WO2011144081A2 - 用户业务鉴权方法、系统及服务器 - Google Patents

用户业务鉴权方法、系统及服务器 Download PDF

Info

Publication number
WO2011144081A2
WO2011144081A2 PCT/CN2011/074662 CN2011074662W WO2011144081A2 WO 2011144081 A2 WO2011144081 A2 WO 2011144081A2 CN 2011074662 W CN2011074662 W CN 2011074662W WO 2011144081 A2 WO2011144081 A2 WO 2011144081A2
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
network
user
service
server
Prior art date
Application number
PCT/CN2011/074662
Other languages
English (en)
French (fr)
Other versions
WO2011144081A3 (zh
Inventor
郑洪伟
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2011/074662 priority Critical patent/WO2011144081A2/zh
Priority to CN201180000686.9A priority patent/CN102217280B/zh
Publication of WO2011144081A2 publication Critical patent/WO2011144081A2/zh
Publication of WO2011144081A3 publication Critical patent/WO2011144081A3/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a user service authentication method, system, and server. Background technique
  • Cross-network service is an integrated service based on different network technologies, such as network services based on telecommunication networks and Internet technologies, and instant messaging (IMPS) services provided in an IP Multimedia Subsystem (IMS) network in practical applications.
  • IMS IP Multimedia Subsystem
  • CALL call
  • SNS social network service
  • SNS network disk service
  • the existing user service authentication method is a network in the cross-network system.
  • the service server authenticates the user and modifies the components of other networks to adapt to the authentication mode of the network service server.
  • SSO Single Sign On
  • HSS Home Subscriber Server
  • the original SNS must be modified.
  • the components are adapted to the authentication mode of the IMS service, that is, the SNS device is required to support the protocol related to the IMS system.
  • the existing user service authentication method of the cross-network only one type of user authentication of the network is performed, and when the network component is modified to complete the user service authentication of the cross-network service, the specific protocol and the authentication method are different. Different, the user service authentication mode of the cross-network service is complicated.
  • the embodiments of the present invention provide a user service authentication method, a system, and a server, which implement a user service authentication implementation method for cross-network services, and enhance reliability.
  • An embodiment of the present invention provides a user service authentication method, including:
  • An embodiment of the present invention provides a server, including:
  • a request receiving unit configured to receive a user access request sent by the client to access a cross-network service, where the user access request includes a user identifier
  • An authentication obtaining unit configured to obtain authentication information corresponding to each network in the user access request received by the request receiving unit in a cross-network system
  • An authentication sending unit configured to send authentication information of each network obtained by the authentication obtaining unit to the client, so that the client sends the network service to the network system according to the authentication information
  • the server initiates a user service authentication process.
  • An embodiment of the present invention provides a client, including:
  • a request sending unit configured to send a user access request for accessing a cross-network service to a service authentication server in a cross-network system, where the user access request includes a user identifier;
  • An authentication receiving unit configured to receive, by the service authentication server, authentication information corresponding to each network of the user identifier in the cross-network system;
  • the authentication initiation unit is configured to initiate a user service authentication process to the network service server in the cross-network system according to the authentication information received by the authentication receiving unit.
  • the embodiment of the present invention further provides a user service authentication system, including a client, a service authentication server, and at least two network service servers, where:
  • the client includes:
  • a request sending unit configured to send a user access request for accessing a cross-network service to a service authentication server in a cross-network system, where the user access request includes a user identifier
  • an authentication receiving unit configured to receive the The authentication information obtained by the service authentication server is corresponding to the authentication information of each network in the network system; the authentication initiation unit is configured to use the authentication information received by the authentication receiving unit to the cross-network system.
  • the network service server initiates a user service authentication process
  • the service authentication server includes:
  • a request receiving unit configured to receive a user access request sent by the client to access the cross-network service, where the user access request includes a user identifier
  • an authentication obtaining unit configured to acquire the request
  • the user identifier in the user access request received by the receiving unit is the authentication information corresponding to each network in the cross-network system
  • the authentication sending unit is configured to send the authentication information of each network obtained by the authentication acquiring unit to the Describe a client, so that the client initiates a user service authentication process to the network service server in the cross-network system according to the authentication information
  • the network service server is configured to authenticate a user service when the client initiates a user service authentication process.
  • the embodiment of the present invention mainly adds a service authentication server to the system.
  • the service authentication server receives the user access request sent by the client to access the cross-network service, the user access request includes the user identifier, respectively. Acquiring the authentication information corresponding to each network of the user identifier in the cross-network system; and sending the obtained authentication information included in the authentication response of each network to the client, so that the client initiates the user service authentication process.
  • the authentication information corresponding to each network of the user identifier in the cross-network system is obtained, thereby completing the authentication process of each network separately, without modifying the network component to adapt to one of the networks.
  • the user service authentication implementation mode of the cross-network service is implemented; and in this embodiment, the client may initiate a user service authentication process to each network service server in the cross-network system, instead of only performing A user authentication of the network enhances reliability.
  • FIG. 1 is a schematic structural diagram of a user service authentication system according to an embodiment of the present invention.
  • FIG. 2 is a flowchart of a user service authentication method according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of a user service authentication method according to a specific application embodiment of the present invention
  • FIG. 4 is a schematic structural diagram of a server according to an embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of another server according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of a client according to an embodiment of the present invention.
  • the embodiment of the present invention provides a user service authentication method.
  • the method in this embodiment is applicable to a cross-network system as shown in FIG. 1.
  • the system includes a client, a service authentication server, and at least two network service servers.
  • the method of the embodiment is a method performed by the service authentication server.
  • the method flowchart is as shown in FIG. 2, and includes:
  • the process of this embodiment may be initiated by the user through any client, and specifically, may be sent to the service authentication server through a browser or a mobile terminal software system on a terminal such as a personal computer (PC) or a mobile terminal.
  • the user access request is used to request access to cross-network services, such as SNS services in an IMS system.
  • the user access request may include the user identifier of the user, that is, the identifier information used to uniquely identify the user, and may be information such as a user account or a user ID number.
  • the service authentication server Obtaining, by the service authentication server, the authentication information corresponding to each network in the cross-network system; after receiving the user access request, the service authentication server needs to perform service authentication on the user, as requested by the user access request.
  • It is a cross-network service that is, a service based on multiple network technologies.
  • the service authentication server needs to obtain the authentication information of each network corresponding to the user identifier.
  • the authentication information here is information used by the client to initiate user service authentication to each network in the cross-network system, such as SSO code used for authentication of the Internet authentication center in the network system; telecommunication network
  • the HSS server performs information such as the telecommunication service account and password used for authentication.
  • the authentication information may include account and password information stored in the service server when the user subscribes to the service in the network system, and the authentication information may further include user setting parameter information and capability information of the network service server.
  • the HSS server of the telecommunication network stores the telecommunication service account and password stored in the HSS server when the user subscribes to the telecommunication service, and may further include other information such as user setting information.
  • the service authentication server may be obtained from each network service server of the cross-network system, or may be generated by the service authentication server, or may be obtained by other methods.
  • the process of obtaining the body does not limit the invention.
