WO2012048554A1 - Method and system for access control - Google Patents

Method and system for access control Download PDF

Info

Publication number
WO2012048554A1
WO2012048554A1 PCT/CN2011/072029 CN2011072029W WO2012048554A1 WO 2012048554 A1 WO2012048554 A1 WO 2012048554A1 CN 2011072029 W CN2011072029 W CN 2011072029W WO 2012048554 A1 WO2012048554 A1 WO 2012048554A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
authentication
visitor
identity
digital signature
Prior art date
Application number
PCT/CN2011/072029
Other languages
French (fr)
Chinese (zh)
Inventor
王俊峰
杜志强
铁满霞
黄振海
曹军
陶洪波
刘晓勇
Original Assignee
天维讯达无线电设备检测(北京)有限责任公司
西安西电捷通无线网络通信股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 天维讯达无线电设备检测(北京)有限责任公司, 西安西电捷通无线网络通信股份有限公司 filed Critical 天维讯达无线电设备检测(北京)有限责任公司
Publication of WO2012048554A1 publication Critical patent/WO2012048554A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Definitions

  • the present invention belongs to the field of network security applications in information security technologies, and in particular, to an access control method and system. Background technique
  • the present invention provides an access control system including a visitor, an authentication server, and an access controller of a destination network, wherein
  • FIG. 3 is a detailed block diagram of step S1 in Figure 2.
  • FIG. 4 is a detailed block diagram of step S2 in Figure 2.
  • Step S4 Referring to FIG. 6, the authentication server AS verifies the identity authentication information II of the access controller AC and the identity authentication information 12 of the visitor REQ in the identity authentication request message M3, and generates an access controller AC respectively.
  • the publicly available authentication result C1 and the publicly available authentication result C2 to the visitor REQ the authentication server AS constructs the identity authentication response message M4 and sends it to the visitor REQ.
  • the identity authentication response message M4 includes the publicly available authentication results C1 and C2.

Abstract

A method and system for network access control on the basis of asymmetric cryptography mechanism are provided. After a visitor proposes an access request, an access controller in the destination network processes the access request, and the visitor initiates a request for authenticating the identity of the visitor to an authentication server. The access controller in the destination network accomplishes the authentication of the identity of the visitor on the basis of the releasable authentication result which is generated by the authentication server and forwarded by the visitor, and performs, according to the authorization policy, the authorization management of the visitor which has been successfully authenticated. The invention solves the problem that the access control can not be performed when the access controller can not directly use the authentication service provided by the authentication server, and satisfies the practical application requirement.

