain an encrypted packet; performing authentication processing on the encrypted text; and decrypting the encrypted encrypted document.
- the interception of the packet in the network application layer is intercepted, and the intercepted packet is processed in a security-related manner, so that the packet can be transmitted securely.
- Embodiment 1 is a schematic structural diagram of Embodiment 1 of a network authentication service system according to the present invention
- FIG. 2 is a schematic diagram of a network protocol relationship corresponding to Embodiment 1 of the network authentication service system of the present invention
- FIG. 3 is a schematic structural diagram of Embodiment 2 of the network authentication service system according to the present invention
- FIG. 4 is a schematic diagram of a network relationship of an intercepting module in an embodiment of a network authentication service system according to the present invention
- FIG. 5 is a flowchart of Embodiment 1 of a network authentication service method according to the present invention.
- Embodiment 6 is a flowchart of Embodiment 2 of a network authentication service method according to the present invention.
- FIG. 7 is a flowchart of authentication in an embodiment of a network authentication service method according to the present invention.
- FIG. 1 is a schematic structural diagram of Embodiment 1 of a network authentication service system according to the present invention.
- the embodiment includes:
- the network service security device 11 is configured to intercept packets that are exchanged by the network application layer.
- the authentication server 12 is configured to perform authentication processing on the intercepted packets.
- FIG. 2 it is a schematic diagram of a network protocol relationship corresponding to Embodiment 1 of the network authentication service system of the present invention.
- the network security device in this embodiment is specifically a web service security device, and the protocol WS-Defy corresponding to the web service security device is one above the existing network service security specification (Web Services Security, hereinafter referred to as WS-Security).
- WS-Security corresponds to the application layer of the OSI (Open System Interconnection Reference Model), based on the Simple Object Access Protocol (hereinafter referred to as the Simple Object Access Protocol).
- OSI Open System Interconnection Reference Model
- Simple Object Access Protocol hereinafter referred to as the Simple Object Access Protocol.
- XML Extensible Markup Language
- XML encryption can be used to keep a part of the SOAP message confidential and provide message confidentiality.
- the interaction between the web service client and the web service server of the application layer for example, the web service client sends a request message for calling the function to the web service server, and the web service server returns to the web service client.
- the corresponding system is set up between the web service client and the web service server, and is configured to intercept the message exchanged between the web service client and the web service server, and perform authentication processing on the packet. For example, intercepting the request message sent by the web service client to the web service server and authenticating the request message, intercepting the response message sent by the web service server to the web service client, and authenticating the response message .
- the network service security device 11 may specifically include: a client interception module 111, a server interception module 112; a client interception module 111 is configured to intercept packets sent and received by the web service client; and the server interception module 112 is configured to intercept The message received and sent by the web service server.
- the authentication server 12 authenticates the packets intercepted by the client interception module 111 and the server interception module 112.
- the Web service has multiple stages before sending and receiving SOAP messages. Each stage can register a Handler to perform pre- and post-processing operations on SOAP messages. When the web service sends a SOAP packet, it sends an interception module (OutHandler) to encrypt, sign, and add user identity information to the SOAP packet.
- OutHandler interception module
- the receiving intercept module decrypts the SOAP packet, verifies the signature, and performs pre-operation such as user identity authentication.
- the SOAP message of the request and response can be processed by the registered OutHandler before being sent, and the SOAP message is converted into the protected format of WS-Security.
- the web service server or web service client can process the SOAP message through the registered line.
- the packet sent or received by the Web service is intercepted, and the intercepted packet is authenticated and authenticated, the security authentication is diversified, and the authentication is performed by the authentication server, which can be combined with the enterprise single.
- Single Sign On (SSO) certification scheme will be certified The server is set up on the single sign-on server to implement unified security authentication.
- XML encryption corresponding to the application layer, can encrypt only the SOAP header without encrypting the entire SOAP packet, so it can encrypt part of the data and implement secure transmission without relying on the transport layer.
- FIG. 3 is a schematic structural diagram of Embodiment 2 of a network authentication service system according to the present invention.
- the client interception module 111 of the embodiment specifically includes a client.
- the server intercepting module 112 specifically includes a server receiving intercepting module 1121 and a server sending intercepting module 1122.
- the client sending intercepting module 1111 is configured to intercept the request packet sent by the network service client, obtain the first authentication code from the authentication server 12, and perform encryption processing on the request packet according to the first authentication code to obtain the encrypted packet.
- the server receiving and intercepting module 1121 is configured to intercept the encrypted message received by the network service server, and send a service verification message for authenticating the encrypted message to the authentication server 12, where the authentication server 12 intercepts the service according to the service verification message. Encrypting the message for authentication; the server sending intercepting module 1122 is configured to intercept the response message sent by the network service server, obtain the second authentication code from the authentication server 12, and encapsulate the response message with the second authentication code to obtain the authentication message.
- the client receiving interception module 1112 is configured to intercept the authentication packet received by the network service client, and send a client verification message for authenticating the authentication packet to the authentication server 12, and the authentication server 12 verifies according to the client. The message authenticates the intercepted authentication message.
- the client and the server use different modules to intercept and receive the received and sent packets respectively. Because the received and sent packets are processed separately, the flexibility of the device is improved.
- FIG. 5 is a flowchart of Embodiment 1 of a network authentication service method according to the present invention.
- the method mainly includes: intercepting an application layer to exchange packets, and performing authentication processing on the intercepted packet, and the specific implementation is:
- Step 51 The web service security device (for example, the client sends an interception module) intercepts the request message sent by the web service client;
- Step 52 The web service security device (for example, the client sends an interception module) performs encryption processing on the request message (for example, applying an authentication code to the authentication server and matching the authentication code to the request message) to obtain an encrypted message. And sending the encrypted message to the web service server;
- Step 53 The web service security device (for example, the server receives the interception module) receives the encrypted message.
- the encrypted message can be directly sent to the web server, but since the encrypted message is to be authenticated, the encrypted message is encrypted.
- the callback function may be added to enable the encrypted message to be sent back to the server to receive the interception module for further authentication, and the received encrypted message is authenticated by the authentication server;
- Step 54 The web service security device (eg, the server receives the interception module) decrypts the encrypted ciphertext.
- the packet exchanged between the Web service client and the Web service server can be intercepted, and the intercepted packet is authenticated and other related security processes are implemented to implement secure transmission of the packet.