  • the network service server can perform authentication on the user service, such as an HSS server based on the telecommunication network technology, and an authentication mechanism based on the Internet technology, such as authentication authorization. , ⁇ ) month server, etc.
  • the authentication information of each network acquired in step 102 is sent to the client, so that the client initiates a user service authentication process to the network service server in the cross-network system according to the authentication information.
  • the service authentication server After the service authentication server obtains the authentication information of each network, the authentication information may be sent to the client. Specifically, the service authentication server may assemble the authentication information of each network into an extensible markup language (Extensible Markup). The message body of the Language, XML, or JavaScript Object Notation (JSON) is encrypted and sent to the client. The encryption can be performed by using a symmetric encryption algorithm.
  • extensible markup language Extensible Markup
  • JSON JavaScript Object Notation
  • the telecommunication service account and password, and the HSS server address information of the telecommunication network may be included, and the user setting parameter information and the telecommunication network may also be included.
  • the capability information of the HSS server, etc.; for the Internet, the SSO code may be included, and other ticket information may be included, such as the domain name of the issued ticket, the validity period of the ticket, and the start time of the ticket.
  • the client may initiate a user service authentication process to each network service server according to the authentication information of each network. Specifically, the client may send the information such as the telecommunication service account and the password to the HSS server through the registration request according to the HSS server address information of the telecommunication network in the authentication information; the HSS server verifies the authentication information included in the registration request, Thereby, the user service authentication process is completed, and the registration result can be returned to the client, and the result of the user service authentication can be included in the registration result.
  • the client may carry the SSO code of the internetwork in the authentication information in the access message to the service server of the internetwork, and send it to the network service server of the internetwork; the SSO code in the access message of the network service server of the internetwork
  • the verification is performed, or the SSO code is sent to the authentication center for verification by the network service server, and the authentication result can be returned to the client.
  • the service authentication server is added to the system, and the service authentication server receives the user access request sent by the client to access the cross-network service, and includes the user in the user access request. Identifying; respectively obtaining the corresponding correspondence of the user equipment in each network across the network system
  • the authentication information of each network is sent to the client, so that the client initiates the user service authentication process of each network separately.
  • the authentication information of each network in the network system is obtained by adding a service authentication server in the system, thereby completing the authentication process of each network separately, without modifying the network components to adapt to the user service authentication of one of the networks.
  • the user service authentication implementation manner of the cross-network service is implemented; and in this embodiment, the client may initiate a user service authentication process to each network service server in the cross-network system, instead of only performing one network.
  • User service authentication enhances reliability.
  • the service authentication server can obtain the following steps when performing the above step 102:
  • A sending an authentication request to the network service server of each network in the cross-network system, and including the user identifier in the authentication request;
  • the parsing authentication response obtains the authentication information corresponding to the user identifier on the corresponding certain network.
  • Some network service servers store authentication information corresponding to the user identifier, where the authentication information may include account and password information stored in the service server when the user subscribes to the service in the network system, and the authentication information may also be
  • the user setting parameter information and the capability information of the network service server for example, the HSS server of the telecommunication network stores the telecommunication service account and password stored in the HSS server when the user subscribes to the telecommunication service, and may further include user setting information. Other information.
  • the service authentication server when the service authentication server obtains the authentication information of the user identifier in the network, the service authentication request may be sent to the HSS server of the telecommunication network, and the user identifier is included in the authentication request; when the telecommunication network After receiving the authentication request, the HSS server extracts the authentication information corresponding to the user identifier in the telecommunication network in the local storage, and returns the authentication information to the service authentication server through the authentication response.
  • Some network service servers do not store authentication information. When these network service servers receive the authentication request, they generate authentication information corresponding to the user identifier. For example, the Internet authentication center generates the SSO code corresponding to the user identifier and other And the authentication information carried in the authentication response is returned to the service authentication server, where the authentication information carried in the authentication response may include the ticket code generated by the network service server for the user identifier, and may also include the network. Information on the capabilities of the business server. In this case, the service authentication server can send an authentication request to the Internet when obtaining the authentication information.
  • the authentication center of the network includes the user identifier in the authentication request; when the authentication center of the internet network receives the authentication request, the authentication information corresponding to the user identifier of the internet network is generated, and is returned to the service through the authentication response.
  • Authentication server when the authentication center of the internet network receives the authentication request, the authentication information corresponding to the user identifier of the internet network is generated, and is returned to the service through the authentication response.
  • the network service server that generates and stores the authentication information in the cross-network system does not generate the user identifier by the service authentication server when obtaining the authentication information.
  • Corresponding authentication information For example, if there is no unified Internet authentication center in the cross-network system, when the authentication information is obtained, the service authentication server may generate information such as SSO code for the user identifier, and the specific generation process and the authentication center generate the SSO code. The process is consistent and will not be repeated here.
  • the service authentication server After the service authentication server generates the SSO code and sends it to the client, when the client sends an access message including the SSO code to the network service server, and the access message further includes information such as the user identifier, the network service
  • the server receives the access request, and may authenticate the SSO code according to the user identifier included in the access request, for example, first generating an SSO code according to the user identifier, and then generating the SSO code and the SSO code in the access request. Compare to verify.
  • the user may be authenticated first, and step 102 is performed after the authentication is passed.
  • various authentication methods such as a key authentication method and a password matching method, and the user authentication information that needs to be used can be found locally. For example, if the user access request includes the user ID and the user password, the service authentication server needs to determine the user ID in the local storage and the user password corresponding to the user ID in the local storage. Matching is performed. If they match, the user authentication passes, otherwise the user authentication fails.
  • the authentication here refers to the authentication of the user by the service authentication server when the client connects to the service authentication server, and the authentication of the foregoing user requesting the cross-network service is different.
  • the cross-network service requested by the user is an SNS service added in the IMS system, and the user service authentication method is used. Specifically include:
  • the user connects to the service authentication server through the client, and the client sends a user access request to request access to the SNS service added in the IMS system, and the user access request includes the user identifier and the user password of the user.
  • the service authentication server receives the user access request and performs user authentication. If the authentication is passed, step 203 is performed. If the authentication fails, the process ends.
  • the user password in the user access request is matched with the authentication password corresponding to the user identifier in the local storage, and if they match, the user Certification passed.
  • the service authentication server sends an authentication request to the IMS network service server (which may be an HSS server) and an Internet network service server (which may be an authentication center of the Internet), and obtains the authentication information corresponding to the user identifier in the corresponding network.
  • the authentication request may include information such as the user identifier of the user.