Description

一种访问控制方法及系统 本申请要求在 2010 年 10 月 13 日提交中国专利局、 申请号为 201010505950.1 发明名称为 "一种访问控制方法及系统" 的中国专利申请的 优先权, 其全部内容通过引用结合在本申请中。 技术领域  The present invention claims the priority of the Chinese patent application entitled "An Access Control Method and System" by the Chinese Patent Office, the application number is 201010505950.1, which is filed on October 13, 2010. The citations are incorporated herein by reference. Technical field
本发明属信息安全技术中的网络安全应用领域, 尤其涉及一种访问控制 方法及系统。 背景技术  The present invention belongs to the field of network security applications in information security technologies, and in particular, to an access control method and system. Background technique
现有的网络访问控制方法中, 通常在访问者向目的网络发起访问请求后, 由目的网络中的访问控制器完成对访问者的鉴别和授权, 从而实现对访问者 的访问控制。 在需要第三方, 如鉴别服务器, 参与身份鉴别的访问控制场景 中, 可能因为访问控制器自身或者是目的网络的原因, 使得访问控制器无法 直接与鉴别服务器连接, 从而导致访问控制器无法直接使用鉴别服务器提供 的鉴别服务。 在这种情形下, 现有技术中的由访问控制器直接连接鉴別服务 器并使用鉴别服务器提供鉴别服务的访问控制方法, 将无法满足对访问者进 行访问控制的实际应用需求。 发明内容  In the existing network access control method, after the visitor initiates an access request to the destination network, the access controller in the destination network completes the authentication and authorization of the visitor, thereby implementing access control to the visitor. In an access control scenario where a third party, such as an authentication server, is involved in identity authentication, the access controller may not be directly connected to the authentication server because of access to the controller itself or the destination network, thereby preventing the access controller from directly using the access controller. The authentication service provided by the authentication server. In this case, the prior art access control method in which the access controller directly connects to the authentication server and uses the authentication server to provide the authentication service will not be able to meet the actual application requirements for access control of the visitor. Summary of the invention
为了解决背景技术中存在的上述技术问题, 本发明提供了一种能够满足 对访问者进行访问控制的应用需求的访问控制方法及系统。  In order to solve the above-mentioned technical problems existing in the background art, the present invention provides an access control method and system capable of satisfying application requirements for access control of a visitor.
本发明提供一种访问控制方法, 包括:  The present invention provides an access control method, including:
步骤 1 ), 一访问者向一目的网络的一访问控制器发送一访问请求消息; 所述访问请求消息中包含所述访问者的第二身份鉴别信息及访问请求;  Step 1), a visitor sends an access request message to an access controller of a destination network; the access request message includes the second identity authentication information and the access request of the visitor;
步骤 2 ), 所述访问控制器收到所述访问请求消息后, 构造一接入鉴别请 求消息发送给所述访问者; 所述接入鉴别请求消息包含一第一数字签名和所 述访问控制器的第一身份鉴别信息; Step 2), after the access controller receives the access request message, construct an access authentication request Sending a message to the visitor; the access authentication request message includes a first digital signature and first identity authentication information of the access controller;
步骤 3 ), 所述访问者收到所述接入鉴别请求消息后, 构造一身份鉴别请 求消息发送给所述一鉴别服务器; 所述身份鉴别请求消息中包括所述第一身 份鉴别信息以及所述第二身份鉴别信息;  Step 3), after receiving the access authentication request message, the visitor constructs an identity authentication request message and sends the message to the authentication server. The identity authentication request message includes the first identity authentication information and the Describe the second identity authentication information;
步骤 4 ), 所述鉴别服务器收到所述身份鉴别请求消息后, 对所述第一身 份鉴别信息以及所述第二身份鉴别信息进行鉴别, 并产生对所述访问控制器 的第一可公开的鉴别结果和对所述访问者的第二可公开的鉴别结果; 所述鉴 别服务器构造一包含所述第一可公开的鉴别结果和所述第二可公开的鉴别结 果的身份鉴别响应消息发送给所述访问者;  Step 4), after receiving the identity authentication request message, the authentication server authenticates the first identity authentication information and the second identity authentication information, and generates a first publicly available to the access controller. And a second publicly identifiable result of the visitor; the authentication server constructing an identity authentication response message including the first publicly identifiable authentication result and the second publicly identifiable authentication result To the visitor;
步骤 5 ), 所述访问者收到所述身份鉴别响应消息后, 根据所述第一可公 开的鉴别结果对所述第一数字签名进行验证, 并根据验证结果选择是否构造 一接入鉴别响应消息发送给所述访问控制器; 所述接入鉴别响应消息包括所 述第二可公开的鉴别结果以及所述访问者的第二数字签名;  Step 5), after receiving the identity authentication response message, the visitor verifies the first digital signature according to the first publicly available authentication result, and selects whether to construct an access authentication response according to the verification result. Sending a message to the access controller; the access authentication response message includes the second publicly available authentication result and a second digital signature of the visitor;
步骤 6 ), 所述访问控制器收到所述接入鉴别响应消息后, 根据所述第二 可公开的鉴别结果验证所述第二数字签名, 并根据验证结果及一授权策略构 造一访问响应消息发送给所述访问者; 所述授权策略是所述访问控制器对所 述访问请求进行授权的策略。  Step 6), after receiving the access authentication response message, the access controller verifies the second digital signature according to the second publicly available authentication result, and constructs an access response according to the verification result and an authorization policy. A message is sent to the visitor; the authorization policy is a policy for the access controller to authorize the access request.
本发明提供一种访问装置, 包括:  The present invention provides an access device, including:
访问请求交互模块, 用于向一目的网络的一访问控制器发送访问请求消 息, 所述访问请求消息中包含所述访问者的第二身份鉴别信息; 并接收所述 访问控制器发送的包含一第一数字签名和所述访问控制器的第一身份鉴别信 息的接入鉴别请求消息;  An access request interaction module, configured to send an access request message to an access controller of a destination network, where the access request message includes the second identity authentication information of the visitor; and receive the content that is sent by the access controller a first digital signature and an access authentication request message of the first identity authentication information of the access controller;
鉴别请求交互模块, 用于向一鉴别服务器发送一身份鉴别请求消息, 所 述身份鉴别请求消息中包含所述第一身份鉴别信息和所述第二身份鉴别信 息; 并接收所述鉴别服务器发送的身份鉴别响应消息, 所述身份鉴别响应消 息中包含根据所述第一身份鉴别信息对所述访问控制器进行身份鉴别后的第 一可公开的鉴别结果和根据所述第二身份鉴别信息对所述访问者进行身份鉴 别后的第二可公开的鉴别结果; An authentication request interaction module, configured to send an identity authentication request message to an authentication server, where the identity authentication request message includes the first identity authentication information and the second identity authentication information; and receiving the identifier sent by the authentication server An identity authentication response message, where the identity authentication response message includes the identity authentication of the access controller according to the first identity authentication information a publicly discriminable authentication result and a second publicly identifiable authentication result after authenticating the visitor according to the second identity authentication information;
鉴别结果交互模块, 用于根据所述第一可公开的鉴别结果对所述第一数 字签名进行验证, 并根据验证结果选择是否构造包含所述第二可公开的鉴别 结果和所述访问者的第二数字签名的接入鉴别响应消息发送给所述访问控制 器, 并接收所述访问器发送的访问响应消息。  An authentication result interaction module, configured to verify the first digital signature according to the first publicly available authentication result, and select whether to construct the second publicly available authentication result and the visitor according to the verification result The second digitally signed access authentication response message is sent to the access controller, and receives an access response message sent by the accessor.
本发明提供一种鉴别服务器, 包括:  The invention provides an authentication server, comprising:
鉴别请求接收模块, 用于接收一访问者发送的身份鉴别请求消息, 所述 身份鉴别请求消息中包含目的网絡一访问控制器的第一身份鉴别信息和所述 访问者的第二身份鉴别信息;  An authentication request receiving module, configured to receive an identity authentication request message sent by a visitor, where the identity authentication request message includes first identity authentication information of the destination network one access controller and second identity authentication information of the visitor;
鉴别执行模块, 用于根据所述第一身份鉴别信息产生对所述访问控制器 进行身份鉴别后的第一可公开的鉴别结果, 以及根据所述第二身份鉴别信息 产生对所述访问者进行身份鉴别后的第二可公开的鉴别结果;  An authentication execution module, configured to generate, according to the first identity authentication information, a first publicly available authentication result after performing identity authentication on the access controller, and generate, according to the second identity authentication information, the visitor a second publicly identifiable authentication result after identity authentication;
鉴别响应发送模块, 用于构造一身份鉴别响应消息发送给所述访问者, 所述身份鉴别响应消息中包含所述第一可公开的鉴别结果及第二可公开的鉴 别结果。  The authentication response sending module is configured to send an identity authentication response message to the visitor, where the identity authentication response message includes the first publicly available authentication result and the second publicly available authentication result.
本发明提供一种访问控制器, 包括:  The present invention provides an access controller, including:
访问请求接收模块, 用于接收一访问者发送的访问请求消息, 所述访问 请求消息中携带所述访问者的第二身份鉴别信息;  An access request receiving module, configured to receive an access request message sent by a visitor, where the access request message carries the second identity authentication information of the visitor;
接入鉴别请求构造模块, 用于构造一接入鉴别请求消息发送给所述访问 者, 所述接入鉴别请求消息中包含所述访问控制器的第一身份鉴别信息和第 一数字签名;  An access authentication request constructing module, configured to send an access authentication request message to the visitor, where the access authentication request message includes first identity authentication information and a first digital signature of the access controller;
接入鉴别响应接收模块, 用于接收所述访问者发送的接入鉴别响应消息 得到第二可公开的鉴别结果及由所述访问者发送的第二数字签名; 所述接入 鉴别响应消息根据第一可公开的鉴别结果并对所述第一数字签名进行验证通 过后构造; 所述第一可公开的鉴别结果是由所述鉴别服务器对由所述访问者 发送的所述第一身份鉴别信息进行鉴别后确定, 所述第二鉴别结果是由所述 鉴别服务器对由所述访问者发送的第二身份鉴别信息进行鉴别后确定; 访问响应发送模块, 用于根据获得的所述第二可公开的鉴别结果对所述 第二数字签名进行验证, 并根据验证结果以及授权策略, 构造一访问响应消 息发送给所述访问者。 An access authentication response receiving module, configured to receive an access authentication response message sent by the visitor, to obtain a second publicly available authentication result, and a second digital signature sent by the visitor; a first publicly identifiable authentication result and a verification of the first digital signature by a post-construction; the first publicly identifiable authentication result is the first identity authentication sent by the authentication server to the visitor After the information is authenticated, it is determined that the second authentication result is The authentication server determines the second identity authentication information sent by the visitor, and the access response sending module is configured to verify the second digital signature according to the obtained second publicly available authentication result, and According to the verification result and the authorization policy, an access response message is constructed and sent to the visitor.
本发明提供一种访问控制系统, 包括访问者、 鉴别服务器、 目的网络的 访问控制器, 其中  The present invention provides an access control system including a visitor, an authentication server, and an access controller of a destination network, wherein
所述访问者, 用于向所述访问控制器发送访问请求消息, 所述访问请求 消息中携带所述访问者的第二身份鉴别信息; 并接收所述访问控制器发送的 接入鉴别请求消息, 所述接入鉴别请求消息中包含所述访问控制器的第一身 份鉴别信息和第一数字签名; 以及  The visitor is configured to send an access request message to the access controller, where the access request message carries the second identity authentication information of the visitor; and receives an access authentication request message sent by the access controller. The access authentication request message includes first identity authentication information and a first digital signature of the access controller;
用于向鉴别服务器发送包含所述第一身份鉴别信息和第二身份鉴别信息 的身份鉴别请求消息, 并接收所述鉴别服务器返回的包含第一可公开的鉴别 结果和第二可公开的鉴别结果身份鉴别响应消息; 以及  And sending an identity authentication request message including the first identity authentication information and the second identity authentication information to the authentication server, and receiving the first publicly available authentication result and the second publicly available authentication result returned by the authentication server Identity authentication response message;