- FIG. 6 is a flowchart of Embodiment 2 of a network authentication service method according to the present invention, where the method includes:
- Step 60 The web service client sends a SOAP request message.
- Step 61 The client sends an interception module (the client OutHandler) to intercept the received SOAP request packet;
- the request packet includes a packet body and a packet header, and the packet header includes information such as a user account configured by the client.
- the interception of the Web service client can be implemented by, for example, by registering the OutHandler service in the Web service.
- the Web service client sends a SOAP request message to the Web service server
- the client OutHandler will be implemented according to the configuration file. Intercept this request message.
- the OutHandler service pre-processes the SOAP request message sent by the client, adds WS-Security information, and imports necessary configuration information and class files.
- DOMOutHandler So use DOMOutHandler to convert the DOM (Document Object Model) into a stream model of STAX (Streaming API for XML).
- WSS4JOutHandler to complete the operation of adding authentication information in the SOAP header, the client OutHandler can connect to the authentication server. To request and respond to authentication information.
- Step 62 After the client sends the interception module to intercept the request packet, the client sends an application message for obtaining the first authentication code to the authentication server.
- Step 63 The client sending interception module encrypts and encapsulates the intercepted request message by using the first authentication code obtained according to the application message;
- the forming of the encrypted packet may specifically include the following steps: the client intercepting module from the authentication service Obtaining the first authentication code and generating a random number (step 631); querying the user password according to the user account carried in the request packet (step 632); ⁇ the authentication code, the random number, the user account, The user password and the body of the request message generate a first response string, and the request message is encrypted and encapsulated by the first response string and the user account (step 633).
- the step of encrypting the intercepted message corresponding to the foregoing may be:
- Step 1 The authentication server sends an interception module to the client according to the application request sent by the interception module, and sends a first authentication code to the client.
- the first authentication code includes a random number nonce and a random string realm.
- the client sends the interception.
- the module generates a random number cnonce and queries the user password according to the user account;
- the third step is to generate a first response string (response 1) according to an algorithm agreed by the web service server and the web service client;
- the step of generating the first response string is:
- the message body of the request message is first hashed by md5, and the result of the hash is encoded in hexadecimal characters to generate key2.
- Mip5 is hashed by keyl + ":,, + nonce + “:” + cnonce + “:” + key2, and the result of the hash is encoded in hexadecimal characters to generate the final first response string.
- the SOAP request packet is re-encapsulated with the generated first response string, and the encapsulated SOAP packet header includes at least the first response string and the user account.
- the fifth step is to send the encapsulated SOAP packet to the web service server.
- Step 64 The server receives the interception module (the server InHandler) to intercept the encrypted packet sent by the client to the web service server by the interception module (the encrypted packet is usually sent to the web service server in the actual application, in order to encrypt the packet) To verify, you need to call back to the server InHandler, you can also send the encrypted message directly to the server InHandler through configuration, no callback is needed at this time. Before this, the server receives the interception module to call back the encrypted request message from the web service server (step 641).
- the interception module the server InHandler
- InHandler configuration can be: Web monthly service, create an applicationContext-ws-security .xml File, let the web service have authentication and interception capabilities.
- This configuration file mainly configures the name of the Web service, the method of converting the SOAP of the STAX flow model into the DOM model, the authentication or authentication method, the necessary class for import, and the callback implementation class to implement callback of the encrypted request message from the Web server.
- This InHandler can connect to the authentication server for request and response of authentication information.
- Step 65 The authentication server authenticates the encrypted packet according to the service verification message sent by the server receiving the interception module (the server InHandler);
- the forming of the service verification message specifically includes:
- Step 651 The server receiving interception module queries the authentication module to obtain the first authentication code according to the user account carried in the encrypted packet of the callback, and the first authentication code is nonce and realm;
- Step 652 The authentication server sends the first authentication code to the server receiving intercepting module, and then invalidates the original first authentication code nonce, and generates a new second authentication code nextnonce;
- Step 653 The server receiving interception module queries the user password according to the user account.
- Step 654 The server receives the interception module according to the first authentication code (nonce and realm), the user account, the user password, and the callback encrypted message.
- the message body generates a second response string (response2); wherein the method for generating the second response string is the same as the method for generating the first response string, but only when the first response string is generated, the message body of the request message is hashed.
- the second response string is generated, the message body of the encrypted message of the callback is hashed.
- Step 655 The server receiving the intercepting module adds the first response string carried in the encrypted packet of the callback and the generated second response string into the service verification message, and sends the message to the authentication server.
- the authentication server authentication process is specifically: the authentication server determines whether the encrypted message is authenticated by comparing whether the first response string and the second response string are the same. If the first response string and the second response string are the same, it indicates that the authentication is performed. Otherwise, the authentication is not passed. For the encrypted message that passes the authentication, step 656 is performed. For the encrypted message that fails the authentication, step 657 is performed.
- Step 656 The authentication server receives, from the server, the interception module to send a verification pass message, and indicates that the server receives the encrypted message that the interception module decrypts and passes the authentication;
- Step 657 The authentication server sends a prompt to the web service client to request that the authentication fails, and the process ends.
- the above process implements a SOAP request message sent by the web service server to the web service client.
- the web service server needs to send the response to the web service client, and the web service client can also implement the authentication of the corresponding text. Therefore, the embodiment may further include:
- Step 66 The web service server sends an authentication packet, where the authentication packet is added to the response packet corresponding to the request packet, and the authentication packet is obtained.
- the obtaining of the authentication packet specifically includes:
- Step 661 The web service server returns an application corresponding to the request message.
- Step 662 The server sends an interception module (the server OutHandler) to intercept the response;
- Step 663 the server sends the interception module to obtain the authentication server.
- Step 664 The server sends an interception module to add the second authentication code to the header of the response packet to obtain an authentication packet.
- Step 67 The client receives the interception module (client InHandler) to intercept the authentication packet;
- the authentication packet may be directly sent to the client to receive the interception module through configuration, or may be sent to the web service client first, and then sent back to the client from the web service client to receive the interception module.
- Step 68 The client receives the interception module to send the authentication message to the authentication server.