  • the IMS network service server receives the authentication request, and finds, in the local storage, the authentication information corresponding to the user identifier in the authentication request, such as an IMS account and a password, and returns the authentication information to the service card through the authentication response.
  • the right server may further include information such as setting parameters of the user in the IMS network and capability parameter information of the IMS network service server in the authentication response.
  • the internet service server receives the authentication request, randomly generates the SSO code corresponding to the user identifier in the authentication request as the authentication information, and returns the authentication information to the service authentication server through the authentication response, and further determines the authentication response in the authentication response.
  • the information includes the ticket information generated in the process of generating the SSO code, the capability parameter information of the internet service server, and the setting parameters of the user in the internetwork.
  • the service authentication server sends the address information of the IMS network service server, and the authentication information (IMS account and password) obtained from the IMS network service server, and the authentication information (SSO code) obtained from the internet service server.
  • the address information of the IMS network service server, and the IMS account and password obtained from the IMS network service server, and the SSO code can be assembled into a message body of the message sent to the client, and sent to the client.
  • the service server can also send information such as capability parameter information and user setting parameters of the IMS and the Internet service service to the client, so that the client can access the corresponding service.
  • the client After receiving the authentication information sent by the service authentication server, the client sends a registration request to the IMS network service server according to the address information of the IMS network service server, where the registration request includes the IMS account information and the password.
  • the IMS network service server After receiving the registration request, the IMS network service server verifies the authentication information (IMS account information and password) in the registration request, and returns the registration result to the client. 208.
  • the client carries the SSO code in the access message, and sends the access message to the internet service server.
  • the Internet service server After receiving the access message, the Internet service server verifies the authentication information (SSO code) in the access message, and returns the verification result to the client.
  • the interworking network service server can be authenticated locally, or the SSO code can be sent to a third party for verification, for example, sent to an authentication center for verification.
  • step 209 There is no absolute order relationship between the above steps 206 to 208 and step 209, that is, the authentication process of the internetwork can be initiated first, and the authentication process of the telecommunication network and the internetwork can be initiated simultaneously.
  • a server provided in this embodiment of the present invention is a service authentication server, and a schematic structural diagram is shown in FIG. 4, including:
  • the request receiving unit 10 is configured to receive a user access request sent by the client to request access to the cross-network service, where the user access request includes the user identifier;
  • the authentication obtaining unit 20 is configured to obtain the authentication information corresponding to each network in the user access request received by the request receiving unit 10 in the cross-network system;
  • the authentication sending unit 30 is configured to send the authentication information of each network obtained by the authentication obtaining unit 20 to the client, so that the client sends the authentication information to the cross-network system according to the authentication information.
  • the network service server initiates a user service authentication process.
  • the authentication obtaining unit 20 acquires the user.
  • the authentication information corresponding to each network in the cross-network system is identified; and the authentication sending unit 30 sends the authentication information of each network to the client, so that the client sends a user service authentication process for each network.
  • the authentication information corresponding to each network of the user identifier in the network is obtained, thereby completing the authentication process of each network separately, without modifying the network component to adapt to the user service of one of the networks.
  • the user service authentication implementation manner of the cross-network service is implemented; and the server in this embodiment can initiate the user service authentication process to each network service server in the cross-network system, instead of only performing one User authentication of the network enhances reliability.
  • the server of the embodiment of the present invention may further include an authentication unit 40, and the authentication obtaining unit 20 may pass the authentication request sending unit 120 and the authentication response.
  • the receiving unit 220 is implemented, where:
  • the authentication unit 40 is configured to: when the request receiving unit 10 receives the user access request, perform authentication on the user, and notify the authentication obtaining unit 20 to obtain the authentication information after the authentication is passed.
  • the authentication of the authentication unit 40 is the authentication of the user by the service authentication server when the client accesses the service authentication server.
  • the user access request received by the request receiving unit 10 includes the user identifier and the user password of the user.
  • the user password is matched with the authentication password corresponding to the user identifier in the local storage, and if they match, the user authentication passes.
  • the authentication request sending unit 120 is configured to send an authentication request to the network service server of each network in the cross-network system, where the authentication request includes the user identifier;
  • the authentication response receiving unit 220 is configured to: when receiving the authentication response returned by the network service server of the network according to the authentication request, parsing the authentication response to obtain the user identifier corresponding to the certain network Authentication information.
  • the authentication request sending unit 120 may respectively send an authentication request to the home location registration server HSS of the telecommunication network and the authentication center of the internet network; and the authentication response receiving unit 220
  • the authentication information corresponding to the parsed user identifier may include: a telecommunication service account, a password, and address information of the HSS server, and an SSO code.
  • the authentication obtaining unit 20 of the server may further include: an information generating unit 320, configured to generate an SSO code corresponding to the user identifier, where the authentication information of the Internet in the cross-network system includes the SSO code.
  • the authentication obtaining unit 20 may send an authentication request by the authentication request sending unit 120, and include the user in the user access request received by the request receiving unit 10.
  • the authentication response receiving unit 220 receives the authentication response
  • the authentication response obtains the authentication information
  • the authentication sending unit 30 sends the authentication information parsed by the authentication response receiving unit 220 to the client. end.
  • the authentication obtaining unit 20 may obtain the authentication information through the information generating unit 320.
  • the user identifier randomly generates an SSO code, and the authentication sending unit 30 sends the authentication information parsed by the information generating unit 320 to the client.
  • a client structure according to an embodiment of the present invention is shown in FIG. 6 and includes:
  • the request sending unit 60 is configured to send a user access request for accessing the cross-network service to the service authentication server in the cross-network system, where the user access request includes the user identifier;
  • the authentication receiving unit 70 is configured to receive, by the service authentication server, the user identifier corresponding to each network in the network system.
  • the authentication initiation unit 80 is configured to initiate a user service authentication process to the network service server in the cross-network system according to the authentication information received by the authentication receiving unit 70.
  • the authentication information of the telecommunication network received by the authentication receiving unit 20 may include the telecommunication service account, the password, and the address information of the HSS server; and the authentication information of the internet network may include SSO code.
  • the authentication information may also include user setting parameters and capability information of various network components, and the like.
  • the authentication initiating unit 80 may send the telecommunication service account and the password to the corresponding HSS server for verification according to the address information of the HSS server, and carry the SSO code in the access message to the service server of the internet network, and send the The business server of the Internet is verified.
  • the embodiment of the present invention further provides a user service authentication system.
  • the schematic diagram of the structure is as shown in FIG. 1 , including a client, a service authentication server, and at least two network service servers, where: the client is a client as shown in FIG. 6 .
  • the service authentication server is the server as described in FIG. 4 or 5; and the network service server is configured to authenticate the user service when the client initiates the user service authentication process.
  • the user service authentication system in this embodiment performs the user service authentication method as shown in FIG. 2 and FIG. 3, and details are not described herein.
  • the program may be stored in a computer readable storage medium, and the storage medium may include: Read only memory (ROM), random access memory (RAM), magnetic or optical disk, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