用于根据所述第一可公开鉴别结果并对所述第一数字签名进行验证通过 后构造接入鉴别响应消息发送给所述访问控制器, 所述接入鉴别响应消息中 包含所述第二可公开的鉴别结果及由所述访问者产生的第二数字签名, 并接 收所述访问控制器发送的访问响应消息;  And configured to send, according to the first publicly discriminable result, the first digital signature to the access controller, the access authentication response message is sent to the access controller, where the access authentication response message includes the second a publicly discriminable authentication result and a second digital signature generated by the visitor, and receiving an access response message sent by the access controller;
所述访问控制器, 用于接收所述访问者发送的访问请求消息, 并构造所 述接入鉴别请求消息发送给所述访问者; 以及  The access controller is configured to receive an access request message sent by the visitor, and construct the access authentication request message to be sent to the visitor;
用于接收所述访问者发送的接入鉴别响应消息得到所述第二可公开的鉴 别结果以及所述第二数字签名, 根据获得的所述第二可公开的鉴别结果对所 述第二数字签名进行验证, 并根据验证结果以及授权策略, 构造所述访问响 应消息发送给所述访问者;  Receiving, by the access identifier sent by the visitor, the second publicly available authentication result and the second digital signature, according to the obtained second publicly available authentication result, the second number The signature is verified, and the access response message is constructed and sent to the visitor according to the verification result and the authorization policy;
所述鉴别服务器, 用于接收所述访问者发送的包含所述第一身份鉴别信 息和第二身份鉴别信息的身份鉴别请求消息, 并返回包含所述第一可公开的 鉴别结果和第二可公开的鉴别结果的身份鉴别响应消息; 其中, 所述第一可 公开的鉴别结果是由所述鉴别服务器对由所述访问者发送的所述第一身份鉴 别信息进行鉴别后确定, 所述第二可公开的鉴别结果是由所述鉴别服务器对 由所述访问者发送的第二身份鉴别信息进行鉴别后确定。 The authentication server is configured to receive an identity authentication request message that is sent by the visitor and includes the first identity authentication information and the second identity authentication information, and return the first publicly available authentication result and the second An identity authentication response message of the disclosed authentication result; wherein the first publicly available authentication result is that the first identity card sent by the accessor by the authentication server After the identification of the other information, it is determined that the second publicly available authentication result is determined by the authentication server to identify the second identity authentication information sent by the visitor.
本发明的优点是:  The advantages of the invention are:
本发明提出的网络访问控制方法及系统, 是在有鉴别服务器参与且目的 网络的访问控制器无法直接利用鉴别服务器提供的鉴别服务的情况下, 完成 对访问者身份鉴别的网络访问控制方法。 本发明基于非对称密码机制, 在访 问者提出访问请求后, 由目的网络中的访问控制器对访问请求进行处理, 并 通过访问者向鉴别服务器发起对访问者身份的鉴别请求, 目的网络中的访问 控制器根据由访问者转发的鉴别服务器的可公开的鉴别结果完成对访问者身 份的鉴别, 并根据授权策略对鉴别成功的访问者进行授权管理。 本发明解决 了在访问控制器无法直接使用鉴别服务器提供的鉴别服务时导致的无法实施 访问控制的问题, 满足了实际应用需求。 附图说明  The network access control method and system proposed by the present invention completes a network access control method for authenticating a visitor identity in the case where an authentication server participates and the access controller of the destination network cannot directly utilize the authentication service provided by the authentication server. The invention is based on an asymmetric cryptosystem, and after the visitor makes an access request, the access controller in the destination network processes the access request, and the visitor initiates an authentication request for the identity of the visitor to the authentication server, in the destination network. The access controller completes the authentication of the identity of the visitor according to the publicly available authentication result of the authentication server forwarded by the visitor, and authorizes the successful authenticated visitor according to the authorization policy. The invention solves the problem that the access control cannot be implemented when the access controller cannot directly use the authentication service provided by the authentication server, and satisfies the practical application requirements. DRAWINGS
图 1是本发明提供的访问控制方法流程图。  1 is a flow chart of an access control method provided by the present invention.
图 2为本发明提供的访问控制系统的工作简图。  2 is a schematic diagram of the operation of the access control system provided by the present invention.
图 3为图 2中步骤 S1的细化框图。  Figure 3 is a detailed block diagram of step S1 in Figure 2.
图 4为图 2中步骤 S2的细化框图。  Figure 4 is a detailed block diagram of step S2 in Figure 2.
图 5为图 2中步骤 S3的细化框图。  Figure 5 is a detailed block diagram of step S3 in Figure 2.
图 6为图 2中步骤 S4的细化框图。  Figure 6 is a detailed block diagram of step S4 in Figure 2.
图 7为图 2中步骤 S5的细化框图。  Figure 7 is a detailed block diagram of step S5 in Figure 2.
图 8为图 2中步骤 S6的细化框图。 具体实施方式  Figure 8 is a detailed block diagram of step S6 in Figure 2. detailed description
请参考图 2 , 本发明提供了一种访问控制系统 100。 访问控制系统 100包 括访问者 REQ、 鉴别服务器 AS以及访问控制器 AC:。 在系统 100工作之前, 访问者 REQ和访问控制器 AC均已持有鉴别服务器 AS的公钥。 请参考图 1至图 8,网络访问控制系统 100是通过 S1 S6六个步骤完成对 访问者 REQ的鉴别和授权的。 Referring to FIG. 2, the present invention provides an access control system 100. The access control system 100 includes a visitor REQ, an authentication server AS, and an access controller AC:. Prior to the operation of system 100, both the visitor REQ and the access controller AC have the public key of the authentication server AS. Referring to FIG. 1 to FIG. 8, the network access control system 100 completes the authentication and authorization of the visitor REQ through six steps of S1 S6.
步骤 S1 : 请参考图 3 , 访问者 REQ向目的网络的访问控制器 AC发送访 问请求消息 Ml。 访问请求消息 Ml中含有 QREQ和访问者 REQ的身份鉴别信 息 12。 其中, QREQ表示访问者 EQ的访问请求, 身份鉴别信息 12用来向鉴 别服务器 AS证明访问者 REQ身份的合法性, 下同。  Step S1: Referring to FIG. 3, the visitor REQ sends an access request message M1 to the access controller AC of the destination network. The access request message M1 contains the identity authentication information of the QREQ and the visitor REQ. The QREQ indicates the access request of the visitor EQ, and the identity authentication information 12 is used to prove the validity of the visitor REQ identity to the authentication server AS, the same below.
步骤 S2: 请参考图 4, 访问控制器 AC收到访问请求消息 Ml后, 构造接 入鉴别请求消息 M2发送给访问者 REQ。 接入鉴别请求消息 M2含有访问控 制器 AC的数字签名 SIG1和身份鉴别信息 II , 数字签名 SIG1用以向访问者 REQ证明访问控制器 AC身份的合法性, 身份鉴别信息 II用来向鉴别服务器 AS证明访问控制器 AC身份的合法性。  Step S2: Referring to FIG. 4, after the access controller AC receives the access request message M1, the constructive access authentication request message M2 is sent to the visitor REQ. The access authentication request message M2 contains the digital signature SIG1 of the access controller AC and the identity authentication information II. The digital signature SIG1 is used to prove the validity of the access controller AC identity to the visitor REQ, and the identity authentication information II is used to authenticate the server AS. Prove the legality of accessing the controller's AC identity.
步骤 S3: 请参考图 5, 访问者 REQ收到接入鉴别请求消息 M2后, 构造 身份鉴别请求消息 M3发送给鉴别服务器 AS。 身份鉴别请求消息 M3中包含 了访问控制器 AC的身份鉴别信息 II , 以及访问者 REQ的身份鉴別信息 12。  Step S3: Referring to FIG. 5, after the visitor REQ receives the access authentication request message M2, the constructive identity authentication request message M3 is sent to the authentication server AS. The identity authentication request message M3 contains the identity authentication information II of the access controller AC and the identity authentication information 12 of the visitor REQ.
步骤 S4: 请参考图 6, 鉴别服务器 AS对身份鉴别请求消息 M3中所述的 访问控制器 AC的身份鉴别信息 II 以及访问者 REQ的身份鉴别信息 12进行 验证,并分别产生对访问控制器 AC的可公开的鉴别结果 C1和对访问者 REQ 的可公开的鉴别结果 C2 , 鉴别服务器 AS构造身份鉴别响应消息 M4发送给 访问者 REQ。 其中, 身份鉴别响应消息 M4 包含所述可公开的鉴别结果 C1 和 C2。  Step S4: Referring to FIG. 6, the authentication server AS verifies the identity authentication information II of the access controller AC and the identity authentication information 12 of the visitor REQ in the identity authentication request message M3, and generates an access controller AC respectively. The publicly available authentication result C1 and the publicly available authentication result C2 to the visitor REQ, the authentication server AS constructs the identity authentication response message M4 and sends it to the visitor REQ. The identity authentication response message M4 includes the publicly available authentication results C1 and C2.
步骤 S5: 请参考图 7 , 访问者 REQ收到身份鉴别响应消息 M4后, 根据 可公开的鉴别结果 C1对所述数字签名 SIG1进行验证, 并根据验证结果选择 是否构造接入鉴别响应消息 M5发送给目的网络的访问控制器 AC。如果发送, 则接入鉴别响应消息 M5 中包含所述可公开的鉴别结果 C2 以及访问者 REQ 的数字签名 SIG2。 数字签名 SIG2用以向访问控制器 AC证明访问者 REQ身 份的合法性。  Step S5: Referring to FIG. 7, after receiving the identity authentication response message M4, the visitor REQ verifies the digital signature SIG1 according to the publicly available authentication result C1, and selects whether to construct the access authentication response message M5 according to the verification result. Give the access controller AC to the destination network. If transmitted, the access authentication response message M5 contains the publicly available authentication result C2 and the digital signature SIG2 of the visitor REQ. Digital Signature SIG2 is used to prove to the access controller AC the legitimacy of the visitor's REQ identity.
步骤 S6: 请参考图 8, 访问控制器 AC收到接入鉴别响应消息 M5后, 根 据可公开的鉴别结果 C2验证数字签名 SIG2 , 并根据验证结果及授权策略构 造访问响应消息 M6发送给访问者 REQ, 访问响应消息 M6中包含是否授权 访问者 REQ 对所述目的网络进行访问的信息。 至此, 完成本发明对访问者 REQ的鉴别和授权的过程。 其中, 所述授权策略是指访问控制器 AC对访问 者 REQ的访问请求 QREQ进行授权的策略, 所述授权策略可以来自某一服务 器, 例如鉴别服务器 AS , 也可以来自访问控制器 AC本地。 所述授权策略已 事先内置于所述鉴别服务器 AS或访问控制器 AC中,本发明仅对所述授权策 略进行调用。 Step S6: Referring to FIG. 8, after the access controller AC receives the access authentication response message M5, the root The digital signature SIG2 is verified according to the publicly available authentication result C2, and the access response message M6 is constructed and sent to the visitor REQ according to the verification result and the authorization policy. The access response message M6 includes information for authorizing the visitor REQ to access the destination network. . So far, the process of authenticating and authorizing the visitor REQ of the present invention has been completed. The authorization policy refers to a policy for the access controller AC to authorize the access request QREQ of the visitor REQ, and the authorization policy may be from a certain server, such as the authentication server AS, or may be from the access controller AC. The authorization policy has been previously built in the authentication server AS or the access controller AC, and the present invention only invokes the authorization policy.
按照步骤 S 1~S6所示之方法运作系统 100, 即可实现对访问者 REQ的鉴 别和授权, 以满足对访问者进行访问控制的实际应用需求。  By operating the system 100 in the manner shown in steps S1 to S6, the identification and authorization of the visitor REQ can be realized to meet the practical application requirements for access control of the visitor.
根据本发明提供的上述方法, 本发明提供一种具备相应功能的访问装置, 包括:  According to the above method provided by the present invention, the present invention provides an access device having a corresponding function, including:
访问请求交互模块, 用于向一目的网络的一访问控制器发送访问请求消 息, 所述访问请求消息中包含所述访问者的第二身份鉴别信息; 并接收所述 访问控制器发送的包含一第一数字签名和所述访问控制器的第一身份鉴别信 息的接入鉴别请求消息;  An access request interaction module, configured to send an access request message to an access controller of a destination network, where the access request message includes the second identity authentication information of the visitor; and receive the content that is sent by the access controller a first digital signature and an access authentication request message of the first identity authentication information of the access controller;
鉴别请求交互模块, 用于向一鉴别服务器发送一身份鉴别请求消息, 所 述身份鉴别请求消息中包含所述第一身份鉴别信息和所述第二身份鉴别信 息; 并接收所述鉴别服务器发送的身份鉴别响应消息, 所述身份鉴别响应消 息中包含根据所述第一身份鉴别信息对所述访问控制器进行身份鉴别后的第 一可公开的鉴别结果和根据所述第二身份鉴别信息对所述访问者进行身份鉴 别后的第二可公开的鉴别结果;  An authentication request interaction module, configured to send an identity authentication request message to an authentication server, where the identity authentication request message includes the first identity authentication information and the second identity authentication information; and receiving the identifier sent by the authentication server An identity authentication response message, where the identity authentication response message includes a first publicly available authentication result after authenticating the access controller according to the first identity authentication information, and a second identity authentication information according to the second identity authentication information Depicting a second publicly identifiable authentication result after the visitor performs identity authentication;