- the client authentication message includes the second authentication code nextnonce carried in the authentication packet. If the authentication packet is not modified, the authentication code is used. The nextnonce is the same as that stored in the authentication server. If the authentication packet is changed, the authentication code carried in the authentication packet will also be changed.
- Step 69 The authentication server determines whether the request message of the request message passes the authentication by comparing whether the second authentication code in the client authentication message and the second authentication code stored in the second authentication code are the same, if the client receives the interception module. If the sent second authentication code is the same as the second authentication code stored by the authentication server, it indicates that the authentication packet has not been tampered with, that is, the authentication message sent by the web service server is authenticated, and step 691 is performed. Otherwise, the authentication is not performed. Step 692;
- Step 691 The authentication server instructs the client to send the interception module to send the decrypted authentication packet to the web service client, that is, the response message of the request packet is sent;
- Step 692 The authentication server sends a prompt to the web service client that the response authentication fails.
- FIG. 7 is a schematic diagram of the network authentication service method according to the present invention.
- the certification process includes:
- Step 71 The client sends an interception module (client OutHandler) to request the first authentication code from the authentication server.
- client OutHandler an interception module
- Step 72 The client OutHandler receives the first authentication code. After the first authentication code is matched to the request packet, the request packet is encrypted.
- Step 73 After receiving the encrypted packet, the server receiving the intercepting module (the server InHandler) sends a request for confirming the first authentication code to the authentication server, that is, whether the encrypted packet received by the server is falsified;
- Step 74 The authentication server authenticates the encrypted message according to the information sent by the server InHandler, and returns a corresponding result.
- Step 75 The server sends an interception module (the server OutHandler) to request the second authentication code from the authentication server to obtain the authentication packet.
- an interception module the server OutHandler
- the server If the encrypted message is valid (through authentication), the server returns a response message to the client. Similar to the client sending the request message, the server adds authentication to the sent response message, so that the client can verify. Whether the received message has been tampered with. Therefore, when returning the message, the server can add the second authentication code to the authentication message to obtain the authentication message, and the client needs to authenticate after receiving the authentication message, such as confirming the second authentication code.
- Step 76 The authentication server returns a second authentication code, so that the server OutHandler adds a password authentication to the response message.
- Step 77 The client receiving the intercepting module (client InHandler) sends a request for confirming the second authentication code to the authentication server;
- Step 78 The authentication server returns the corresponding authentication result.
- the authentication mode in this embodiment is a user account and a user password.
- digital signature authentication, fingerprint authentication, and the like may be used for the intercepted message.