用户业务鉴权方法、 系统及服务器
技术领域
本发明涉及通信技术领域, 特别涉及用户业务鉴权方法、 系统及服务器。 背景技术
跨网络业务是基于不同网络技术的综合业务,比如基于电信网和互联网技 术的网络业务, 实际应用中在网络协议多媒体子系统 ( IP Multimedia Subsystem, IMS ) 网络中提供的即时通信(IMPS )业务, 或呼叫 (CALL )业 务; 又如在电信网络系统中提供的社会性网络服务 ( Social Networking Services, SNS )或网盘业务等。
用户终端在接入网络并请求跨网络业务的过程中,需要由网络中的业务服 务器对该用户进行业务鉴权,现有的一种用户业务鉴权方法是由跨网络系统中 一种网络的业务服务器对该用户进行业务鉴权,而修改其它网络的部件来适应 这种网络业务服务器的鉴权方式。
比如:一般情况下,互联网系统中的用户业务鉴权是通过单点登录(Single Sign On, SSO ) 方式完成鉴权, 当在互联网系统中增加电信业务时, 需要修 改电信网络的部件以适应互联网络的鉴权方式;而电信网络系统中是在核心网 侧的归属位置寄存器( Home Subscriber Server, HSS ) 完成用户业务鉴权, 如 果在 IMS业务系统上增加一个 SNS应用, 则必须修改原有 SNS的部件以适应 IMS业务的鉴权方式, 即需要 SNS设备支持 IMS系统相关的协议。
现有跨网络的用户业务鉴权方法中, 只进行一种网络的用户业务鉴权,且 为了完成跨网络业务的用户业务鉴权而修改网络部件时,会因具体协议和鉴权 方式的不同而不同, 使得跨网络业务的用户业务鉴权方式实现复杂。
发明内容
本发明实施例提供用户业务鉴权方法、 系统及服务器, 筒化了跨网络业务 的用户业务鉴权实现方式, 且增强了可靠性。
本发明实施例提供一种用户业务鉴权方法, 包括:
接收客户端发送的请求接入跨网络业务的用户接入请求,所述用户接入请 求中包含用户标识;
获取所述用户标识在跨网络系统中各个网络对应的鉴权信息; 将获取的所述各个网络的鉴权信息发送给所述客户端,以便所述客户端根 据所述鉴权信息向所述跨网络系统中的网络业务服务器发起用户业务鉴权过 程。
本发明实施例提供一种服务器, 包括:
请求接收单元,用于接收客户端发送的请求接入跨网络业务的用户接入请 求, 所述用户接入请求中包含用户标识;
鉴权获取单元,用于获取所述请求接收单元接收的用户接入请求中的用户 标识在跨网络系统中各个网络对应的鉴权信息;
鉴权发送单元,用于将所述鉴权获取单元获得的各个网络的鉴权信息发送 给所述客户端,以便所述客户端根据所述鉴权信息向所述跨网络系统中的网络 业务服务器发起用户业务鉴权过程。
本发明实施例提供一种客户端, 包括:
请求发送单元,用于发送请求接入跨网络业务的用户接入请求给跨网络系 统中的业务鉴权服务器, 所述用户接入请求中包含用户标识;
鉴权接收单元,用于接收所述业务鉴权服务器获取的所述用户标识在跨网 络系统中各个网络对应的鉴权信息;
鉴权发起单元,用于根据所述鉴权接收单元接收的鉴权信息向所述跨网络 系统中的网络业务服务器发起用户业务鉴权过程。
本发明实施例还提供一种用户业务鉴权系统, 包括客户端、业务鉴权服务 器和至少两个网络业务服务器, 其中:
所述客户端包括:
请求发送单元,用于发送请求接入跨网络业务的用户接入请求给跨网络系 统中的业务鉴权服务器, 所述用户接入请求中包含用户标识; 鉴权接收单元, 用于接收所述业务鉴权服务器获取的所述用户标识在跨网络系统中各个网络 对应的鉴权信息; 鉴权发起单元, 用于根据所述鉴权接收单元接收的鉴权信息 向所述跨网络系统中的网络业务服务器发起用户业务鉴权过程;
所述业务鉴权服务器包括:
请求接收单元,用于接收客户端发送的请求接入跨网络业务的用户接入请 求, 所述用户接入请求中包含用户标识; 鉴权获取单元, 用于获取所述请求接 收单元接收的用户接入请求中的用户标识在跨网络系统中各个网络对应的鉴 权信息; 鉴权发送单元, 用于将所述鉴权获取单元获得的各个网络的鉴权信息 发送给所述客户端,以便所述客户端根据所述鉴权信息向所述跨网络系统中的 网络业务服务器发起用户业务鉴权过程;
所述网络业务服务器,用于在所述客户端发起用户业务鉴权过程时对用户 业务进行鉴权。
本发明实施例主要是在系统中增加了业务鉴权服务器,当业务鉴权服务器 接收到客户端发送的请求接入跨网络业务的用户接入请求,在用户接入请求中 包含用户标识, 分别获取该用户标识在跨网络系统中各个网络对应的鉴权信 息; 并将获取的各个网络的鉴权响应中包含的鉴权信息发送给客户端, 以便客 户端发起用户业务鉴权过程。这样通过在系统中增加业务鉴权服务器分别获得 用户标识在跨网络系统中各个网络对应的鉴权信息,从而分别完成各个网络的 鉴权过程, 而不需要修改网络部件来适应其中一种网络的用户业务鉴权方式, 筒化了跨网络业务的用户业务鉴权实现方式;且本实施例中客户端可以向跨网 络系统中的每个网络业务服务器发起用户业务鉴权过程,而不是只进行一种网 络的用户业务鉴权, 增强了可靠性。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所 需要使用的附图作筒单地介绍,显而易见地, 下面描述中的附图仅仅是本发明 的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提 下, 还可以根据这些附图获得其他的附图。
图 1是本发明实施例提供的用户业务鉴权系统的结构示意图;
图 2是本发明实施例提供的用户业务鉴权方法的流程图;
图 3是本发明一个具体应用实施例提供的用户业务鉴权方法的流程图; 图 4是本发明实施例提供的一种服务器的结构示意图;
图 5是本发明实施例提供的另一种服务器的结构示意图;
图 6是本发明实施例提供的一种客户端的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清 楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是 全部的实施例。基于本发明中的实施例, 本领域普通技术人员在没有作出创造 性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
本发明实施例提供一种用户业务鉴权方法, 本实施例的方法适用于如图 1 所示的跨网络系统中, 该系统包括客户端、业务鉴权服务器和至少两个网络业 务服务器, 本实施例的方法是业务鉴权服务器所执行的方法, 方法流程图如图 2所示, 包括:
101 , 接收客户端发送的请求接入跨网络业务的用户接入请求, 用户接入 请求中包含用户标识;
本实施例的流程可以由用户通过任一客户端发起的, 具体地, 可以通过个 人计算机( Personal Computer, PC )或移动终端等终端上的浏览器或移动终端 软件系统来向业务鉴权服务器发送用户接入请求,该用户接入请求用来请求接 入跨网络业务, 比如 IMS系统中的 SNS业务等。
可以理解,在用户接入请求中可以包含用户的用户标识, 即用来唯一标识 用户的标识信息, 可以是用户账号或用户身份证号等信息。
102 , 获取该用户标识在跨网络系统中各个网络对应的鉴权信息; 业务鉴权服务器在接收到用户接入请求后, 需要对该用户进行业务鉴权, 由于该用户接入请求所请求的是跨网络业务, 即基于多种网络技术的业务, 业 务鉴权服务器则需要先获取该用户标识对应的每个网络的鉴权信息。
这里的鉴权信息是客户端向跨网络系统中每个网络发起用户业务鉴权时 候所使用的信息, 比如在跨网络系统中互联网的鉴权中心进行鉴权时使用的 SSO码等信息; 电信网络的 HSS服务器进行鉴权时使用的电信业务账户和密码 等信息。 具体地, 鉴权信息是可以包括用户在订阅该网络系统中业务时, 在业 务服务器中储存的账户和密码信息,鉴权信息还可以包括用户设置参数信息和 该网络业务服务器的能力信息等, 比如在电信网络的 HSS服务器中储存有用户 在订阅电信业务时, 在 HSS服务器中储存的电信业务账户和密码, 还可以包括 用户设置信息等其它信息。