鉴别结果交互模块, 用于根据所述第一可公开的鉴别结果对所述第一数 字签名进行验证, 并根据验证结果选择是否构造包含所述第二可公开的鉴别 结果和所述访问者的第二数字签名的接入鉴别响应消息发送给所述访问控制 器, 并接收所述访问器发送的访问响应消息。  An authentication result interaction module, configured to verify the first digital signature according to the first publicly available authentication result, and select whether to construct the second publicly available authentication result and the visitor according to the verification result The second digitally signed access authentication response message is sent to the access controller, and receives an access response message sent by the accessor.
本发明还提供一种鉴别服务器, 包括: 鉴别请求接收模块, 用于接收一访问者发送的身份鉴别请求消息, 所述 身份鉴别请求消息中包含目的网络一访问控制器的第一身份鉴别信息和所述 访问者的第二身份鉴别信息; The invention also provides an authentication server, comprising: An authentication request receiving module, configured to receive an identity authentication request message sent by a visitor, where the identity authentication request message includes first identity authentication information of the destination network one access controller and second identity authentication information of the visitor;
鉴别执行模块, 用于根据所述第一身份鉴别信息产生对所述访问控制器 进行身份鉴别后的第一可公开的鉴别结果, 以及根据所述第二身份鉴别信息 产生对所述访问者进行身份鉴别后的第二可公开的鉴别结果;  An authentication execution module, configured to generate, according to the first identity authentication information, a first publicly available authentication result after performing identity authentication on the access controller, and generate, according to the second identity authentication information, the visitor a second publicly identifiable authentication result after identity authentication;
鉴别响应发送模块, 用于构造一身份鉴别响应消息发送给所述访问者, 所述身份鉴别响应消息中包含所述第一可公开的鉴别结果及第二可公开的鉴 别结果。  The authentication response sending module is configured to send an identity authentication response message to the visitor, where the identity authentication response message includes the first publicly available authentication result and the second publicly available authentication result.
本发明还提供一种访问控制器, 包括:  The invention also provides an access controller, comprising:
访问请求接收模块, 用于接收一访问者发送的访问请求消息, 所述访问 请求消息中携带所述访问者的第二身份鉴别信息;  An access request receiving module, configured to receive an access request message sent by a visitor, where the access request message carries the second identity authentication information of the visitor;
接入鉴别请求构造模块, 用于构造一接入鉴别请求消息发送给所述访问 者, 所述接入鉴别请求消息中包含所述访问控制器的第一身份鉴別信息和第 一数字签名;  An access authentication request constructing module, configured to send an access authentication request message to the visitor, where the access authentication request message includes first identity authentication information and a first digital signature of the access controller;
接入鉴别响应接收模块, 用于接收所述访问者发送的接入鉴别响应消息 得到第二可公开的鉴别结果及由所述访问者发送的第二数字签名; 所述接入 鉴别响应消息根据第一可公开的鉴别结果并对所述第一数字签名进行验证通 过后构造; 所述第一可公开的鉴别结果是由所述鉴别服务器对由所述访问者 发送的所述第一身份鉴别信息进行鉴别后确定, 所述第二鉴别结果是由所述 鉴别服务器对由所述访问者发送的第二身份鉴别信息进行鉴别后确定;  An access authentication response receiving module, configured to receive an access authentication response message sent by the visitor, to obtain a second publicly available authentication result, and a second digital signature sent by the visitor; a first publicly identifiable authentication result and a verification of the first digital signature by a post-construction; the first publicly identifiable authentication result is the first identity authentication sent by the authentication server to the visitor After the information is authenticated, it is determined that the second authentication result is determined by the authentication server to identify the second identity authentication information sent by the visitor;
访问响应发送模块, 用于根据获得的所述第二可公开的鉴别结果对所述 第二数字签名进行验证, 并根据验证结果以及授权策略, 构造一访问响应消 息发送给所述访问者。  The access response sending module is configured to verify the second digital signature according to the obtained second publicly available authentication result, and construct an access response message to be sent to the visitor according to the verification result and the authorization policy.
根据本发明的上述方法, 一种具备相应功能的访问控制系统, 包括访问 者、 鉴别服务器、 目的网络的访问控制器, 其中:  According to the above method of the present invention, an access control system having a corresponding function includes a visitor, an authentication server, and an access controller of the destination network, wherein:
所述访问者, 用于向所述访问控制器发送访问请求消息, 所述访问请求 消息中携带所述访问者的第二身份鉴别信息; 并接收所述访问控制器发送的 接入鉴别请求消息, 所述接入鉴别请求消息中包含所述访问控制器的第一身 份鉴别信息和第一数字签名; 以及 The visitor, configured to send an access request message to the access controller, where the access request is The message carries the second identity authentication information of the visitor; and receives an access authentication request message sent by the access controller, where the access authentication request message includes the first identity authentication information of the access controller and First digital signature;
用于向鉴别服务器发送包含所述第一身份鉴别信息和第二身份鉴别信息 的身份鉴别请求消息, 并接收所述鉴别服务器返回的包含第一可公开的鉴别 结果和第二可公开的鉴别结果身份鉴别响应消息; 以及  And sending an identity authentication request message including the first identity authentication information and the second identity authentication information to the authentication server, and receiving the first publicly available authentication result and the second publicly available authentication result returned by the authentication server Identity authentication response message;
用于根据所述第一可公开鉴别结果并对所述第一数字签名进行验证通过 后构造接入鉴别响应消息发送给所述访问控制器, 所述接入鉴别响应消息中 包含所述第二可公开的鉴别结果及由所述访问者产生的第二数字签名, 并接 收所述访问控制器发送的访问响应消息;  And configured to send, according to the first publicly discriminable result, the first digital signature to the access controller, the access authentication response message is sent to the access controller, where the access authentication response message includes the second a publicly discriminable authentication result and a second digital signature generated by the visitor, and receiving an access response message sent by the access controller;
所述访问控制器, 用于接收所述访问者发送的访问请求消息, 并构造所 述接入鉴别请求消息发送给所述访问者; 以及  The access controller is configured to receive an access request message sent by the visitor, and construct the access authentication request message to be sent to the visitor;
用于接收所述访问者发送的接入鉴别响应消息得到所述第二可公开的鉴 别结果以及所述第二数字签名 , 根据获得的所述第二可公开的鉴別结果对所 述第二数字签名进行验证, 并根据验证结果以及授权策略, 构造所述访问响 应消息发送给所述访问者;  And receiving, by the access identifier sent by the visitor, the second publicly available authentication result and the second digital signature, according to the obtained second publicly available authentication result, to the second The digital signature is verified, and the access response message is constructed and sent to the visitor according to the verification result and the authorization policy;
所述鉴别服务器, 用于接收所述访问者发送的包含所述第一身份鉴别信 息和第二身份鉴别信息的身份鉴别请求消息, 并返回包含所述第一可公开的 鉴别结果和第二可公开的鉴别结果的身份鉴别响应消息; 其中, 所述第一可 公开的鉴别结果是由所述鉴别服务器对由所述访问者发送的所述第一身份鉴 别信息进行鉴别后确定, 所述第二可公开的鉴别结果是由所述鉴别服务器对 由所述访问者发送的第二身份鉴别信息进行鉴别后确定。  The authentication server is configured to receive an identity authentication request message that is sent by the visitor and includes the first identity authentication information and the second identity authentication information, and return the first publicly available authentication result and the second An identity authentication response message of the public authentication result; wherein, the first publicly available authentication result is determined by the authentication server to identify the first identity authentication information sent by the visitor, where The second publicly discriminable result is determined by the authentication server identifying the second identity authentication information sent by the visitor.
上述步骤 S1的一种具体实施例是:  A specific embodiment of the above step S1 is:
访问者 REQ构造 NREQIIIREQIIQREQ发送给访问控制器 AC, 在本实施例中 NREQIIIREQIIQREQ即为访问请求消息 Ml , 在其他实施例中, 请求消息 Ml还可 为其他消息且所述其他消息中至少包含 NREQIIIREQI IQREQD  The NREQIIIREQIIQREQ is sent to the access controller AC. In this embodiment, the NREQIIIREQIIQREQ is the access request message M1. In other embodiments, the request message M1 may also be other messages and the other messages include at least NREQIIIREQI IQREQD.
其中, IREQ表示访问者 REQ的身份鉴别信息, 即身份鉴别信息 12, 用来 向鉴别服务器 AS证明访问者 REQ身份的合法性, NREQ表示访问者 REQ产 生的随机数, 1" 表示其前后两信息之间为串联, 下同。 Where IREQ represents the identity authentication information of the visitor REQ, that is, the identity authentication information 12, used to The validity of the visitor REQ identity is proved to the authentication server AS, NREQ represents the random number generated by the visitor REQ, and 1" indicates that the two messages are connected in series, the same below.
上述步骤 S2的一种具体实施例是:  A specific embodiment of the above step S2 is:
访问控制器 AC收到访问请求消息 Ml即 NREQI |IREQ| IQREQ后,构造接入鉴 别请求消息 Μ2即 NREQIINACIIIREQIIIACIISA^NREQIINACIIIREQ)发送给访问者 REQ, 在其他 实施例 中 , 接入鉴别 请求 消 息 M2 为 一至 少 包含 NREQIINACIIIREQIIIACIISA^NREQIINACIIIREQ)的消息。  After receiving the access request message M1, that is, NREQI |IREQ| IQREQ, the access controller AC constructs an access authentication request message Μ2, that is, NREQIINACIIIREQIIIACIISA^NREQIINACIIIREQ), and sends it to the visitor REQ. In other embodiments, the access authentication request message M2 is one. A message containing at least NREQIINACIIIREQIIIACIISA^NREQIINACIIIREQ).
其中, NAC表示访问控制器 AC产生的随机数, IAC表示访问控制器 AC 的身份鉴别信息, 即身份鉴别信息 II, 用来向鉴别服务器 AS证明访问控制器 AC身份的合法性, SA^NREQIINACIIIREQ)表示访问控制器 AC对 NREQIINAC REQ 的签名, 即数字签名 SIG1。 The N AC represents the random number generated by the access controller AC, and the I AC represents the identity authentication information of the access controller AC, that is, the identity authentication information II, which is used to prove the validity of the access controller AC identity to the authentication server AS, SA^ NREQIINACIIIREQ) indicates the signature of the access controller AC to the NREQIINAC REQ, ie the digital signature SIG1.
上述步骤 S3的一种具体实施例是:  A specific embodiment of the above step S3 is:
访 问 者 REQ 收 到 接 入 鉴 别 请 求 消 息 M2 即 NREQIINACIIIREQIIIACIISA^NREQIINACIIIREQ)后, 首先判断 NREQ是否访问者 REQ产 生的随机数, 如果不是, 丟弃该鉴别请求消息 M2; 如果是, 构造身份鉴别请 求消息 M3即 N'REQ||NAC||IREQ||Iac发送给鉴别服务器 AS。 其中, N'REQ为访问 者 REQ产生的随机数, 下同。 After receiving the access authentication request message M2, that is, NREQIINACIIIREQIIIACIISA^NREQIINACIIIREQ, the visitor REQ first determines whether the NREQ is a random number generated by the visitor REQ, and if not, discards the authentication request message M2; if yes, constructs the identity authentication request message M3 That is, N'REQ||N AC ||IREQ||I ac is sent to the authentication server AS. Where N'REQ is the random number generated by the visitor REQ, the same below.
在其他实施例中,身份鉴别请求消息 M3为一至少包含 N'REQ||NAC||IREQ||IAC 的消息。 In other embodiments, the identity authentication request message M3 is a message containing at least N'REQ||N AC ||IREQ||I AC .
上述步骤 S4的一种具体实施例是:  A specific embodiment of the above step S4 is:
鉴别服务器 AS 收到访问者 REQ 的身份鉴别请求消息 M3 即 N'REQIINACIIIREQII C后, 验证 IREQ和 IAC, 并构造身份鉴别响应消息 M4 即
Figure imgf000012_0001
REQ。
After the authentication server AS receives the identity authentication request message M3 of the visitor REQ, that is, N'REQIINACIIIREQII C, it verifies the IREQ and I AC , and constructs an identity authentication response message M4.
Figure imgf000012_0001
REQ.
其中, Res(IAC)即为可公开的鉴别结果 C1 ,其中包含鉴别服务器 AS对 IAC 的验证结果以及访问控制器 AC的公钥; Res(lREQ)即为可公开的鉴别结果 C2, 其中包含鉴别服务器 AS 对 IREQ的验证结果以及访问者 REQ 的公钥; SAS(N,REQ||RES(IAC))和 SAS(NAC||ReS(lREQ》分别表示鉴别服务器 AS 对 N,REQ||Res(;iAC;)和 NAC||Res(lREQ:)的数字签名。 The Res (I AC ) is a publicly available authentication result C1, which includes the authentication result of the authentication server AS to the I AC and the public key of the access controller AC; Res (lREQ) is the publicly available authentication result C2, where Contains the authentication result of the authentication server AS for the IREQ and the public key of the visitor REQ; S AS (N, REQ||R ES (I AC )) and S AS (N AC ||R eS (lREQ) respectively represent the authentication server AS Correct N, RE Q ||Res(;i AC ;) and N AC ||Res(lREQ:) digital signature.
在其他实施例 中 , 身份鉴别响应 消 息 M4 为一至少 包含 Res(lREQ)| |Res(IAC)| I SAS(N'REQ| |Res(IAC))|| SAS(NAC| |Res(lREQ》的消息。 In other embodiments, the identity authentication response message M4 is one containing at least Res(lREQ)| |Res(I AC )| IS A S(N'REQ| |Res(I AC ))|| S AS (N AC | |Res (lREQ) message.
上述步骤 S5的一种具体实施例是:  A specific embodiment of the above step S5 is:
访问者 REQ收到鉴别服务器 AS的身份鉴别响应消 息 M4即 The visitor REQ receives the identity authentication response message of the authentication server AS, M4