- the client interception module and the server interception module are divided into two modules for receiving and transmitting, and instead, the client and the server respectively use one interception module, or the client and the service.
- the terminal shares an interception module to implement the function of intercepting >3 ⁇ 4 text.
- the WS-Security security specification is extended, that is, the SOAP text is intercepted, and the Web service security authentication mode can be diversified.
- the authentication module performs authentication, and can be combined with the enterprise single sign-on (Single Sign).
- the authentication module is set to the single sign-on server to achieve unified security authentication; this embodiment does not use an encrypted transport layer protocol, such as the HTTPS protocol of the transport layer, ensuring that the Web service is independent of the transport layer. And, by using the XML in WS-Security for data exchange, only the SOAP header can be encrypted without encrypting the entire SOAP packet, which saves performance overhead; the client and the embodiment
- the server is provided with an interception module, which can perform special security processing on the service through the interception module, such as log review and packet compression.
- the storage medium may be a magnetic disk, an optical disk, or a read-only storage memory.
- ROM Read-Only Memory
- RAM Random Access Memory
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Description
网络认证服务系统和方法 本申请要求于 2008 年 3 月 17 日提交中国专利局、 申请号为 200810102058.1、 发明名称为"网络认证服务系统和方法"的中国专利申请的优 先权, 其全部内容通过引用结合在本申请中。
技术领域
本发明涉及网络通信领域, 特别是涉及一种网络认证服务系统和方法。 背景技术
随着网络(Web )服务由技术概念到实践应用的不断发展, Web服务将是 未来应用架构的一个极为重要的模式。 Web服务具有与语言和平台无关的特 性, 因此在跨企业、跨因特网链接应用程序时, 其优势愈来愈明显。 Web服务 采用扩展标记语言(Extensible Markup Language, XML )来进行数据交换, 在 默认情况下, XML是明文编码的; 同时, 大部分 Web服务使用超文本传输协 议(Hypertext Transfer Protocol, HTTP )作为传输协议, HTTP也是使用明文 方式来传输数据的,这就造成在不加密的传输协议上传输不加密的信息,从而 使信息传输的保密性受到威胁。 而企业对 Web服务的安全性具有以下基本要 求: 首先, 数据在因特网上传输时不应该被第三方看到; 其次, 数据的收发双 方能够确定数据的来源; 再次,数据的收发双方能够确定在传输过程中数据没 有被篡改。 但是, 上述的 Web服务方式不能满足企业对安全性的基本要求, 为此, 企业采用不同的方式, 如安全套接层协议(Secure Socket Layer, SSL ) 来解决 "数据在传输时不被第三方看到"的问题, 采用数字签名和数字证书技 术来解决 "确定数据的来源" 和 "确定数据未被篡改" 的问题。
基于上述技术及企业对安全级别的不同要求 ,按照安全级别从低到高的顺 序, 现在由如下一些技术来保证企业 Web服务的安全性:
1、 应用认证机制实现安全性, 如在 J2EE Web服务中应用默认的访问机 制, 及在 Servlet技术中应用过滤器进行访问控制;
2、 应用加密的数据传输协议实现安全性, 如采用 SSL、 HTTPS等。
发明内容
本发明实施例是提供一种网络认证服务系统和方法,实现满足不同企业的
Web服务的安全性要求。
本发明实施例提供了一种网络认证服务系统, 对应于网络应用层, 包括: 网络服务安全装置, 用于拦截网络应用层交互的报文;
认证服务器, 用于对所述网络服务安全装置拦截后的报文进行认证处理。 本发明实施例提供了一种网络认证服务方法, 包括:
拦截网络应用层的请求报文; 对所述请求报文进行加密处理,得到加密报 文; 对所述加密 文进行认证处理; 对通过认证的加密 文进行解密。
本发明实施例通过对网络应用层内交互的报文进行拦截 ,对拦截后的报文 进行安全相关的处理, 能够实现报文的安全传输。
附图说明
图 1为本发明网络认证服务系统实施例一结构示意图;
图 2为与本发明网络认证服务系统实施例一对应的网络协议关系示意图; 图 3为本发明网络认证服务系统实施例二结构示意图;
图 4为本发明网络认证服务系统实施例中拦截模块网络关系示意图; 图 5为本发明网络认证服务方法实施例一流程图;
图 6为本发明网络认证服务方法实施例二流程图;
图 7为本发明网络认证服务方法实施例中认证流程图。
具体实施方式
下面结合附图和具体实施例进一步说明本发明的技术方案。
请参阅图 1, 图 1为本发明网络认证服务系统实施例一结构示意图, 该实 施例包括:
网络服务安全装置 11和认证服务器 12。 网络服务安全装置 11用于拦截 网络应用层交互的报文; 认证服务器 12用于对拦截后的报文进行认证处理。 参见图 2, 为与本发明网络认证服务系统实施例一对应的网络协议关系示意 图。 本实施例中的网络安全装置具体为 Web服务安全装置, 所述 Web服务安 全装置对应的协议 WS-Defy 是在现有网络服务安全规范 (Web Services Security , 以下简称 WS-Security )之上的一种扩展, WS-Security对应于 OSI ( Open System Interconnection Reference Model,开放系统互连参考模型 )的应 用层 , 建立在简单对象接入协议( Simple Object Access Protocol , 以下简称
SOAP )标准规范上, WS-Security使用 XML ( Extensible Markup Language, 扩展标记语言)通过创建对特定方唯一的数字签名来帮助验证数据是否发自特 定方, 从而可以确保消息的完整性, 消息在传输过程中未被修改, 同时, 使用 XML加密可以使 SOAP消息的一部分保密, 提供消息机密性。 如, 应用层的 Web服务客户端和 Web服务服务端之间进行报文的交互, 如 Web服务客户端 向 Web服务服务端发送调用函数的请求报文, Web服务服务端向 Web服务客 户端返回相应的应 艮文等; 该系统设置于 Web服务客户端和 Web服务服务 端之间, 用于拦截 Web服务客户端和 Web服务服务端之间交互的报文, 并对 该报文进行认证处理, 如拦截 Web服务客户端向 Web服务服务端发送的请求 报文并对请求报文进行认证处理, 拦截 Web服务服务端向 Web服务客户端发 送的应 ^艮文并对应答报文进行认证处理。