在获取鉴权信息时,可以由业务鉴权服务器向跨网络系统的各个网络业务 服务器获取, 也可以由业务鉴权服务器生成, 还可以通过其它的方法获取, 具 体的获取过程并不能造成对本发明的限制。这里网络业务服务器 ^^于各个网 络技术而进行相应业务操作的服务器, 能对用户业务进行鉴权, 比如基于电信 网络技术的 HSS服务器; 基于互联网技术的鉴权中心, 如认证鉴权 ( Authentication Authorization , ΑΑ )月^务器等。
103,将步骤 102中获取的各个网络的鉴权信息发送给客户端, 以便所述客 户端根据鉴权信息向跨网络系统中网络业务服务器发起用户业务鉴权过程。
当业务鉴权服务器获取了各个网络的鉴权信息后,可以将这些鉴权信息发 送给客户端, 具体地, 业务鉴权服务器可以将各个网络的鉴权信息组装成可扩 展标记语言 ( Extensible Markup Language, XML )或数据交换格式 ( JavaScript Object Notation, JSON )的消息体, 进行加密后发送给客户端, 具体可以采用 对称加密算法等方式进行加密。
可以理解, 业务鉴权服务器发送给客户端的鉴权信息中,对于电信网络来 说, 可以包括电信业务账户和密码, 及电信网络的 HSS服务器地址信息, 还可 以包括用户设置参数信息和电信网络的 HSS服务器的能力信息等;对于互联网 络来说,可以包括 SSO码,还可以包括其他票据信息, 比如发出票据的领域名、 票据的有效期和票据的开始时间等。
当客户端接收到鉴权信息后,可以根据各个网络的鉴权信息相应地向各个 网络业务服务器发起用户业务鉴权过程。具体地,客户端可以根据鉴权信息中 电信网络的 HSS服务器地址信息,将电信业务账户和密码等信息通过注册请求 发送给 HSS服务器; HSS服务器则对注册请求中包含的鉴权信息进行验证, 从 而完成用户业务鉴权过程, 并可以向客户端返回注册结果,且在注册结果中可 以包含用户业务鉴权的结果。
客户端可以将鉴权信息中互联网络的 SSO码携带在向互联网络的业务服 务器的访问消息中,发送给互联网络的网络业务服务器; 由该互联网络的网络 业务服务器对访问消息中的 SSO码进行验证, 或由该网络业务服务器将该 SSO 码发送鉴权中心进行验证, 并可以向客户端返回鉴权结果。
可见, 本发明实施例主要是在系统中增加了业务鉴权服务器, 当业务鉴权 服务器接收到客户端发送的请求接入跨网络业务的用户接入请求,且在用户接 入请求中包含用户标识的;分别获取该用户设备在跨网络系统中各个网络对应 的鉴权信息; 并将获取的各个网络的鉴权信息发送给客户端, 以便客户端分别 发起各个网络的用户业务鉴权过程。这样通过在系统中增加业务鉴权服务器分 别获得跨网络系统中各个网络的鉴权信息, 从而分别完成各个网络的鉴权过 程, 而不需要修改网络部件来适应其中一种网络的用户业务鉴权方式, 筒化了 跨网络业务的用户业务鉴权实现方式;且本实施例中客户端可以向跨网络系统 中的每个网络业务服务器发起用户业务鉴权过程,而不是只进行一种网络的用 户业务鉴权, 增强了可靠性。
在一个具体的实施例中, 业务鉴权服务器在执行上述步骤 102时, 可以通 过如下的步骤进行获取:
A: 分别向跨网络系统中各个网络的网络业务服务器发送鉴权请求, 在鉴 权请求中包含用户标识;
B: 当接收某个网络的网络业务服务器根据鉴权请求返回的鉴权响应时, 解析鉴权响应得到用户标识在相应的某个网络对应的鉴权信息。
可以理解, 具体地:
( 1 )有些网络业务服务器储存有用户标识对应的鉴权信息, 这里鉴权信 息是可以包括用户在订阅该网络系统中业务时,在业务服务器中储存的账户和 密码信息,鉴权信息还可以包括用户设置参数信息和该网络业务服务器的能力 信息等, 比如在电信网络的 HSS服务器中储存有用户在订阅电信业务时, 在 HSS服务器中储存的电信业务账户和密码,还可以包括用户设置信息等其它信 息。 这种情况下, 业务鉴权月良务器获取用户标识在该网络中的鉴权信息时, 可 以发送鉴权请求到电信网络的 HSS服务器, 在鉴权请求中包含用户标识; 当电 信网络的 HSS服务器接收到鉴权请求后,在本地存储中提取在电信网络中该用 户标识对应的鉴权信息, 并通过鉴权响应返回给业务鉴权服务器。
( 2 )有些网络业务服务器没有储存鉴权信息, 当这些网络业务服务器接 收到鉴权请求后,会生成用户标识对应的鉴权信息, 比如互联网的鉴权中心生 成用户标识对应的 SSO码和其它票据信息等; 并在鉴权响应中携带鉴权信息返 回给业务鉴权服务器,这里鉴权响应中携带的鉴权信息可以包括网络业务服务 器为该用户标识生成的票据码, 还可以包括该网络业务月良务器的能力信息等。 这种情况下, 业务鉴权服务器在获取鉴权信息时, 可以发送鉴权请求到互联网 络的鉴权中心,在鉴权请求中包含用户标识; 当互联网络的鉴权中心接收到鉴 权请求后, 生成互联网络的该用户标识对应的鉴权信息, 并通过鉴权响应返回 给业务鉴权服务器。
( 3 )需要说明的是, 在其它情况下, 跨网络系统中没有上述所说的生成 和储存鉴权信息的网络业务服务器,在获取鉴权信息时, 可以由业务鉴权服务 器生成该用户标识对应的鉴权信息。 比如,在跨网络系统中没有统一的互联网 的鉴权中心, 则在获取鉴权信息时, 可以由业务鉴权服务器为该用户标识生成 SSO码等信息, 具体生成过程与鉴权中心生成 SSO码的过程一致, 在此不进行 赘述。
这种情况下, 业务鉴权服务器生成 SSO码并发送给客户端后, 当客户端向 网络业务服务器发送包含该 SSO码的访问消息,且在访问消息中还包含用户标 识等信息, 则网络业务服务器接收到该访问请求, 可以根据访问请求中包含的 用户标识来鉴权该 SSO码, 比如先^^据用户标识生成一个 SSO码, 然后再将该 生成的 SSO码与访问请求中的 SSO码进行比较来进行验证。
在另一个具体的实施例中,在业务鉴权服务器接收到客户端的用户接入请 求后, 可以先对用户进行认证, 在认证通过后才执行步骤 102。 具体地认证方 法有多种, 比如密钥认证方法和密码匹配的方法等, 其中需要用到的用户认证 信息可以在本地查找。 例如: 如果用户接入请求中包含用户标识和用户密码, 则业务鉴权服务器在进行用户的认证时, 需要确定本地存储中有用户标识, 并 将用户密码与本地存储中用户标识对应的认证密码进行匹配,如果相匹配, 则 用户认证通过, 否则用户认证没有通过。
需要说明的是, 这里的认证是指客户端连接到业务鉴权服务器时, 业务鉴 权服务器对该用户的认证, 和前述的用户请求跨网络业务时的鉴权是不同的。
参考图 3所示,以下以一个具体的应用实施例来说明用户业务鉴权的方法, 本实施例中用户请求的跨网络业务是在 IMS系统中增加的 SNS业务, 则用户业 务鉴权的方法具体包括:
201 , 用户通过客户端连接到业务鉴权服务器, 由客户端发送用户接入请 求, 请求接入在 IMS系统中增加的 SNS业务, 在用户接入请求中包含该用户的 用户标识和用户密码。 202、 业务鉴权服务器接收到用户接入请求, 进行用户认证, 如果认证通 过, 则执行步骤 203, 如果认证未通过, 则结束流程。
在具体的认证过程中,如果本地存储中有用户接入请求中的用户标识, 则 将用户接入请求中的用户密码与本地存储中用户标识对应的认证密码进行匹 配, 如果相匹配, 则用户认证通过。
203、 业务鉴权服务器分别向 IMS网络业务服务器(可以为 HSS服务器) 和互联网网络业务服务器(可以为互联网的鉴权中心 )发送鉴权请求, 请求获 取用户标识在相应网络中对应的鉴权信息,在鉴权请求中可以包含该用户的用 户标识等信息。
204、 IMS网络业务服务器接收到鉴权请求, 在本地存储中查找到鉴权请 求中用户标识对应的鉴权信息, 如 IMS账户和密码等, 并通过鉴权响应将鉴权 信息返回给业务鉴权服务器, 在鉴权响应中还可以包含用户在 IMS网络中的设 置参数和该 IMS网络业务服务器的能力参数信息等信息。