Re^lRE llRe^lACA^N'REQllRe^lAc IISA^NAcllRe^lREQ))后, 首先利用所述鉴 别服务器 AS的公钥验证签名 SAS(N,REQ||:Res(IAC》的有效性, 若有效, 则判断签 名 SAS(N,REQ||Res(IAC))中的 N'REQ是否与访问者 REQ在步骤 S3中发送给鉴别服 务器 AS的随机数 N'REQ—致, 若一致, 则访问者 REQ根据鉴别结果 Res(IAC)即 可公开的鉴别结果 C1 , 判断访问控制器 AC的身份是否合法, 若合法, 则从 Res(IAC)中获得所述访问控制器 AC的公钥, 并利用该公钥验证访问控制器 AC 在步骤 S2中发送给访问者 REQ的数字签名 SIG1即 SA^NREQIINACIIIREQ)的有效 性 , 若有效 , 则 访 问 者 REQ构造接入鉴别 响应 消 息 M5 即 ResGw^llSAsCNAcllResGREo IISREQCNREQllNAcl llAc)发送给访问控制器 AC , 该消 息中包含可公开的鉴别结果 C2即 Res lREQ) , 该消息中的 SREQ NREQIINACII C)表 示访问者 REQ对 NREQ| |NAC| |Iac的签名, 即数字签名 SIG2。 After Re^lRE llRe^lACA^N'REQllRe^lAc IISA^NAcllRe^lREQ)), first verify the validity of the signature S AS (N, REQ||: Res(I AC 》) by using the public key of the authentication server AS If it is valid, it is determined whether the N'REQ in the signature S AS (N, RE Q ||Res (I AC )) is consistent with the random number N'REQ sent by the visitor REQ to the authentication server AS in step S3. If they are consistent, the visitor REQ can determine whether the identity of the access controller AC is legal according to the authentication result C1 that can be publicized according to the authentication result Res(I AC ). If it is legal, the access controller is obtained from Res (I AC ). The public key of the AC, and using the public key to verify the validity of the digital signature SIG1 (SA^NREQIINACIIIREQ) sent by the access controller AC to the visitor REQ in step S2, if valid, the visitor REQ constructs an access authentication response message M5 is ResGw^llSAsCNAcllResGREo IISREQCNREQllNAcl llAc) is sent to the access controller AC, the message contains the publicly identifiable authentication result C2 (Res lREQ), and the SREQ NREQIINACII C) in the message indicates the visitor REQ to NREQ| |N AC | The signature of I ac , the digital signature SIG2.
以下情况访问者 REQ将终止访问:  The following circumstances, the visitor REQ will terminate the access:
1 )、 验证签名 SAS(N'REQ||Res(IAC))无效; 1), verify that the signature S AS (N'RE Q ||Res(I AC )) is invalid;
2 )、 虽然验证签名 SAS(N'REQ||Res(IAC))有效, 但判断随机数 N'REQ不一致; 3 )、 虽然验证签名 SAS(N,REQ||Res(IAC))有效, 且判断随机数 N'REQ—致, 但判断访问控制器 AC身份非法; 2), although the verification signature S AS (N'REQ||Res(I AC )) is valid, but the judgment random number N'REQ is inconsistent; 3), although the verification signature S AS (N, REQ||Res(I AC ) ) is valid, and the random number N'REQ is judged, but the access controller AC identity is illegal;
4 )、 虽然验证签名 SAS(N,REQ||Res(IAC))有效, 且判断随机数 N'REQ—致, 且判断访问控制器 AC身份合法, 但验证签名 SA^NREQIINACIIIREQ)无效。 4), although the verification signature S AS (N, REQ||Res (I AC )) is valid, and the random number N'REQ is determined, and the access controller AC identity is determined to be valid, but the verification signature SA^NREQIINACIIIREQ) is invalid.
在其他实施例 中 , 接入鉴别响应 消 息 M5 为一至少 包含
Figure imgf000013_0001
llAc)的消息。
In other embodiments, the access authentication response message M5 is at least one of
Figure imgf000013_0001
llAc) message.
上述步骤 S6的一种具体实施例是:  A specific embodiment of the above step S6 is:
访问控制器 AC 收到访问者 REQ 的接入鉴别响应消息 M5 即 Res lRj^llSAs NAcllRes lREQ^ISREQCNREQllNAclllAc)后, 首先利用所述鉴别服务器 AS 的公钥验证签名 SAS(NAC||Res(lREQ))的有效性, 若有效, 则根据 Res(lREQ) 即可公开的鉴别结果 C2 判断访问者 REQ 是否合法, 若合法, 则判断签名 SAS(NAC||Res(lREQ))中的 NAC是否与访问控制器 AC在步骤 S2中发送的随机数 NAC—致, 若一致, 则访问控制器 AC从 Res(lREQ)中获得所述访问者 REQ的 公钥, 并利用该公钥验证签名 SREQ(NREQ||NAC||Iac)的有效性, 若有效, 则访问 控制器 AC判断包含在该签名 SRK^NREQIINACIIIAC)中的 IAC是否与访问控制器 AC在步骤 S2中发送的 IAC—致, 若一致, 则判断签名 SREC^NREQIINACIIIAC)中 的 NAC是否与访问控制器 AC在步骤 S2中发送的随机数 NAC—致, 若一致, 则访问控制器 AC根据所述授权策略判断访问者 REQ在步骤 S1 中发送的访 问请求 QREQ是否合法, 若合法, 则根据 QREQ构造应答数据, 并构造访问响应 消息 M6发送给访问者 REQ, 访问响应消息 M6包含所述应答数据发送给访 问者 REQ, 所述应答数据用于通知访问者 REQ是否有权访问所述目的网络。 基于此, 访问者 REQ对于所述目的网络的访问行为得以受到控制。 The access controller AC receives the access authentication response message M5 of the visitor REQ. After Res lRj^llSAs NAcllRes lREQ^ISREQCNREQllNAclllAc), the validity of the signature S AS (N AC ||Res(lREQ)) is first verified by the public key of the authentication server AS, and if valid, according to Res(lRE Q ) C2 may be disclosed authentication result determines whether legitimate visitors REQ, if valid, it is determined that the signature S AS (N AC || Res ( lRE Q)) N AC in the access controller AC whether the random number transmitted in step S2 N AC . If, in agreement, the access controller AC obtains the public key of the visitor REQ from Res (lREQ), and uses the public key to verify that the signature SREQ (NREQ||N AC ||I ac ) is valid. If yes, the access controller AC determines whether the I AC included in the signature SRK^NREQIINACIIIAC) is consistent with the I AC sent by the access controller AC in step S2, and if yes, determines the signature SREC^NREQIINACIIIAC) Whether the N AC is consistent with the random number N AC sent by the access controller AC in step S2, if the agreement is the same, the access controller AC determines, according to the authorization policy, whether the access request QREQ sent by the visitor REQ in step S1 is Legal, if legal, construct response data based on QREQ And configured to send access response visitors REQ message M6, M6 access response message comprising the response data to the visitors REQ, whether the response data for visitors REQ notifies the network has access to the destination. Based on this, the access behavior of the visitor REQ to the destination network is controlled.
其中, 访问控制器 AC对访问者 REQ的授权策略可以来自本地, 也可以 由其他服务器如鉴别服务器 AS提供, 当由鉴别服务器 AS提供时, 则需要将 步 骤 S4 的 身 份 鉴 别 响 应 消 息 M4 即 Res(lREQ)| |Res(IAC)| I SAS(N'REQ| |Res(IAC))|| SAS(NAC| |Res(lREQ)) 修 改 为 Res(lREQ)| |Res(IAC)| I SAS(N'REQ| |Res(IAC))|| SAS(NAC| |Res(lREQ)| | APAS), 其中 APAS表 示所述授权策略, 此时步骤 S5 中的接入鉴别响应消息 M5 即 Res(lREQ)| I SAS(NAC| |Res(lREQ))| I SREQ(NREQ| |NAC| |IAC) 需 相 应 修 改 为 Res(IREQ)||SAS(NAc||Res(IREQ)||APAS)||SREQ(NREQ||NAc||IAc)o The authorization policy of the access controller AC to the visitor REQ may be local, or may be provided by another server, such as the authentication server AS. When provided by the authentication server AS, the identity authentication response message M4 of step S4 needs to be Res ( lRE Q )| |Res(I AC )| IS AS (N'REQ| |Res(I AC ))|| S AS (N AC | |Res(lRE Q )) Modified to Res(lRE Q )| |Res (I AC )| IS AS (N'REQ| |Res(I AC ))|| S AS (N AC | |Res(lREQ)| | AP AS ), where AP AS represents the authorization policy, and the step The access authentication response message M5 in S5 is Res(lRE Q )| IS AS (NAC| |Res(lRE Q ))| I SREQ(NREQ| |N AC | |IAC) needs to be modified to Res(I REQ ) ||SA S (N A c||Res(I REQ )||AP AS )||S RE Q(N REQ ||N A c||I A c)o
以下情况访问控制器 AC都将拒绝访问者 REQ的访问:  Access to the controller AC will deny access to the visitor REQ in the following cases:
1 )、 验证签名 SAS(NAC||Res(lREQ))无效; 1), the verification signature S AS (N AC ||Res (lREQ)) is invalid;
2 )、 虽然验证签名 SAS(NAC||Res(lREQ))有效, 但判断访问者 REQ非法;2), although the verification signature S AS (N AC ||Res(lRE Q )) is valid, it is determined that the visitor REQ is illegal;
3 )、 虽然验证签名 SAS(NAC||Res(lREQ))有效, 且判断访问者 REQ合法, 但 判断随机数 NAC不一致; 4 )、 虽然验证签名 SAS(NAC||Res(lREQ))有效, 且判断访问者 REQ合法, 且 判断随机数 NAC—致, 但验证签名 SRK^NREQIINACIIIAC)无效; 3), although the verification signature S AS (N AC ||Res (lREQ)) is valid, and it is determined that the visitor REQ is legal, but the random number N AC is determined to be inconsistent; 4), although the verification signature S AS (N AC ||Res(lREQ)) is valid, and it is judged that the visitor REQ is legal, and the random number N AC is determined, but the verification signature SRK^NREQIINACIIIAC) is invalid;
5 )、 虽然验证签名 SAS(NAC||Res(lREQ))有效, 且判断访问者 REQ合法, 且 判断随机数 NAC—致, 且验证签名 SREQ(NREQ||NAC||Iac)有效, 但判断签名 SREQ( REQ||NAC| |Iac)中的 IAC与访问控制器 AC的身份信息不一致; 5), although the verification signature S AS (N AC ||Res(lREQ)) is valid, and it is judged that the visitor REQ is legal, and the random number N AC is judged, and the signature SREQ is verified (NREQ||N AC ||I ac ) is valid, but it is determined that the I AC in the signature SREQ( REQ||N AC | |I ac ) is inconsistent with the identity information of the access controller AC;
6 )、 虽然验证签名 SAS(NAC||Res(lREQ))有效, 且判断访问者 REQ合法, 且 判断随机数 NAC—致, 且验证签名 SREC^NREQIINACII C)有效, 且判断签名 SREQCNREQIINACI IIAC)中的 IAC与访问控制器 AC 的身份信息一致, 但判断签名 SREQ(NREQ||NAC| |Iac)中的随机数 NAC不一致; 6), although the verification signature S AS (N AC ||Res(lREQ)) is valid, and it is judged that the visitor REQ is legal, and the random number N AC is judged, and the verification signature SREC^NREQIINACII C) is valid, and the signature SREQCNREQIINACI is judged. The I AC in IIAC) is consistent with the identity information of the access controller AC, but it is determined that the random number N AC in the signature SREQ (NREQ||N AC | |I ac ) is inconsistent;
7 )、 虽然验证签名 SAS(NAC||Res(lREQ))有效, 且判断访问者 REQ合法, 且 判断随机数 NAC—致, 且验证签名 SREQ(NREQ||NAC||Iac)有效, 且判断签名 SREQ( REQ||NAC| |Iac)中的 IAC与访问控制器 AC 的身份信息一致, 且判断签名 SREQ(NREQ| |NAC| |IAC)中的随机数 NAC一致, 但判断访问者 REQ在步骤 S 1中发 送的访问请求 QREQ不合法。 7), although the verification signature S AS (N AC ||Res(lREQ)) is valid, and it is judged that the visitor REQ is legal, and the random number N AC is judged, and the signature SREQ is verified (NREQ||N AC ||I ac Valid, and determine that the I AC in the signature SREQ( REQ||N AC | |I ac ) is consistent with the identity information of the access controller AC, and determines the random number in the signature SREQ(NREQ| |N AC | |IAC) N AC is consistent, but it is judged that the access request QREQ sent by the visitor REQ in step S1 is invalid.
综上所述, 本发明基于非对称密码技术中的数字签名及验证机制, 实现 了在访问控制器 AC无法直接使用鉴别服务器 AS提供的鉴别服务时、 由访问 者 REQ 与鉴别服务器 AS之间完成鉴别并由访问控制器 AC 完成对访问者 REQ进行授权的访问控制过程。  In summary, the present invention is based on a digital signature and verification mechanism in asymmetric cryptography, and is implemented between the visitor REQ and the authentication server AS when the access controller AC cannot directly use the authentication service provided by the authentication server AS. The access control process that authorizes and authorizes the visitor REQ is authenticated by the access controller AC.
本领域内的技术人员应明白, 本发明的实施例可提供为方法、 系统、 或 计算机程序产品。 因此, 本发明可采用完全硬件实施例、 完全软件实施例、 或结合软件和硬件方面的实施例的形式。 而且, 本发明可采用在一个或多个 其中包含有计算机可用程序代码的计算机可用存储介质 (包括但不限于磁盘 存储器、 CD-ROM、 光学存储器等) 上实施的计算机程序产品的形式。  Those skilled in the art will appreciate that embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
本发明是参照根据本发明实施例的方法、 设备(系统)、 和计算机程序产 品的流程图和 /或方框图来描述的。 应理解可由计算机程序指令实现流程图 和 /或方框图中的每一流程和 /或方框、 以及流程图和 /或方框图中的流程 和 /或方框的结合。 可提供这些计算机程序指令到通用计算机、 专用计算机、 嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器, 使得通 过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流 程图一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功能的 装置。 The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a general purpose computer, a special purpose computer, An embedded processor or processor of another programmable data processing device to generate a machine such that instructions executed by a processor of a computer or other programmable data processing device are generated for implementation in a flow or a flow of flowcharts and/or Or a block diagram of a device in a box or a function specified in a plurality of boxes.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设 备以特定方式工作的计算机可读存储器中, 使得存储在该计算机可读存储器 中的指令产生包括指令装置的制造品, 该指令装置实现在流程图一个流程或 多个流程和 /或方框图一个方框或多个方框中指定的功能。  The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上, 使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的 处理, 从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图 一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功能的步 骤。  These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
尽管已描述了本发明的优选实施例 , 但本领域内的技术人员一旦得知了 基本创造性概念, 则可对这些实施例作出另外的变更和修改。 所以, 所附权 利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。  Although the preferred embodiment of the invention has been described, it will be apparent to those skilled in the < Therefore, the appended claims are intended to be interpreted as including the preferred embodiments and the modifications and modifications
显然, 本领域的技术人员可以对本发明进行各种改动和变型而不脱离本 发明的精神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权利要 求及其等同技术的范围之内, 则本发明也意图包含这些改动和变型在内。  It is apparent that those skilled in the art can make various modifications and variations to the invention without departing from the spirit and scope of the invention. Thus, it is intended that the present invention cover the modifications and variations of the inventions