其中, 网络服务安全装置 11可以具体包括: 客户端拦截模块 111 , 服务 端拦截模块 112;客户端拦截模块 111用于拦截 Web服务客户端发送和接收的 报文; 服务端拦截模块 112用于拦截 Web服务服务端接收和发送的报文。 认 证服务器 12对客户端拦截模块 111和服务端拦截模块 112拦截的报文进行认 证处理。 Web服务在发送和接收 SOAP报文前拥有多个阶段,每个阶段都可以 注册拦截(Handler ), 对 SOAP报文进行前置和后置处理的加工操作。 Web服 务发送 SOAP报文时, 通过发送拦截模块(OutHandler ), 对 SOAP报文进行 加密、 签名、 添加用户身份信息等后置处理操作。 而在接收 SOAP报文时, 则 通过接收拦截模块 ( InHandler )对 SOAP报文进行解密、验证签名, 用户身份 认证等前置操作。 请求和响应的 SOAP 报文在发送之前可以通过注册的 OutHandler进行加工处理, 让 SOAP报文转换为 WS-Security的保护格式。 而 Web服务服务端或 Web服务客户端在接收 SOAP报文之前, 可以通过注册的 行处理。 这些操作完全独立于业务处理逻辑, 实施 WS-Defy对于 Web服务的 业务操作是透明的。
本实施例通过对 Web服务发送或接收的报文进行拦截, 并且可对拦截后 的报文进行安全鉴权和认证, 实现安全认证的多样化, 并且通过认证服务器进 行认证, 可以结合企业的单点登录(Single Sign On, SSO )认证方案, 将认证
服务器设置于单点登录服务器, 实现统一安全认证。 并且, 由于本实施例采用
XML加密, 对应于应用层, 可以只对 SOAP报文头进行加密, 而不需对整个 SOAP报文进行加密, 因此可以实现部分数据的加密, 并且不依赖传输层实现 安全传输。
请参阅图 3 , 图 3为本发明网络认证服务系统实施例二结构示意图, 并参 照图 4所示的网络关系示意图,相比于实施例一,该实施例的客户端拦截模块 111具体包括客户端发送拦截模块 1111和客户端接收拦截模块 1112; 服务端 拦截模块 112具体包括服务端接收拦截模块 1121和服务端发送拦截模块 1122。 客户端发送拦截模块 1111用于拦截网络服务客户端发送的请求报文, 向认证 服务器 12获取第一认证码, 并根据该第一认证码对所述请求报文进行加密处 理得到加密报文; 服务端接收拦截模块 1121用于拦截网络服务服务端接收的 加密报文, 并发送用于认证所述加密报文的服务验证消息给认证服务器 12, 认证服务器 12根据该服务验证消息对拦截的该加密报文进行认证; 服务端发 送拦截模块 1122用于拦截网络服务服务端发送的应^艮文, 向认证服务器 12 获取第二认证码, 并用该第二认证码封装所述应答报文得到认证报文;客户端 接收拦截模块 1112用于拦截网络服务客户端接收的认证报文, 并发送用于对 所述认证报文进行认证的客户验证消息给认证服务器 12, 认证服务器 12根据 该客户验证消息对拦截的认证报文进行认证。
本实施中的客户端、服务端采用不同的模块对接收、发送的报文分别进行 拦截处理, 由于对接收、发送的报文分开处理, 有利于提高设备使用时的灵活 性。
请参阅图 5, 图 5为本发明网络认证服务方法实施例一流程图, 该方法主 要包括: 拦截应用层交互的报文, 并对拦截后的报文进行认证处理, 具体实现 为:
步骤 51 : Web服务安全装置(如, 客户端发送拦截模块)拦截 Web服务 客户端发送的请求报文;
步骤 52: Web服务安全装置(如, 客户端发送拦截模块) 为所述请求报 文进行加密处理(如, 向认证服务器申请认证码并将该认证码匹配给该请求报 文)得到加密报文 , 并将该加密报文发送给 Web服务服务端;
步骤 53: Web服务安全装置(如, 服务端接收拦截模块)接收加密报文 (实际应用中, 加密报文可以直接发送给 Web服务端, 但由于该加密报文要 进行认证 ,因此在加密报文中可增加回调函数以使该加密报文回调到服务端接 收拦截模块处, 以便进一步的认证), 并通过认证服务器对该接收的加密报文 进行认证处理;
步骤 54: Web服务安全装置(如, 服务端接收拦截模块)解密通过认证 的加密 文。
本实施例能够对 Web服务客户端和 Web服务服务端之间交互的报文进行 拦截, 进而对拦截后的报文进行认证等相关安全处理, 实现报文的安全传输。
请参阅图 6, 图 6为本发明网络认证服务方法实施例二流程图, 该方法包 括:
步骤 60: Web服务客户端发送 SOAP请求报文;
步骤 61 : 客户端发送拦截模块(客户端 OutHandler )对接收到的 SOAP 请求报文进行拦截处理;
其中, 根据 WS-Security的规定, 该请求报文包括报文体和报文头, 报文 头中包括客户端配置的用户帐号等信息。 在 Web服务客户端实现拦截可以通 过配置的方式, 如可以通过在 Web服务中注册 OutHandler服务, 当 Web服务 客户端向 Web服务服务端发送 SOAP请求报文时, 根据配置文件, 客户端 OutHandler将实现拦截此请求报文。 OutHandler服务对客户端发送的 SOAP请 求报文进行前置处理,添加 WS-Security信息和导入必要的配置信息和类文件。 因此使用 DOMOutHandler将 DOM ( Document Object Model, 文档对象模型 ) 转换为 STAX ( Streaming API for XML ) 的流模型, 此外通过定义一个 WSS4JOutHandler完成在 SOAP头添加认证信息的操作,此客户端 OutHandler 能够连通认证服务器以进行认证信息的请求和应答。
步骤 62: 客户端发送拦截模块拦截该请求报文后, 向认证服务器发送用 于获取第一认证码的申请消息;
步骤 63: 客户端发送拦截模块利用根据申请消息获取的第一认证码对拦 截后的请求报文进行加密封装并发送;
其中,加密报文的形成具体可以包括以下步骤:客户端拦截模块从认证服
务器获取第一认证码并自生成随机数(步骤 631 ); 根据所述请求报文中携带 的用户帐号查询出用户密码(步骤 632 ); ^居所述认证码、 随机数、 用户帐 号、用户密码和所述请求报文的报文体生成第一应答串, 并用所述第一应答串 和用户帐号加密封装所述请求报文(步骤 633 )。 对应于上述对拦截的报文进 行加密的步骤可以为:
第一步: 认证服务器根据客户端发送拦截模块发送的申请请求, 向客户端 发送拦截模块发送第一认证码,第一认证码包括随机数 nonce和随机串 realm; 第二步,客户端发送拦截模块自生成一随机数 cnonce,并根据用户帐号查 询出用户密码;
第三步, 根据 Web服务服务端和 Web服务客户端约定的算法生成第一应 答串 ( response 1 );
其中, 第一应答串的生成步骤为:
1、将用户帐号 +realm+用户密码进行 md5散列,再进行十六进制编码(小 写), 生成 keyl。
2、 先将请求报文的报文体进行 md5散列, 并将散列的结果进行十六进制 字符编码, 生成 key2。
3、 将 keyl + ":,, + nonce + ":" + cnonce + ":" + key2进行 md5散 列, 再将散列的结果进行十六进制字符编码, 生成最终的第一应答串。
第四步, 用生成的第一应答串重新封装 SOAP请求报文, 封装后的 SOAP 报文头中至少包括第一应答串和用户帐号;
第五步, 将封装后的 SOAP报文发送给 Web服务服务端。
步骤 64: 服务端接收拦截模块(服务端 InHandler )拦截客户端发送拦截 模块发送给 Web服务服务端的加密报文(由于实际应用中加密报文通常会发 给 Web 服务服务端, 为了对加密报文进行验证, 因此需要回调到服务端 InHandler, 也可以通过配置将加密报文直接发给服务端 InHandler, 此时不需 要回调)。 在此之前包括: 服务端接收拦截模块从 Web服务服务端回调加密的 请求报文(步骤 641 )。 相似于在 Web服务客户端进行的 OutHandler配置, 因 为 Web服务服务端同样需要拦截, 因此 Web服务服务端要进行 InHandler配 置 , 具体可以为: Web月良务月良务端创建一个 applicationContext-ws-security.xml
文件, 让 Web服务拥有认证和拦截功能。 此配置文件主要配置 Web服务的名 称、 负责将 STAX流模型的 SOAP转换为 DOM模型、 认证或鉴权的方式、 导 入的必要类、 回调实现类以实现将加密的请求报文从 Web服务端回调至服务 端 InHandler处。此 InHandler能够连通认证服务器以进行认证信息的请求和应 答。