而互联网络业务服务器接收到鉴权请求,随机生成鉴权请求中用户标识对 应的 SSO码作为鉴权信息, 并通过鉴权响应将鉴权信息返回给业务鉴权服务 器, 在鉴权响应中还包括包含在生成 SSO码过程中生成的票据信息, 该互联网 络业务服务器的能力参数信息和用户在互联网络中的设置参数等信息。
205、业务鉴权服务器将 IMS网络业务服务器的地址信息,及从 IMS网络业 务服务器获取到的鉴权信息 (IMS账户和密码), 和从互联网络业务服务器获 取的鉴权信息(SSO码)发送给客户端, 具体地, 可以将 IMS网络业务服务器 的地址信息, 及从 IMS网络业务服务器获取到的 IMS账户和密码, 和 SSO码组 装成发送给客户端的消息的消息体发送给客户端。可以理解, 业务服务器还可 以将 IMS和互联网络业务服务的能力参数信息和用户设置参数等信息发送给 客户端, 这样客户端就可以进行相应业务的访问。
206、 客户端接收到业务鉴权服务器发送的鉴权信息后, 根据 IMS网络业 务服务器的地址信息, 向该 IMS网络业务服务器发送注册请求, 在该注册请求 中包含 IMS账户信息和密码。
207、 IMS网络业务服务器接收到注册请求后, 对注册请求中的鉴权信息 ( IMS账户信息和密码)进行验证, 并返回注册结果给客户端。 208、 客户端将 SSO码携带在访问消息中, 将该访问消息发送给互联网络 业务服务器。
209、 互联网络业务服务器接收到访问消息后, 对访问消息中的鉴权信息 ( SSO码)进行验证, 并返回验证结果给客户端。 在对 SSO码进行验证时, 互 联网络业务服务器可以本地验证, 也可以将 SSO码发送给第三方进行验证, 比 如发送给鉴权中心进行验证。
上述步骤 206到 208 , 与步骤 209之间并没有绝对的顺序关系, 即可以先发 起互联网络的鉴权过程, 也可以同时发起电信网络和互联网络的鉴权过程。
本发明实施例提供的一种服务器, 本实施例的服务器是业务鉴权服务器, 结构示意图如图 4所示, 包括:
请求接收单元 10,用于接收客户端发送的请求接入跨网络业务的用户接入 请求, 所述用户接入请求中包含用户标识;
鉴权获取单元 20,用于获取请求接收单元 10接收的用户接入请求中的用户 标识在跨网络系统中各个网络对应的鉴权信息;
鉴权发送单元 30,用于将所述鉴权获取单元 20获得的各个网络的鉴权信息 发送给所述客户端,以便所述客户端根据所述鉴权信息向所述跨网络系统中的 网络业务服务器发起用户业务鉴权过程。
本发明实施例的服务器中,当请求接收单元 10接收到客户端发送的请求接 入跨网络业务的用户接入请求, 该用户接入请求中包含用户标识, 则鉴权获取 单元 20获取该用户标识在跨网络系统中各个网络对应的鉴权信息;并由鉴权发 送单元 30将各个网络的鉴权信息发送给客户端,以便客户端发分别发起各个网 络的用户业务鉴权过程。这样通过在系统中增加业务鉴权服务器获取用户标识 在跨网络中各个网络对应的鉴权信息,从而分别完成各个网络的鉴权过程, 而 不需要修改网络部件来适应其中一种网络的用户业务鉴权方式,筒化了跨网络 业务的用户业务鉴权实现方式;且本实施例中的服务器可以向跨网络系统中的 每个网络业务服务器发起用户业务鉴权过程,而不是只进行一种网络的用户业 务鉴权, 增强了可靠性。
参考图 5所示, 在一个具体的实施例中, 本发明实施例的服务器还可以包 括认证单元 40, 且鉴权获取单元 20可以通过鉴权请求发送单元 120和鉴权响应 接收单元 220来实现, 其中:
认证单元 40, 用于当所述请求接收单元 10接收到用户接入请求,对所述用 户进行认证, 在认证通过后, 通知所述鉴权获取单元 20获取鉴权信息。
认证单元 40的认证是客户端接入业务鉴权服务器时,该业务鉴权服务器对 该用户的认证, 具体地, 当请求接收单元 10接收的用户接入请求中包含用户的 用户标识和用户密码,确定本地存储有所述用户标识时,将用户密码与本地存 储中用户标识对应的认证密码进行匹配, 如果相匹配, 则所述用户认证通过。
鉴权请求发送单元 120, 用于分别向所述跨网络系统中各个网络的网络业 务服务器发送鉴权请求, 所述鉴权请求中包含所述用户标识;
鉴权响应接收单元 220, 用于当接收某个网络的网络业务服务器根据所述 鉴权请求返回的鉴权响应时,解析所述鉴权响应得到所述用户标识在所述某个 网络对应的鉴权信息。
如果跨网络系统是基于互联网和电信网络的系统, 则鉴权请求发送单元 120可以分别向电信网络的归属位置寄存服务器 HSS和互联网络的鉴权中心发 送鉴权请求; 且鉴权响应接收单元 220解析得到的用户标识对应的鉴权信息可 以分别包括: 电信业务账户、 密码和所述 HSS服务器的地址信息, 及 SSO码。
且服务器的鉴权获取单元 20还可以包括: 信息生成单元 320, 用于生成所 述用户标识对应的 SSO码, 则所述跨网络系统中互联网的鉴权信息包括所述 SSO码。
可以理解, 在本实施例中, 鉴权获取单元 20在获取鉴权信息时, 可以通过 鉴权请求发送单元 120发送鉴权请求, 且其中包含请求接收单元 10接收的用户 接入请求中的用户标识; 当鉴权响应接收单元 220接收到鉴权响应后, 解析鉴 权响应则获取了鉴权信息, 并由鉴权发送单元 30将鉴权响应接收单元 220解析 得到的鉴权信息发送给客户端。
而对于跨网络系统中的互联网的鉴权信息的获取,如果在跨网络系统中没 有统一的互联网的鉴权中心, 则鉴权获取单元 20在获取鉴权信息时, 可以通过 信息生成单元 320为该用户标识随机生成 SSO码, 并由鉴权发送单元 30将信息 生成单元 320解析得到的鉴权信息发送给客户端。
本发明实施例提供的一种客户端, 结构示意图如图 6所示, 包括: 请求发送单元 60,用于发送请求接入跨网络业务的用户接入请求给跨网络 系统中的业务鉴权服务器, 所述用户接入请求中包含用户标识;
鉴权接收单元 70,用于接收所述业务鉴权服务器获取的所述用户标识在跨 网络系统中各个网络对应的鉴权信息;
鉴权发起单元 80,用于根据所述鉴权接收单元 70接收的鉴权信息向所述跨 网络系统中的网络业务服务器发起用户业务鉴权过程。
如果跨网络系统是基于互联网和电信网络的系统,则鉴权接收单元 20接收 的电信网络的鉴权信息可以包括电信业务账户、 密码和 HSS服务器的地址信 息; 而互联网络的鉴权信息可以包括 SSO码。 鉴权信息还可以包括用户设置参 数和各个网络部件的能力信息等。
则鉴权发起单元 80可以根据 HSS服务器的地址信息,将电信业务账户和密 码通过注册请求发送相应的 HSS服务器进行验证; 而将 SSO码携带在向互联网 络的业务服务器的访问消息中, 发送给互联网络的业务服务器进行验证。
本发明实施例还提供一种用户业务鉴权系统, 结构示意图如图 1所示, 包 括客户端、 业务鉴权服务器和至少两个网络业务服务器, 其中: 客户端如图 6 所示的客户端, 业务鉴权服务器如图 4或 5所述的服务器; 网络业务服务器, 用 于在所述客户端发起用户业务鉴权过程时对用户业务进行鉴权。
本实施例中的用户业务鉴权系统按照图 2和 3所示执行用户业务鉴权方法, 在此不进行赘述。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步 骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读 存储介质中,存储介质可以包括:只读存储器( ROM )、随机存取存储器( RAM )、 磁盘或光盘等。
以上对本发明实施例所提供的用户业务鉴权方法、 系统及服务器, 进行了 详细介绍, 本文中应用了具体个例对本发明的原理及实施方式进行了阐述, 以 上实施例的说明只是用于帮助理解本发明的方法及其核心思想; 同时,对于本 领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会 有改变之处, 综上所述, 本说明书内容不应理解为对本发明的限制。