Claims

权 利 要 求 Rights request
1、 一种访问控制方法, 其特征在于, 包括:  An access control method, comprising:
步骤 1 ), 一访问者向一目的网络的一访问控制器发送一访问请求消息; 所述访问请求消息中包含所述访问者的第二身份鉴别信息及访问请求;  Step 1), a visitor sends an access request message to an access controller of a destination network; the access request message includes the second identity authentication information and the access request of the visitor;
步骤 2 ), 所述访问控制器收到所述访问请求消息后, 构造一接入鉴别请 求消息发送给所述访问者; 所述接入鉴别请求消息包含一第一数字签名和所 述访问控制器的第一身份鉴别信息;  Step 2), after receiving the access request message, the access controller constructs an access authentication request message and sends the message to the visitor; the access authentication request message includes a first digital signature and the access control First identity authentication information of the device;
步骤 3 ), 所述访问者收到所述接入鉴别请求消息后, 构造一身份鉴别请 求消息发送给所述一鉴别服务器; 所述身份鉴别请求消息中包括所述第一身 份鉴别信息以及所述第二身份鉴别信息;  Step 3), after receiving the access authentication request message, the visitor constructs an identity authentication request message and sends the message to the authentication server. The identity authentication request message includes the first identity authentication information and the Describe the second identity authentication information;
步骤 4 ), 所述鉴别服务器收到所述身份鉴别请求消息后, 对所述第一身 份鉴别信息以及所述第二身份鉴别信息进行鉴别, 并产生对所述访问控制器 的第一可公开的鉴别结果和对所述访问者的第二可公开的鉴别结果; 所述鉴 别服务器构造一包含所述第一可公开的鉴别结果和所述第二可公开的鉴别结 果的身份鉴别响应消息发送给所述访问者;  Step 4), after receiving the identity authentication request message, the authentication server authenticates the first identity authentication information and the second identity authentication information, and generates a first publicly available to the access controller. And a second publicly identifiable result of the visitor; the authentication server constructing an identity authentication response message including the first publicly identifiable authentication result and the second publicly identifiable authentication result To the visitor;
步骤 5 ), 所述访问者收到所述身份鉴别响应消息后, 根据所述第一可公 开的鉴别结果对所述第一数字签名进行验证, 并根据验证结果选择是否构造 一接入鉴别响应消息发送给所述访问控制器; 所述接入鉴别响应消息包括所 述第二可公开的鉴别结果以及所述访问者的第二数字签名;  Step 5), after receiving the identity authentication response message, the visitor verifies the first digital signature according to the first publicly available authentication result, and selects whether to construct an access authentication response according to the verification result. Sending a message to the access controller; the access authentication response message includes the second publicly available authentication result and a second digital signature of the visitor;
步骤 6 ), 所述访问控制器收到所述接入鉴别响应消息后, 根据所述第二 可公开的鉴别结果验证所述第二数字签名, 并根据验证结果及一授权策略构 造一访问响应消息发送给所述访问者; 所述授权策略是所述访问控制器对所 述访问请求进行授权的策略。  Step 6), after receiving the access authentication response message, the access controller verifies the second digital signature according to the second publicly available authentication result, and constructs an access response according to the verification result and an authorization policy. A message is sent to the visitor; the authorization policy is a policy for the access controller to authorize the access request.
2、 如权利要求 1所述的方法, 其特征在于, 所述接入鉴别请求消息中还 包含由所述访问控制器产生的随机数 NAC; 2. The method according to claim 1, wherein the access authentication request message further includes a random number N AC generated by the access controller;
所述访问者发送的所述身份鉴别请求消息中还包含所述 NAC; 所述接入鉴别响应消息中还包含由所述鉴别服务器返回的数字签名The identity authentication request message sent by the visitor further includes the N AC ; The access authentication response message further includes a digital signature returned by the authentication server.
SAS(NAC||Res(lREQ)), 其中 Res(lREQ)表示所述第二鉴别结果, "『表示前后两信 息之间为串联, SAS(NAC||Res(lREQ))表示所述鉴别服务器对 NAC||Res(lREQ)的数字 签名。 S AS (N AC ||Res(lREQ)), where Res(lRE Q ) represents the second authentication result, "" indicates that the two pieces of information are in series, S AS (N AC ||Res(lREQ)) Represents the digital signature of the authentication server for N AC ||Res(lREQ).
3、 如权利要求 2所述的方法, 其特征在于, 所述访问控制器接收所述接 入鉴别响应消息后, 若利用所述鉴别服务器的公钥验证所述数字签名 SAS(NAC||Res(lREQ))为无效, 则拒绝所述访问者访问。 The method according to claim 2, wherein after the access controller receives the access authentication response message, if the public key of the authentication server is used to verify the digital signature S AS (N AC | If |Res(lREQ) is invalid, the visitor is denied access.
4、 如权利要求 2所述的方法, 其特征在于, 所述访问控制器接收所述接 入鉴别响应消息后, 若利用所述鉴别服务器的公钥验证所述数字签名 SAS(NAC||Res(lREQ))为有效,并根据所述第二可公开的鉴别结果判断所述访问者 身份非法, 则拒绝访所述访问者访问。 The method according to claim 2, wherein after the access controller receives the access authentication response message, if the public key of the authentication server is used to verify the digital signature S AS (N AC | |Res(lREQ)) is valid, and judges that the identity of the visitor is illegal according to the second publicly available authentication result, and denies access to the visitor.
5、 如权利要求 2所述的方法, 其特征在于, 所述访问控制器接收所述接 入鉴别响应消息后, 若利用所述鉴别服务器的公钥验证所述数字签名 SAS(NAC||Res(½Q))为有效, 以及 The method according to claim 2, wherein after the access controller receives the access authentication response message, if the public key of the authentication server is used to verify the digital signature S AS (N AC | |Res(1⁄2Q)) is valid, and
根据所述第二可公开的鉴别结果判断所述访问者身份合法, 并判断数字 签名 SAS(NAC||Res(lREQ))中的 NAC与所述接入鉴别请求消息中包含的 NAC不一 致, 则拒绝所述访问者访问。 The discrimination result of the second determining said visitor identity disclosed method, and the digital signature is determined in S AS N AC (N AC || Res (lREQ) ) with the access authentication request message includes N If the AC is inconsistent, the visitor is denied access.
6、 如权利要求 2所述的方法, 其特征在于, 所述访问请求消息中还包含 由所述访问者产生的随机数 NREQ; The method according to claim 2, wherein the access request message further includes a random number NRE Q generated by the visitor;
所述第二可公开的鉴别结果包含所述鉴别服务器对所述第二身份鉴别信 息的验证结果和所述访问者的公钥;  The second publicly available authentication result includes a verification result of the second identity authentication information by the authentication server and a public key of the visitor;
所述第二数字 INACII C), 其中, IAC为所述访问控制器的 第一身份鉴别信息,
Figure imgf000018_0001
AC) 表示所述访问者对 NREQ||NAC||Iac的数 字签名。
The second number INACII C), wherein the I AC is the first identity authentication information of the access controller,
Figure imgf000018_0001
AC) indicates the visitor's digital signature for NREQ||N AC ||I ac .
7、 如权利要求 6所述的方法, 其特征在于, 所述访问控制器接收所述接 入鉴别响应消息后, 若利用所述鉴别服务器的公钥验证所述数字签名 SAS(NAC||ReS(lREQ))为有效, 以及 根据所述第二可公开的鉴别结果判断所述访问者身份合法, 以及 判断数字签名 SAS(NAC||Res(lREQ》中的 NAC与所述接入鉴别请求消息中包 含的 NAC—致, 以及 7. The method according to claim 6, wherein the access controller, after receiving the access authentication response message, verifies the digital signature S AS (N AC | if the public key of the authentication server is used. |R eS (lREQ)) is valid, and Determining the identity of a legitimate visitors, and the judgment of the digital signature S AS N AC (N AC || Res (lREQ " in the access authentication request message containing said second discrimination result according to the disclosed N AC To, and
从所述第二可公开的鉴别结果中获取所述访问者的公钥且利用所述访问 者的公钥验证所述第二数字签名 SREQ(NREQ||NAC||Iac)为无效, 则拒绝所述访问 者访问。 Obtaining the public key of the visitor from the second publicly available authentication result and verifying that the second digital signature SREQ (NREQ||N AC ||I ac ) is invalid by using the public key of the visitor, The visitor is denied access.
8、 如权利要求 6所述的方法, 其特征在于, 所述访问控制器接收所述接 入鉴别响应消息后, 若利用所述鉴别服务器的公钥验证所述数字签名 SAS(NAC||Res(lREQ))为有效, 以及 8. The method according to claim 6, wherein the access controller, after receiving the access authentication response message, verifies the digital signature S AS (N AC | if the public key of the authentication server is used. |Res(lREQ)) is valid, and
根据所述第二可公开的鉴别结果判断所述访问者身份合法, 以及 判断数字签名 SAS(NAC||Res(lREQ》中的 NAC与所述接入鉴别请求消息中包 含的 NAC—致, 以及 Determining the identity of a legitimate visitors, and the judgment of the digital signature S AS (N AC || Res N AC (lRE Q " in the access authentication request message containing the results of discrimination based on said second disclosed N AC , and
从所述第二可公开的鉴别结果中获取所述访问者的公钥且利用所述访问 者的公钥验证所述第二数字签名 SREQ(NREQ||NAC||Iac)有效, 以及 Obtaining the public key of the visitor from the second publicly available authentication result and verifying that the second digital signature SREQ (NREQ||N AC ||I ac ) is valid by using the public key of the visitor, and
判断所述第二数字签名
Figure imgf000019_0001
INACIIIAC)中的 IAC与所述接入鉴别请求 消息中的第一身份鉴别信息不一致, 则拒绝所述访问者访问。
Determining the second digital signature
Figure imgf000019_0001
The I AC in the INACIIIAC) is inconsistent with the first identity authentication information in the access authentication request message, and the visitor access is denied.
9、 如权利要求 6所述的方法, 其特征在于, 所述访问控制器接收所述接 入鉴别响应消息后, 若利用所述鉴别服务器的公钥验证所述数字签名 SAS(NAC||Res(lREQ))为有效, 以及 The method according to claim 6, wherein the access controller, after receiving the access authentication response message, verifies the digital signature S AS (N AC | if the public key of the authentication server is used. |Res(lREQ)) is valid, and
根据所述第二可公开的鉴别结果判断所述访问者身份合法, 以及 判断数字签名 SAS(NAC||Res(lREQ》中的 NAC与所述接入鉴别请求消息中包 含的 NAC—致, 以及 Determining the identity of a legitimate visitors, and the judgment of the digital signature S AS N AC (N AC || Res (lREQ " in the access authentication request message containing said second discrimination result according to the disclosed N AC To, and
从所述第二可公开的鉴别结果中获取所述访问者的公钥且利用所述访问 者的公钥验证所述第二数字签名 SREC^NREQIINACIIIAC)有效, 以及  Obtaining the public key of the visitor from the second publicly available authentication result and verifying that the second digital signature SREC^NREQIINACIIIAC) is valid by using the public key of the visitor, and
判断所述第二数字签名
Figure imgf000019_0002
INACIIIAC)中的 IAC与所述接入鉴别请求 消息中 的第一身份鉴别信息一致, 并判断所述第二数字签名 SREQ(NREQ||NAC| |Iac)中的 NAC与所述接入鉴别请求消息中包含的 NAC不一致, 则拒绝所述访问者访问。
Determining the second digital signature
Figure imgf000019_0002
INACIIIAC) in I AC is consistent with the access authentication information in the authentication request message to the first identity and the second digital signature is determined SREQ (NREQ || N AC | | I ac N AC) and in the The N AC included in the access authentication request message is inconsistent. The visitor is denied access.
10、 如权利要求 6 所述的方法, 其特征在于, 所述访问控制器接收所述 接入鉴别响应消息后, 若利用所述鉴别服务器的公钥验证所述数字签名 SAS(NAC||Res(lREQ))为有效, 以及 10. The method according to claim 6, wherein the access controller, after receiving the access authentication response message, verifies the digital signature S AS (N AC | if the public key of the authentication server is used. |Res(lREQ)) is valid, and
根据所述第二可公开的鉴别结果判断所述访问者身份合法, 以及 判断数字签名 SAS(NAC||Res(lREQ》中的 NAC与所述接入鉴别请求消息中包 含的 NAC—致, 以及 Determining the identity of a legitimate visitors, and the judgment of the digital signature S AS N AC (N AC || Res (lREQ " in the access authentication request message containing said second discrimination result according to the disclosed N AC To, and
从所述第二可公开的鉴别结果中获取所述访问者的公钥且利用所述访问 者的公钥验证所述第二数字签名 SREQ(NREQ||NAC||Iac)有效, 以及 Obtaining the public key of the visitor from the second publicly available authentication result and verifying that the second digital signature SREQ (NREQ||N AC ||I ac ) is valid by using the public key of the visitor, and
判断所述第二数字签名
Figure imgf000020_0001
INACIIIAC)中的 IAC与所述接入鉴别请求 消息中的第一身份鉴别信息一致, 判断所述第二数字签名 SREQ(NREQ||NAC||IAC) 中的 NAC与所述接入鉴别请求消息中包含的 NAC—致, 并根据所述授权策略 判断所述访问者发送的访问请求消息中包含的访问请求不合法, 则拒绝所述 访问者访问。
Determining the second digital signature
Figure imgf000020_0001
INACIIIAC) in I AC is consistent with the access authentication of the first authentication information request message, N AC determines the second digital signature SREQ (NREQ || N AC || I AC) in contact with the The N AC included in the authentication request message is determined, and according to the authorization policy, it is determined that the access request included in the access request message sent by the visitor is invalid, and the visitor is denied access.
11、 如权利要求 6 所述的方法, 其特征在于, 所述访问控制器接收所述 接入鉴别响应消息后, 若利用所述鉴别服务器的公钥验证所述数字签名 SAS(NAC||Res(lREQ))为有效, 以及 The method according to claim 6, wherein after the access controller receives the access authentication response message, if the public key of the authentication server is used to verify the digital signature S AS (N AC | |Res(lREQ)) is valid, and
根据所述第二可公开的鉴别结果判断所述访问者身份合法, 以及 判断数字签名 SAS(NAC||Res(lREQ》中的 NAC与所述接入鉴别请求消息中包 含的 NAC—致, 以及 Determining the identity of a legitimate visitors, and the judgment of the digital signature S AS N AC (N AC || Res (lREQ " in the access authentication request message containing said second discrimination result according to the disclosed N AC To, and