步骤 65: 认证服务器根据服务端接收拦截模块(服务端 InHandler )发送 的服务验证消息对加密报文进行认证;
其中, 服务验证消息的形成具体包括:
步骤 651 : 服务端接收拦截模块根据该回调的加密报文中携带的用户帐号 向认证模块查询获取上述第一认证码, 该第一认证码为 nonce和 realm;
步骤 652: 认证服务器向服务端接收拦截模块发送第一认证码, 然后失效 原来的第一认证码 nonce, 并生成存储新的第二认证码 nextnonce;。
步骤 653: 服务端接收拦截模块根据所述用户帐号查询出用户密码; 步骤 654: 服务端接收拦截模块根据上述第一认证码(nonce和 realm )、 用户帐号、用户密码和回调的加密报文的报文体生成第二应答串(response2 ); 其中, 第二应答串的生成方法与第一应答串的生成方法原理相同, 只是在 生成第一应答串时是对请求报文的报文体进行散列 ,在生成第二应答串时是对 回调的加密报文的报文体进行散列。
步骤 655: 服务端接收拦截模块将回调的加密报文中携带的第一应答串和 上述生成的第二应答串添加进服务验证消息中, 并发送给认证服务器;
认证服务器认证过程具体为:认证服务器通过比较所述第一应答串和第二 应答串是否相同来判断加密报文是否通过认证,若第一应答串和第二应答串相 同, 则表明通过认证, 否则表明未通过认证, 对于通过认证的加密报文, 执行 步骤 656, 对于未通过认证的加密报文, 执行步骤 657。
步骤 656: 认证服务器向服务端接收拦截模块发送验证通过的消息, 并指 示服务端接收拦截模块解密通过认证的加密报文;
步骤 657: 认证服务器向 Web服务客户端发送请求认证未通过之类的提 示, 结束流程。
上述流程实现了 Web服务服务端对 Web服务客户端发送的 SOAP请求报
文的认证鉴权, 之后 Web服务服务端需要向 Web服务客户端发送应 艮文, Web服务客户端同样可实现对应 艮文的鉴权,因此本实施例在上述流程之后 还可以包括:
步骤 66: Web服务服务端发送认证报文, 所述认证报文对与上述请求报 文相应的应答报文添加认证获得的;
其中, 认证报文的获得具体包括:
步骤 661: Web服务服务端返回与上述请求报文相应的应 艮文; 步骤 662: 服务端发送拦截模块(服务端 OutHandler )拦截该应 艮文; 步骤 663: 服务端发送拦截模块向认证服务器获取第二认证码 nextnonce; 步骤 664: 服务端发送拦截模块将该第二认证码添加到应答报文的报文头 中, 得到认证报文;
步骤 67: 客户端接收拦截模块(客户端 InHandler )拦截该认证报文;
其中,该认证报文可以通过配置直接发送到客户端接收拦截模块,也可以 先发送给 Web服务客户端, 再从 Web服务客户端回调给该客户端接收拦截模 块。
步骤 68: 客户端接收拦截模块发 户验证消息给认证服务器; 其中, 所述客户验证消息包括所述认证报文中携带的第二认证码 nextnonce,, 若认证报文未被修改, 则认证码 nextnonce与认证服务器中存储的 相同, 若认证报文被更改, 则认证报文中携带的认证码也将被更改。
步骤 69: 认证服务器通过比较所述客户验证消息中的第二认证码和自身 存储的第二认证码 nextnonce是否相同来判断所述请求报文的应 艮文是否通 过认证 ,若客户端接收拦截模块发送的第二认证码和认证服务器存储的第二认 证码相同, 则表明认证报文未被篡改, 即 Web服务服务端发送的应 艮文通 过认证, 执行步骤 691, 否则表明未通过认证, 执行步骤 692;
步骤 691:认证服务器指示客户端接收拦截模块向 Web服务客户端发送解 密后的认证报文, 即发送所述请求报文的应 艮文;
步骤 692: 认证服务器向 Web服务客户端发送应答认证未通过之类的提 示。
上述流程示出了 SOAP报文从 Web服务客户端到 Web服务服务端、 Web
服务服务端认证、 Web服务服务端返回应答报文、 Web服务客户端认证的整 个 SOAP报文传输过程, 针对认证服务器的认证过程可以参见图 7, 图 7为本 发明网络认证服务方法实施例中认证流程图, 该认证流程包括:
步骤 71 : 客户端发送拦截模块(客户端 OutHandler ) 向认证服务器请求 第一认证码;
步骤 72: 客户端 OutHandler接收该第一认证码。 将该第一认证码匹配给 请求报文后实现对请求报文的加密;
步骤 73: 服务端接收拦截模块(服务端 InHandler )接收到加密报文后, 向认证服务器发送确认第一认证码的请求,即用于认证接收到的加密报文是否 被篡改;
步骤 74: 认证服务器根据服务端 InHandler发送的信息对加密报文进行认 证, 并返回相应的结果;
步骤 75: 服务端发送拦截模块(服务端 OutHandler ) 向认证服务器请求 第二认证码, 得到认证报文;
其中, 如加密报文是有效的(通过认证), 服务端向客户端返回应 艮文, 类似于客户端发送请求报文,服务端对发送的应答报文添加认证, 以使客户端 可以验证接收的报文是否被篡改。 因此, 在返回应 艮文时, 服务端可以将第 二认证码添加给应 艮文得到认证报文,客户端接收到该认证报文后要进行认 证, 如确认第二认证码。
步骤 76: 认证服务器返回第二认证码, 以使服务端 OutHandler对应答报 文添力口认证 ^
步骤 77: 客户端接收拦截模块(客户端 InHandler )发送确认第二认证码 的请求给认证服务器;
步骤 78: 认证服务器返回相应的认证结果。
本实施例中的认证方式是采用用户帐号和用户密码的方式, 可替代的是, 对拦截后的报文也可以采用数字签名认证、 指纹认证等。 并且, 本实施例为了 实现灵活的认证方式,客户端拦截模块和服务端拦截模块分为了接收和发送两 个模块, 可替代的是客户端和服务端分别用一个拦截模块,或者客户端和服务 端共用一个拦截模块, 实现拦截>¾文的功能。
本实施例通过扩展 WS-Security安全规范, 即采用对 SOAP 文进行拦截 的方式, 可以实现 Web服务安全认证方式多样化; 本实施例通过认证模块进 行认证, 可以结合企业的单点登录(Single Sign On, SSO )认证方案, 将认 证模块设置于单点登录服务器, 实现统一安全认证; 本实施例并没有采用加密 的传输层协议,如传输层的 HTTPS协议,保证了 Web服务与传输层的无关性, 并且, 采用 WS-Security中的 XML进行数据交换, 可以只对 SOAP报文头进 行加密, 而不需对整个 SOAP报文进行加密, 这些都节省了性能开销; 本实施 例的客户端和服务端设置有拦截模块,可以通过拦截模块对业务进行安全方面 的特殊处理, 如日志审议、 数据包压缩等。
需要说明的是,本领域普通技术人员可以理解实现上述实施例方法中的全 部或部分流程,是可以通过计算机程序指令相关的硬件来完成, 所述的程序可 存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的 实施例的流程。 其中, 所述的存储介质可为磁碟、 光盘、 只读存储记忆体
( Read-Only Memory, ROM )或随才 储记忆体 ( Random Access Memory, RAM )等。
最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而非对其限 制; 尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员 应当理解: 其依然可以对前述各实施例所记载的技术方案进行修改,或者对其 中部分技术特征进行等同替换; 而这些修改或者替换, 并不使相应技术方案的 本质脱离本发明各实施例技术方案的精神和范围。
Claims
1、 一种网络认证服务系统, 其特征在于, 对应于网络应用层, 包括: 网络服务安全装置, 用于拦截网络应用层交互的报文;
认证服务器, 用于对所述网络服务安全装置拦截后的报文进行认证处理。
2、 根据权利要求 1所述的系统, 其特征在于, 所述网络服务安全装置包 括:
客户端拦截模块 , 用于拦截网络服务客户端发送和接收的报文;
服务端拦截模块, 用于拦截网络服务服务端接收和发送的报文。
3、根据权利要求 2所述的系统, 其特征在于, 所述客户端拦截模块包括: 客户端发送拦截模块和客户端接收拦截模块, 其中,
所述客户端发送拦截模块, 用于拦截网络服务客户端发送的请求报文, 向 所述认证服务器获取第一认证码 , 并根据所述第一认证码加密所述请求报文 , 得到加密报文;
所述客户端接收拦截模块, 用于拦截网络服务客户端接收的认证报文, 并 发送对所述认证报文进行认证的客户验证消息给所述认证服务器,以便所述认 证服务器根据所述客户验证消息对拦截的认证报文进行认证。
4、 根据权利要求 2所述的网络认证服务系统, 其特征在于,