Claims

权 利 要 求
1、 一种用户业务鉴权方法, 其特征在于, 包括:
接收客户端发送的请求接入跨网络业务的用户接入请求,所述用户接入请 求中包含用户标识;
获取所述用户标识在跨网络系统中各个网络对应的鉴权信息;
将获取的所述各个网络的鉴权信息发送给所述客户端,以便所述客户端根 据所述鉴权信息向所述跨网络系统中的网络业务服务器发起用户业务鉴权过 程。
2、 如权利要求 1所述的方法, 其特征在于, 所述获取跨网络系统中各个网 络的鉴权信息具体包括:
分别向所述跨网络系统中各个网络的网络业务服务器发送鉴权请求,所述 鉴权请求中包含所述用户标识;
当接收到某个网络的网络业务服务器根据所述鉴权请求返回的鉴权响应 时, 解析所述鉴权响应得到所述用户标识在所述某个网络对应的鉴权信息。
3、 如权利要求 2所述的方法, 其特征在于, 分别向所述跨网络系统中各个 网络的网络业务服务器发送鉴权请求具体包括:分别向电信网络的归属位置寄 存服务器 HSS及互联网络的鉴权中心发送鉴权请求;
则当接收到某个网络的网络业务服务器根据所述鉴权请求返回的鉴权响 应时,解析所述鉴权响应得到所述用户标识在所述某个网络对应的鉴权信息包 括:
当接收到电信网络的 HSS返回的鉴权响应时, 解析所述 HSS返回的鉴权响 应获得电信业务账户、 密码和所述 HSS服务器的地址信息;
和 /或
当接收到互联网络的鉴权中心返回的鉴权响应时,解析所述互联网络的鉴 权中心返回的鉴权响应获得单点登录 SSO码。
4、 如权利要求 3所述的方法, 其特征在于, 所述客户端根据所述鉴权信息 向所述跨网络系统中的网络业务服务器发起用户业务鉴权过程, 具体包括: 所述客户端根据所述 HSS服务器的地址信息,将所述电信业务账户和密码 通过注册请求发送至所述 HSS服务器进行验证; 和 /或
所述客户端将所述 SSO码携带在向互联网络的业务服务器的访问消息中, 发送给所述互联网络的业务服务器进行验证。
5、 如权利要求 1所述的方法, 其特征在于, 所述跨网络系统中的一个网络 为互联网络;
所述获取所述用户标识在跨网络系统中各个网络对应的鉴权信息具体包 括: 生成所述用户标识在互联网络对应的 SSO码。
6、 如权利要求 1至 5任一项所述的方法, 其特征在于, 所述接收客户端发 送的请求接入跨网络业务的用户接入请求后还包括:
对所述用户进行认证,在认证通过后,执行所述获取所述用户标识在跨网 络系统中各个网络对应的鉴权信息的步骤。
7、 如权利要求 6所述的方法, 其特征在于, 所述用户接入请求中包含所述 用户的用户标识和用户密码, 则所述对所述用户进行认证具体包括:
确定本地存储有所述用户标识时,将所述用户密码与本地存储中所述用户 标识对应的认证密码进行匹配, 如果相匹配, 则所述用户认证通过。
8、 一种服务器, 其特征在于, 包括:
请求接收单元,用于接收客户端发送的请求接入跨网络业务的用户接入请 求, 所述用户接入请求中包含用户标识;
鉴权获取单元,用于获取所述请求接收单元接收的用户接入请求中的用户 标识在跨网络系统中各个网络对应的鉴权信息;
鉴权发送单元,用于将所述鉴权获取单元获得的各个网络的鉴权信息发送 给所述客户端,以便所述客户端根据所述鉴权信息向所述跨网络系统中的网络 业务服务器发起用户业务鉴权过程。
9、 如权利要求 8所述的服务器, 其特征在于, 所述鉴权获取单元包括: 鉴权请求发送单元,用于分别向所述跨网络系统中各个网络的网络业务服 务器发送鉴权请求, 所述鉴权请求中包含所述用户标识;
鉴权响应接收单元,用于当接收某个网络的网络业务服务器根据所述鉴权 请求返回的鉴权响应时,解析所述鉴权响应得到所述用户标识在所述某个网络 对应的鉴权信息。
10、 如权利要求 9所述的服务器, 其特征在于, 所述鉴权获取单元还包括: 信息生成单元, 用于在所述跨网络系统中的一个网络为互联网络时, 生成所述 用户标识在互联网络对应的单点登录 SSO码,所述跨网络系统中互联网络的鉴 权信息包括所述 SSO码。
11、 如权利要求 8至 10任一项所述的服务器, 其特征在于, 还包括: 认证单元,用于当所述请求接收单元接收到用户接入请求,对所述用户进 行认证, 在认证通过后, 通知所述鉴权获取单元获取鉴权信息。
12、 如权利要求 11所述的服务器, 其特征在于, 所述认证单元, 具体用于 当所述请求接收单元接收的用户接入请求中包含所述用户的用户标识和用户 密码,确定本地存储有所述用户标识时,将所述用户密码与本地存储中所述用 户标识对应的认证密码进行匹配, 如果相匹配, 则所述用户认证通过。
13、 一种客户端, 其特征在于, 包括:
请求发送单元,用于发送请求接入跨网络业务的用户接入请求给跨网络系 统中的业务鉴权服务器, 所述用户接入请求中包含用户标识;
鉴权接收单元,用于接收所述业务鉴权服务器获取的所述用户标识在跨网 络系统中各个网络对应的鉴权信息;
鉴权发起单元,用于根据所述鉴权接收单元接收的鉴权信息向所述跨网络 系统中的网络业务服务器发起用户业务鉴权过程。
14、 一种用户业务鉴权系统, 其特征在于, 包括客户端、 业务鉴权服务器 和至少两个网络业务服务器, 其中:
所述客户端如权利要求 13所述的客户端;
所述业务鉴权服务器如权利要求 8到 12任一项所述的服务器;
所述网络业务服务器,用于在所述客户端发起用户业务鉴权过程时对用户 业务进行鉴权。
PCT/CN2011/074662 2011-05-25 2011-05-25 用户业务鉴权方法、系统及服务器 WO2011144081A2 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2011/074662 WO2011144081A2 (zh) 2011-05-25 2011-05-25 用户业务鉴权方法、系统及服务器
CN201180000686.9A CN102217280B (zh) 2011-05-25 2011-05-25 用户业务鉴权方法、系统及服务器