从所述第二可公开的鉴别结果中获取所述访问者的公钥且利用所述访问 者的公钥验证所述第二数字签名 SREQ(NREQ||NAC||Iac)有效, 以及 Obtaining the public key of the visitor from the second publicly available authentication result and verifying that the second digital signature SREQ (NREQ||N AC ||I ac ) is valid by using the public key of the visitor, and
判断所述第二数字签名
Figure imgf000020_0002
INACIIIAC)中的 IAC与所述接入鉴别请求 消息中的第一身份鉴别信息一致, 判断所述第二数字签名
Figure imgf000020_0003
Determining the second digital signature
Figure imgf000020_0002
The I AC in the INACIIIAC) is consistent with the first identity authentication information in the access authentication request message, and determines the second digital signature
Figure imgf000020_0003
中的 NAC与所述接入鉴别请求消息中包含的 NAC—致, 并根据所述授权策略 判断所述访问者发送的访问请求消息中包含的访问请求合法, 则通过所述访 问响应消息通知所述访问者有权访问所述目的网络。 And the N AC in the access authentication request message is consistent with the N AC included in the access authentication request message, and determines, according to the authorization policy, that the access request included in the access request message sent by the visitor is legal, and the access response message is passed. Notifying the visitor that the visitor has access to the destination network.
12、 如权利要求 1 所述的方法, 其特征在于, 所述第一可公开的鉴别结 果包含所述鉴别服务器对所述第一身份鉴别信息的验证结果和所述访问控制 器的公钥; The method according to claim 1, wherein the first publicly available authentication result comprises a verification result of the first identity authentication information by the authentication server and a public key of the access controller;
所述接入鉴别响应消息根据第一可公开的鉴别结果并对所述第一数字签 名进行验证通过后构造, 具体包括:  And the access authentication response message is configured according to the first publicly available authentication result and the first digital signature is verified, and specifically includes:
所述访问者根据所述第一可公开的鉴别结果, 判断所述访问控制器的身 份是否合法, 当判断出所述访问控制器身份合法时, 从所述第一可公开的鉴 别结果中获取所述访问控制器的公钥, 并利用所述访问控制器的公钥验证所 述第一数字签名, 当验证通过后, 构造所述接入鉴别响应消息。  Determining, by the visitor, whether the identity of the access controller is legal according to the first publicly available authentication result, and determining, when determining that the access controller is legal, obtaining the first publicly available authentication result. And accessing the public key of the controller, and verifying the first digital signature by using a public key of the access controller, and constructing the access authentication response message after the verification is passed.
13、 如权利要求 1 所述的方法, 其特征在于, 所述第一可公开的鉴别结 果包含所述鉴别服务器对所述第一身份鉴别信息的验证结果和所述访问控制 器的公钥;  The method according to claim 1, wherein the first publicly available authentication result comprises a verification result of the first identity authentication information by the authentication server and a public key of the access controller;
当所述访问者根据所述第一可公开的鉴别结果, 判断出所述访问控制器 身份非法时, 终止访问; 或者  Terminating the access when the visitor determines that the identity of the access controller is illegal according to the first publicly available authentication result; or
当所述访问者根据所述第一可公开的鉴别结果, 判断出所述访问控制器 身份合法时, 再利用所述访问控制器的公钥验证所述第一数字签名, 当验证 未通过时, 终止访问。  When the visitor determines that the access controller is legal according to the first publicly available authentication result, the first digital signature is verified by using the public key of the access controller, when the verification fails , terminate the access.
14、 一种访问装置, 其特征在于, 包括:  14. An access device, comprising:
访问请求交互模块, 用于向一目的网络的一访问控制器发送访问请求消 息, 所述访问请求消息中包含所述访问者的第二身份鉴别信息; 并接收所述 访问控制器发送的包含一第一数字签名和所述访问控制器的第一身份鉴别信 息的接入鉴别请求消息;  An access request interaction module, configured to send an access request message to an access controller of a destination network, where the access request message includes the second identity authentication information of the visitor; and receive the content that is sent by the access controller a first digital signature and an access authentication request message of the first identity authentication information of the access controller;
鉴别请求交互模块, 用于向一鉴别服务器发送一身份鉴别请求消息, 所 述身份鉴别请求消息中包含所述第 一身份鉴别信息和所述第二身份鉴别信 息; 并接收所述鉴别服务器发送的身份鉴别响应消息, 所述身份鉴别响应消 息中包含根据所述第一身份鉴别信息对所述访问控制器进行身份鉴别后的第 一可公开的鉴别结果和根据所述第二身份鉴别信息对所述访问者进行身份鉴 别后的第二可公开的鉴别结果; An authentication request interaction module, configured to send an identity authentication request message to an authentication server, where the identity authentication request message includes the first identity authentication information and the second identity authentication information; and receiving the identifier sent by the authentication server An identity authentication response message, where the identity authentication response message includes a first publicly available authentication result after authenticating the access controller according to the first identity authentication information, and a second identity authentication information according to the second identity authentication information Visitors a second publicly identifiable result;
鉴别结果交互模块, 用于根据所述第一可公开的鉴别结果对所述第一数 字签名进行验证, 并根据验证结果选择是否构造包含所述第二可公开的鉴别 结果和所述访问者的第二数字签名的接入鉴别响应消息发送给所述访问控制 器, 并接收所述访问器发送的访问响应消息。  An authentication result interaction module, configured to verify the first digital signature according to the first publicly available authentication result, and select whether to construct the second publicly available authentication result and the visitor according to the verification result The second digitally signed access authentication response message is sent to the access controller, and receives an access response message sent by the accessor.
15、 一种鉴别服务器, 其特征在于, 包括:  15. An authentication server, comprising:
鉴别请求接收模块, 用于接收一访问者发送的身份鉴别请求消息, 所述 身份鉴别请求消息中包含目的网络一访问控制器的第一身份鉴别信息和所述 访问者的第二身份鉴别信息;  An authentication request receiving module, configured to receive an identity authentication request message sent by a visitor, where the identity authentication request message includes first identity authentication information of the destination network one access controller and second identity authentication information of the visitor;
鉴别执行模块, 用于根据所述第一身份鉴别信息产生对所述访问控制器 进行身份鉴别后的第一可公开的鉴别结果, 以及根据所述第二身份鉴别信息 产生对所述访问者进行身份鉴别后的第二可公开的鉴别结果;  An authentication execution module, configured to generate, according to the first identity authentication information, a first publicly available authentication result after performing identity authentication on the access controller, and generate, according to the second identity authentication information, the visitor a second publicly identifiable authentication result after identity authentication;
鉴别响应发送模块, 用于构造一身份鉴别响应消息发送给所述访问者, 所述身份鉴别响应消息中包含所述第一可公开的鉴别结果及第二可公开的鉴 别结果。  The authentication response sending module is configured to send an identity authentication response message to the visitor, where the identity authentication response message includes the first publicly available authentication result and the second publicly available authentication result.
16、 一种访问控制器, 其特征在于, 包括:  16. An access controller, comprising:
访问请求接收模块, 用于接收一访问者发送的访问请求消息, 所述访问 请求消息中携带所述访问者的第二身份鉴别信息;  An access request receiving module, configured to receive an access request message sent by a visitor, where the access request message carries the second identity authentication information of the visitor;
接入鉴别请求构造模块, 用于构造一接入鉴别请求消息发送给所述访问 者, 所述接入鉴别请求消息中包含所述访问控制器的第一身份鉴别信息和第 一数字签名;  An access authentication request constructing module, configured to send an access authentication request message to the visitor, where the access authentication request message includes first identity authentication information and a first digital signature of the access controller;
接入鉴别响应接收模块, 用于接收所述访问者发送的接入鉴别响应消息 得到第二可公开的鉴别结果及由所述访问者发送的第二数字签名; 所述接入 鉴别响应消息根据第一可公开的鉴别结果并对所述第一数字签名进行验证通 过后构造; 所述第一可公开的鉴别结果是由所述鉴别服务器对由所述访问者 发送的所述第一身份鉴别信息进行鉴别后确定, 所述第二鉴别结果是由所述 鉴别服务器对由所述访问者发送的第二身份鉴别信息进行鉴别后确定; 访问响应发送模块, 用于根据获得的所述第二可公开的鉴别结果对所述 第二数字签名进行验证, 并根据验证结果以及授权策略, 构造一访问响应消 息发送给所述访问者。 An access authentication response receiving module, configured to receive an access authentication response message sent by the visitor, to obtain a second publicly available authentication result, and a second digital signature sent by the visitor; a first publicly identifiable authentication result and a verification of the first digital signature by a post-construction; the first publicly identifiable authentication result is the first identity authentication sent by the authentication server to the visitor After the information is authenticated, it is determined that the second authentication result is determined by the authentication server to identify the second identity authentication information sent by the visitor; The access response sending module is configured to verify the second digital signature according to the obtained second publicly available authentication result, and construct an access response message to be sent to the visitor according to the verification result and the authorization policy.
17、 一种访问控制系统, 其特征在于, 包括访问者、 鉴别服务器、 目的 网络的访问控制器, 其特征在于:  An access control system, comprising: an access controller including an accessor, an authentication server, and a destination network, wherein:
所述访问者, 用于向所述访问控制器发送访问请求消息, 所述访问请求 消息中携带所述访问者的第二身份鉴别信息; 并接收所述访问控制器发送的 接入鉴别请求消息, 所述接入鉴别请求消息中包含所述访问控制器的第一身 份鉴别信息和第一数字签名; 以及  The visitor is configured to send an access request message to the access controller, where the access request message carries the second identity authentication information of the visitor; and receives an access authentication request message sent by the access controller. The access authentication request message includes first identity authentication information and a first digital signature of the access controller;
用于向鉴别服务器发送包含所述第一身份鉴别信息和第二身份鉴别信息 的身份鉴别请求消息, 并接收所述鉴别服务器返回的包含第一可公开的鉴别 结果和第二可公开的鉴别结果的身份鉴别响应消息; 以及  And sending an identity authentication request message including the first identity authentication information and the second identity authentication information to the authentication server, and receiving the first publicly available authentication result and the second publicly available authentication result returned by the authentication server Identity authentication response message;
用于根据所述第一可公开鉴别结果对所述第一数字签名进行验证通过后 构造接入鉴别响应消息发送给所述访问控制器, 所述接入鉴别响应消息中包 含所述第二可公开的鉴别结果及由所述访问者产生的第二数字签名, 并接收 所述访问控制器发送的访问响应消息;  And the constructing an access authentication response message is sent to the access controller after the first digital signature is verified according to the first publicly discriminable result, where the access authentication response message includes the second And the public identification result and the second digital signature generated by the visitor, and receiving an access response message sent by the access controller;
所述访问控制器, 用于接收所述访问者发送的访问请求消息, 并构造所 述接入鉴别请求消息发送给所述访问者; 以及  The access controller is configured to receive an access request message sent by the visitor, and construct the access authentication request message to be sent to the visitor;
用于接收所述访问者发送的接入鉴别响应消息得到所述第二可公开的鉴 别结果以及所述第二数字签名, 根据获得的所述第二可公开的鉴别结果对所 述第二数字签名进行验证, 并根据验证结果以及授权策略, 构造所述访问响 应消息发送给所述访问者;  Receiving, by the access identifier sent by the visitor, the second publicly available authentication result and the second digital signature, according to the obtained second publicly available authentication result, the second number The signature is verified, and the access response message is constructed and sent to the visitor according to the verification result and the authorization policy;
所述鉴别服务器, 用于接收所述访问者发送的包含所述第一身份鉴别信 息和第二身份鉴别信息的身份鉴别请求消息, 并返回包含所述第一可公开的 鉴别结果和第二可公开的鉴别结果的身份鉴别响应消息; 其中, 所述第一可 公开的鉴别结果是由所述鉴别服务器对由所述访问者发送的所述第一身份鉴 别信息进行鉴别后确定, 所述第二可公开的鉴别结果是由所述鉴别服务器对 由所述访问者发送的第二身份鉴别信息进行鉴别后确定 t The authentication server is configured to receive an identity authentication request message that is sent by the visitor and includes the first identity authentication information and the second identity authentication information, and return the first publicly available authentication result and the second An identity authentication response message of the public authentication result; wherein, the first publicly available authentication result is determined by the authentication server to identify the first identity authentication information sent by the visitor, where The second publicly available authentication result is determined by the authentication server The second authentication information transmitted by said visitor identification after determining t
PCT/CN2011/072029 2010-10-13 2011-03-22 Method and system for access control WO2012048554A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010505950.1 2010-10-13
CN201010505950 2010-10-13