所述服务端拦截模块包括: 服务端接收拦截模块和服务端发送拦截模块, 其中,
所述服务端接收拦截模块, 用于拦截网络服务服务端接收的加密报文, 并 发送用于认证所述加密报文的服务验证消息给所述认证服务器,以便由认证服 务器根据所述服务验证消息对拦截的加密报文进行认证;
所述服务端发送拦截模块, 用于拦截网络服务服务端发送的应 艮文, 向 所述认证服务器获取第二认证码, 并用所述第二认证码封装所述应^艮文,得 到认证报文。
5、 一种网络认证服务方法, 其特征在于, 包括:
拦截网络应用层的请求报文;
对所述请求报文进行加密处理, 得到加密报文, 并发送所述加密报文; 接收加密4艮文, 对接收的加密 文进行认证处理;
对通过认证的加密 ^艮文进行解密。
6、 根据权利要求 5所述的方法, 其特征在于, 所述对请求报文进行加密 处理, 得到加密报文包括:
发送用于获取第一认证码的申请消息;
根据所述申请消息获取第一认证码, 并生成随机数;
根据所述请求报文中携带的用户帐号查询出用户密码;
根据所述第一认证码、 随机数、 用户帐号、 用户密码和所述请求报文的报 文体生成第一应答串, 并用所述第一应答串和用户帐号加密封装所述请求报 文, 得到所述加密报文。
7、 根据权利要求 6所述的方法, 其特征在于, 所述对加密报文进行认证 处理包括:
根据所述加密报文中携带的用户帐号获取所述第一认证码和用户密码; 根据所述第一认证码、用户帐号、用户密码和接收的加密报文的报文体生 成第二应答串;
如果所述第一应答串和第二应答串相同, 则所述接收的加密报文通过认 证,如果所述第一应答串和第二应答串不相同, 则所述接收的加密报文未通过 认证。
8、 根据权利要求 5所述的方法, 其特征在于, 所述方法还包括: 拦截与所述加密报文相对应的应^艮文;
为所述应答报文添加认证, 得到认证4艮文;
对所述认证 文进行认证处理;
对通过认证的所述认证报文进行解密。
9、根据权利要求 8所述的方法, 其特征在于, 所述为应答报文添加认证, 得到认证报文包括:
生成并存储第二认证码;
用所述第二认证码封装所述应答报文, 得到认证报文。
10、根据权利要求 9所述的方法, 其特征在于, 所述对认证报文进行认证 处理具体为:
如果所述认证报文中携带的第二认证码和存储的第二认证码相同,则所述
认证报文通过认证,如果所述认证报文中携带的第二认证码和存储的第二认证 码不相同 , 则所述认证^艮文未通过认证。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/885,216 US20110035582A1 (en) | 2008-03-17 | 2010-09-17 | Network authentication service system and method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810102058.1A CN101247407B (zh) | 2008-03-17 | 2008-03-17 | 网络认证服务系统和方法 |
CN200810102058.1 | 2008-03-17 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/885,216 Continuation US20110035582A1 (en) | 2008-03-17 | 2010-09-17 | Network authentication service system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009115017A1 true WO2009115017A1 (zh) | 2009-09-24 |
Family
ID=39947605
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/070753 WO2009115017A1 (zh) | 2008-03-17 | 2009-03-12 | 网络认证服务系统和方法 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20110035582A1 (zh) |
CN (1) | CN101247407B (zh) |
WO (1) | WO2009115017A1 (zh) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247407B (zh) * | 2008-03-17 | 2013-03-13 | 华为技术有限公司 | 网络认证服务系统和方法 |
US8375211B2 (en) * | 2009-04-21 | 2013-02-12 | International Business Machines Corporation | Optimization of signing soap body element |
CN101860549B (zh) * | 2010-06-25 | 2013-03-27 | 山东中创软件商用中间件股份有限公司 | 一种Web Service下访问会话数据处理方法及装置 |
EP3536241B1 (en) * | 2011-04-08 | 2023-03-29 | Dexcom, Inc. | Systems and methods for processing and transmitting sensor data |
CN103812838A (zh) * | 2012-11-13 | 2014-05-21 | 中国移动通信集团公司 | 一种服务调用方法和设备及系统 |
CN103179127B (zh) * | 2013-03-28 | 2016-03-02 | 华为技术有限公司 | 一种处理消息的方法、装置及系统 |
CN103607374A (zh) * | 2013-10-28 | 2014-02-26 | 中国航天科工集团第二研究院七〇六所 | 基于身份认证和数据包过滤技术的网络资源访问控制方法 |
AU2014346795A1 (en) | 2013-11-07 | 2016-03-10 | Dexcom, Inc. | Systems and methods for transmitting and continuous monitoring of analyte values |
CN103841105B (zh) * | 2014-03-04 | 2017-02-08 | 上海地慧光电科技有限公司 | 一种网络用户验证授权系统 |
CN104954124B (zh) * | 2014-03-28 | 2018-02-23 | 华为技术有限公司 | 加密和解密数据处理方法、装置和系统 |
CN104333556B (zh) * | 2014-11-14 | 2017-09-15 | 成都卫士通信息安全技术有限公司 | 基于资源服务管理系统安全认证网关分布式配置管理方法 |
CN104394080A (zh) * | 2014-11-28 | 2015-03-04 | 杭州华三通信技术有限公司 | 实现安全组功能的方法及装置 |
JP6739036B2 (ja) * | 2015-08-31 | 2020-08-12 | パナソニックIpマネジメント株式会社 | コントローラ |
CN105591928B (zh) * | 2015-09-15 | 2018-09-21 | 中国银联股份有限公司 | 用于云平台网络的安全控制方法 |
CN106549757B (zh) * | 2015-09-21 | 2020-03-06 | 北大方正集团有限公司 | Web服务的数据真伪识别方法、服务端和客户端 |
CN105530127B (zh) * | 2015-12-10 | 2019-02-01 | 北京奇虎科技有限公司 | 一种代理服务器处理网络访问请求的方法和代理服务器 |
US11329831B2 (en) * | 2016-06-08 | 2022-05-10 | University Of Florida Research Foundation, Incorporated | Practical end-to-end cryptographic authentication for telephony over voice channels |
CN106506552B (zh) * | 2016-12-28 | 2020-04-03 | 北京奇艺世纪科技有限公司 | 一种http请求传输方法及装置 |
CN108259406B (zh) * | 2016-12-28 | 2020-12-29 | 中国电信股份有限公司 | 检验ssl证书的方法和系统 |