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/074662 WO2011144081A2 (zh) 2011-05-25 2011-05-25 用户业务鉴权方法、系统及服务器

Publications (2)

Publication Number Publication Date
WO2011144081A2 true WO2011144081A2 (zh) 2011-11-24
WO2011144081A3 WO2011144081A3 (zh) 2012-04-26

Family

ID=44746758

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/074662 WO2011144081A2 (zh) 2011-05-25 2011-05-25 用户业务鉴权方法、系统及服务器

Country Status (2)

Country Link
CN (1) CN102217280B (zh)
WO (1) WO2011144081A2 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016029829A3 (en) * 2014-08-25 2016-04-07 Huawei Technologies Co., Ltd. System and method for securing pre-association service discovery
CN112601224A (zh) * 2020-12-03 2021-04-02 海能达通信股份有限公司 一种呼叫切换方法、装置及系统

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833074A (zh) * 2012-08-31 2012-12-19 珠海市魅族科技有限公司 一种鉴权方法和相关设备
CN105871782B (zh) * 2015-01-21 2019-08-16 中国移动通信集团广东有限公司 网络业务处理方法、装置、业务路由器及平台认证系统
CN107172494B (zh) * 2017-06-29 2019-07-16 深圳市茁壮网络股份有限公司 一种鉴权方法及鉴权系统
WO2019061076A1 (en) * 2017-09-27 2019-04-04 Huawei Technologies Co., Ltd. AUTHENTICATION PROTOCOL BASED ON A CONFIDENTIAL EXECUTION ENVIRONMENT
CN110365550B (zh) * 2019-06-12 2022-12-13 深圳市漫申技术有限公司 测试接入系统的方法及相关装置
CN110213290B (zh) * 2019-06-14 2022-05-20 华云数据控股集团有限公司 数据获取方法、api网关以及存储介质
CN110619206B (zh) * 2019-08-15 2024-04-02 中国平安财产保险股份有限公司 运维风险控制方法、系统、设备及计算机可读存储介质
CN111192661A (zh) * 2019-12-31 2020-05-22 武汉联影医疗科技有限公司 医学电子胶片的获取方法和系统
CN111654501B (zh) * 2020-06-05 2022-08-12 浪潮云信息技术股份公司 一种用于电子政务安全监管平台统一安全登录的方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080244266A1 (en) * 2007-03-30 2008-10-02 Yigang Cai Authenticating a communication device and a user of the communication device in an ims network
CN101388774A (zh) * 2008-10-24 2009-03-18 焦点科技股份有限公司 一种在不同系统间自动认证识别用户身份并且登录的方法
CN101409880A (zh) * 2007-10-09 2009-04-15 中国电信股份有限公司 跨通信网的帐户认证及密码管理系统和方法
US20110072502A1 (en) * 2009-09-18 2011-03-24 Zhexuan Song Method and Apparatus for Identity Verification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080244266A1 (en) * 2007-03-30 2008-10-02 Yigang Cai Authenticating a communication device and a user of the communication device in an ims network
CN101409880A (zh) * 2007-10-09 2009-04-15 中国电信股份有限公司 跨通信网的帐户认证及密码管理系统和方法
CN101388774A (zh) * 2008-10-24 2009-03-18 焦点科技股份有限公司 一种在不同系统间自动认证识别用户身份并且登录的方法
US20110072502A1 (en) * 2009-09-18 2011-03-24 Zhexuan Song Method and Apparatus for Identity Verification

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016029829A3 (en) * 2014-08-25 2016-04-07 Huawei Technologies Co., Ltd. System and method for securing pre-association service discovery
KR101878112B1 (ko) * 2014-08-25 2018-07-12 후아웨이 테크놀러지 컴퍼니 리미티드 제휴 이전 서비스 발견을 보안하기 위한 시스템 및 방법
US10250698B2 (en) 2014-08-25 2019-04-02 Futurewei Technologies, Inc. System and method for securing pre-association service discovery
CN112601224A (zh) * 2020-12-03 2021-04-02 海能达通信股份有限公司 一种呼叫切换方法、装置及系统

Also Published As

Publication number Publication date
WO2011144081A3 (zh) 2012-04-26
CN102217280B (zh) 2013-10-09
CN102217280A (zh) 2011-10-12

Similar Documents

Publication Publication Date Title
JP7382818B2 (ja) ネイティブモバイルアプリケーション起点のOpenID Connect(OIDC)フロー及びセキュリティアサーションマークアップ言語(SAML)フローのためのシームレスなシングルサインオン(SSO)のための方法及びシステム
WO2011144081A2 (zh) 用户业务鉴权方法、系统及服务器
CN102201915B (zh) 一种基于单点登录的终端认证方法和装置
US20170353442A1 (en) Proximity-based authentication
WO2017028804A1 (zh) 一种Web实时通信平台鉴权接入方法及装置
US20100100950A1 (en) Context-based adaptive authentication for data and services access in a network
US20110138453A1 (en) Single sign-on in mixed http and sip environments
EP1909430A1 (en) Access authorization system of communication network and method thereof
US9015819B2 (en) Method and system for single sign-on
JP2019185775A (ja) ブロックチェーン基盤の権限認証方法、端末及びこれを利用したサーバ
US20130007867A1 (en) Network Identity for Software-as-a-Service Authentication
WO2006000144A1 (fr) Procede d'identification de protocole initial de session
KR20050064119A (ko) 인터넷접속을 위한 확장인증프로토콜 인증시 단말에서의서버인증서 유효성 검증 방법
WO2009105988A1 (zh) 会话发起协议注册方法、认证及授权方法、系统及设备
JP2018517367A (ja) サービスプロバイダ証明書管理
CN112261022A (zh) 一种基于api网关的安全认证方法
JP5565408B2 (ja) Id認証システム、id認証方法、認証サーバ、端末装置、認証サーバの認証方法、端末装置の通信方法、及びプログラム
CN103023856A (zh) 单点登录的方法、系统和信息处理方法、系统
CN103067337A (zh) 一种身份联合的方法、IdP、SP及系统
JP2016521029A (ja) セキュリティ管理サーバおよびホームネットワークを備えるネットワークシステム、およびそのネットワークシステムにデバイスを含めるための方法
CN112087412B (zh) 一种基于唯一令牌的服务访问处理方法及装置
RU2325774C2 (ru) Способ распределения паролей
CN102694779B (zh) 组合认证系统及认证方法
US11146536B2 (en) Method and a system for managing user identities for use during communication between two web browsers
CN111723347B (zh) 身份认证方法、装置、电子设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180000686.9

Country of ref document: CN

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11782998

Country of ref document: EP

Kind code of ref document: A2