Publications (1)

Publication Number Publication Date
WO2012048554A1 true WO2012048554A1 (en) 2012-04-19

Family

ID=44662460

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/072029 WO2012048554A1 (en) 2010-10-13 2011-03-22 Method and system for access control

Country Status (2)

Country Link
CN (1) CN102202065A (en)
WO (1) WO2012048554A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760045A (en) * 2020-12-26 2022-07-15 西安西电捷通无线网络通信股份有限公司 Identity authentication method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127666A (en) * 2006-08-15 2008-02-20 索尼株式会社 Communication system, wireless-communication device, and control method therefor
CN101635624A (en) * 2009-09-02 2010-01-27 西安西电捷通无线网络通信有限公司 Method for authenticating entities by introducing online trusted third party
CN101771722A (en) * 2009-12-25 2010-07-07 中兴通讯股份有限公司 System and method for WAPI terminal to access Web application site

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100382511C (en) * 2005-12-26 2008-04-16 北京航空航天大学 Gridding authorization realizing method
CN101262474B (en) * 2008-04-22 2012-02-01 武汉理工大学 A cross-domain access control system for realizing role and group mapping based on cross-domain authorization

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127666A (en) * 2006-08-15 2008-02-20 索尼株式会社 Communication system, wireless-communication device, and control method therefor
CN101635624A (en) * 2009-09-02 2010-01-27 西安西电捷通无线网络通信有限公司 Method for authenticating entities by introducing online trusted third party
CN101771722A (en) * 2009-12-25 2010-07-07 中兴通讯股份有限公司 System and method for WAPI terminal to access Web application site

Also Published As

Publication number Publication date
CN102202065A (en) 2011-09-28

Similar Documents

Publication Publication Date Title
JP7175269B2 (en) Internet-of-Things Device Record Verification Method and Apparatus, and ID Authentication Method and Apparatus
JP6684930B2 (en) Blockchain-based identity authentication method, device, node and system
US7793340B2 (en) Cryptographic binding of authentication schemes
CN106797311B (en) System, method and storage medium for secure password generation
JP4425859B2 (en) Address-based authentication system, apparatus and program
EP2098006B1 (en) Authentication delegation based on re-verification of cryptographic evidence
US8555069B2 (en) Fast-reconnection of negotiable authentication network clients
WO2017020452A1 (en) Authentication method and authentication system
US20080086634A1 (en) Techniques for using AAA services for certificate validation and authorization
JP2010525448A5 (en)
WO2009105996A1 (en) Method, device and system for realizing service access
JPWO2005011192A6 (en) Address-based authentication system, apparatus and program
WO2009062415A1 (en) An authentication method for request message and the apparatus thereof
US8504824B1 (en) One-time rotating key for third-party authentication
WO2014187206A1 (en) Method and system for backing up private key in electronic signature token
WO2010069180A1 (en) Method, system and device for key distribution
WO2011026296A1 (en) Method for authenticating entities by introducing an on-line trusted third party
WO2011022918A1 (en) Entity bidirectional authentication method by introducing an online third party
WO2011063744A1 (en) Method, system and device for identity authentication in extensible authentication protocol (eap) authentication
CN114362993B (en) Block chain assisted Internet of vehicles security authentication method
WO2014187210A1 (en) Method and system for backing up private key of electronic signature token
US20090119505A1 (en) Transaction method and verification method
WO2011009268A1 (en) Wapi (wlan authentication and privacy infrastructure) -based authentication system and method
WO2016011588A1 (en) Mobility management entity, home server, terminal, and identity authentication system and method
JP2023544529A (en) Authentication methods and systems

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11831951

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11831951

Country of ref document: EP

Kind code of ref document: A1