US20210212619A1 (en) * | 2020-01-13 | 2021-07-15 | Paxmentys, LLC | Cognitive Readiness Determination and Control System and Method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN200941622Y (zh) * | 2006-06-19 | 2007-08-29 | 福建星网锐捷网络有限公司 | 一种网络认证授权系统及使用的交换机 |
CN101075869A (zh) * | 2006-05-18 | 2007-11-21 | 中兴通讯股份有限公司 | 网络认证的实现方法 |
CN101098221A (zh) * | 2006-06-26 | 2008-01-02 | 华为技术有限公司 | 一种无线蜂窝网络中网络层安全认证方法 |
CN101247407A (zh) * | 2008-03-17 | 2008-08-20 | 华为技术有限公司 | 网络认证服务系统和方法 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6996714B1 (en) * | 2001-12-14 | 2006-02-07 | Cisco Technology, Inc. | Wireless authentication protocol |
US20050044377A1 (en) * | 2003-08-18 | 2005-02-24 | Yen-Hui Huang | Method of authenticating user access to network stations |
KR100576722B1 (ko) * | 2003-12-26 | 2006-05-03 | 한국전자통신연구원 | 웹서비스에 대한 메시지 보안 처리 시스템 및 방법 |
CN1801805A (zh) * | 2005-01-07 | 2006-07-12 | 华为技术有限公司 | 解决IPv6网络中应用层协议安全问题的方法 |
US20070083918A1 (en) * | 2005-10-11 | 2007-04-12 | Cisco Technology, Inc. | Validation of call-out services transmitted over a public switched telephone network |
CN100488168C (zh) * | 2005-12-13 | 2009-05-13 | 华为技术有限公司 | 一种对应用层报文进行安全封装的方法 |
-
2008
- 2008-03-17 CN CN200810102058.1A patent/CN101247407B/zh active Active
-
2009
- 2009-03-12 WO PCT/CN2009/070753 patent/WO2009115017A1/zh active Application Filing
-
2010
- 2010-09-17 US US12/885,216 patent/US20110035582A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101075869A (zh) * | 2006-05-18 | 2007-11-21 | 中兴通讯股份有限公司 | 网络认证的实现方法 |
CN200941622Y (zh) * | 2006-06-19 | 2007-08-29 | 福建星网锐捷网络有限公司 | 一种网络认证授权系统及使用的交换机 |
CN101098221A (zh) * | 2006-06-26 | 2008-01-02 | 华为技术有限公司 | 一种无线蜂窝网络中网络层安全认证方法 |
CN101247407A (zh) * | 2008-03-17 | 2008-08-20 | 华为技术有限公司 | 网络认证服务系统和方法 |
Also Published As
Publication number | Publication date |
---|---|
CN101247407A (zh) | 2008-08-20 |
US20110035582A1 (en) | 2011-02-10 |
CN101247407B (zh) | 2013-03-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009115017A1 (zh) | 网络认证服务系统和方法 | |
US9565180B2 (en) | Exchange of digital certificates in a client-proxy-server network configuration | |
US7900247B2 (en) | Trusted third party authentication for web services | |
US8825999B2 (en) | Extending encrypting web service | |
US8340283B2 (en) | Method and system for a PKI-based delegation process | |
US7305548B2 (en) | Using atomic messaging to increase the security of transferring data across a network | |
US7979707B2 (en) | Secure seed generation protocol | |
US20090119504A1 (en) | Intercepting and split-terminating authenticated communication connections | |
US20120054491A1 (en) | Re-authentication in client-server communications | |
WO2010078755A1 (zh) | 电子邮件的传送方法、系统及wapi终端 | |
US11411731B2 (en) | Secure API flow | |
US11811739B2 (en) | Web encryption for web messages and application programming interfaces | |
TW201537937A (zh) | 統一身份認證平臺及認證方法 | |
US20170317836A1 (en) | Service Processing Method and Apparatus | |
WO2007073623A1 (fr) | Procede de telechargement d'une certification et d'une cle numeriques | |
CN104579657A (zh) | 身份认证方法及装置 | |
KR20220128615A (ko) | 콘텐츠 배포 네트워크에서 보안 정보의 전송 | |
CN116074129B (zh) | 一种集成与兼容第三方认证的登录方法及系统 | |
US20240250815A1 (en) | Scalable key state for network encryption | |
WO2016141513A1 (zh) | 业务处理方法及装置 | |
Longhua | A novel design of otp-based authentication scheme using smart phones and 2-d barcodes for the visually impaired | |
Wang et al. | A solution of mobile e-commerce security problems | |
Giron | Hybrid post-quantum cryptography in network protocols | |
Mavrogiannopoulos et al. | The GnuTLS manual | |
CN116017346A (zh) | 一种v2x通信方法及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09721209 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09721209 Country of ref document: EP Kind code of ref document: A1 |