WO2022267564A1 - Packet processing method and apparatus, device, system, and readable storage medium - Google Patents

Packet processing method and apparatus, device, system, and readable storage medium Download PDF

Info

Publication number
WO2022267564A1
WO2022267564A1 PCT/CN2022/080721 CN2022080721W WO2022267564A1 WO 2022267564 A1 WO2022267564 A1 WO 2022267564A1 CN 2022080721 W CN2022080721 W CN 2022080721W WO 2022267564 A1 WO2022267564 A1 WO 2022267564A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
csb
detection function
message
security
Prior art date
Application number
PCT/CN2022/080721
Other languages
French (fr)
Chinese (zh)
Inventor
周侃
王禹
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202111069732.2A external-priority patent/CN115529148A/en
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022267564A1 publication Critical patent/WO2022267564A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present application relates to the technical field of communications, and in particular to message processing methods, devices, equipment, systems and readable storage media.
  • the security gateway device needs to perform content security business (content security business, CSB) detection and other processing on the network traffic flowing through the security gateway device, so as to ensure that the network devices of the internal network can operate safely.
  • content security business content security business
  • CSB content security business
  • a related technique to alleviate the bottleneck problem is to replace the security gateway device with a higher performance central processing unit (CPU) and more memory.
  • CPU central processing unit
  • the hardware cost of this technology is relatively high.
  • debugging the replaced high-performance security gateway device before it is connected to the network requires a long development and debugging cycle. Therefore, the implementation cost of this technique is relatively high.
  • the present application proposes a message processing method, device, device, system, and readable storage medium, so as to reduce the performance requirements of the security equipment for performing the CSB detection function, and reduce the occupation of equipment resources for the security equipment to perform the CSB detection.
  • a packet processing method is provided, the method is applied to a security device, and the security device is deployed on the boundary between the external network and the internal network, and the method includes: the security device intercepts the first packet sent from the external network to the internal network
  • the first message carries the resource provided by the server of the external network according to the request of the terminal device of the internal network; after the security device intercepts the first message, it determines the CSB detection function to be executed corresponding to the first message;
  • the security device In response to the fact that the terminal device has the first CSB detection function, the security device omits performing the first CSB detection function on the first message before forwarding the first message to the terminal device. All or some of the CSB detection functions performed.
  • the security device omits the first CSB detection function for the first message, which can reduce equipment resource occupation when the security device performs the CSB detection function, thereby reducing performance requirements of the security device for performing the CSB detection function.
  • the method reduces the occupancy of device resources for performing the CSB detection function, the unoccupied device resources of the security device can be used to perform other functions, thereby improving the performance of the security device.
  • the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, and before the security device forwards the first message to the terminal device, it also includes: The first message performs a second CSB detection function, and the second CSB detection function is a function other than the first CSB detection function among the CSB detection functions to be performed corresponding to the first message.
  • the security device Since the first CSB detection function of the terminal device is part of the CSB detection function to be executed corresponding to the first message, the security device performs the second CSB detection function except the first CSB detection function, and the security device and The terminal devices jointly complete the CSB detection function corresponding to the first message, which ensures the security of the first message while reducing the resource consumption of the security device.
  • the security device before the security device intercepts the first message sent from the external network to the internal network, it further includes: the security device intercepts the second message sent by the terminal device, and the second message is used to request to obtain the external The resource provided by the server of the network; based on the second message, the security device obtains the CSB detection function of the terminal device; after the security device determines the CSB detection function to be executed corresponding to the first message, the security device further includes: The CSB detection function and the CSB detection function to be executed corresponding to the first packet determine that the terminal device has the first CSB detection function.
  • the second message includes the identity keyword of the terminal device, and based on the second message, the security device obtains the CSB detection function of the terminal device, including: the security device obtains the CSB detection function of the terminal device by parsing the second message.
  • the security device obtains the CSB detection function of the terminal device according to the identity key of the terminal device, including: the security device sends a query request to the capability management device, and the capability management device stores the CSB corresponding to the terminal device Detection function information, wherein the query request carries the identity keyword of the terminal device, and the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function of the terminal device; CSB detection function information: determine the CSB detection function of the terminal device according to the CSB detection function information.
  • sending the query request to the capability management device includes: sending the query request to the capability management device based on HTTP, HTTPS or API.
  • the method of sending query requests is more flexible.
  • the security device obtains the CSB detection function of the terminal device according to the identity key of the terminal device, including: the security device queries the identity key and CSB stored in the security device according to the identity key of the terminal device
  • the corresponding relationship of detection functions is to obtain the CSB detection function corresponding to the identity keyword of the terminal device. Since the relevant information of the CSB detection function of the terminal device can be stored in the capability management device and can also be stored on the security device, the method for storing the relevant information of the CSB detection function of the terminal device is more flexible.
  • the identity key includes at least one of a random ID, an IP address, or user information in a local certificate.
  • the type of the identity key of the terminal device is relatively flexible, and since the identity key of the terminal device can include various types of information, the first CSB detection function of the terminal device is obtained according to the identity key of the terminal device. Higher accuracy.
  • the second message carries information about the CSB detection function corresponding to the terminal device.
  • the security device obtains the CSB detection function of the terminal device, including: the security device parses the second message Obtain CSB detection function information corresponding to the terminal device carried in the second message; the security device determines the CSB detection function of the terminal device according to the CSB detection function information corresponding to the terminal device carried in the second message. Since the second message can directly carry the CSB detection function information corresponding to the terminal device, the security device can directly obtain the CSB detection function information corresponding to the terminal device by parsing the second message. The efficiency of obtaining the CSB detection function information corresponding to the terminal device is higher.
  • the CSB detection function to be executed includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
  • the terminal device is a device that completes login authentication
  • the login authentication manner includes any one of local authentication, server authentication, or certificate authentication.
  • a message processing method is provided, the method is applied to a terminal device, and the terminal device is deployed in an internal network, and the method includes:
  • the terminal device provides CSB detection function information corresponding to the terminal device to other devices, and the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function of the terminal device; the terminal device receives the first message sent by the security device, wherein the security device Deployed at the boundary between the external network and the internal network, the first message is used to carry the resources provided by the server of the external network according to the request of the terminal device, the first message is a message that the security device has not performed the first CSB detection function, and the terminal device
  • the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including: the terminal device sends a third message to the capability management device, and the third message carries the CSB detection function corresponding to the terminal device Information, the capability management device is used to store the CSB detection function information corresponding to the terminal device.
  • the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including: the terminal device sends a third message to the security device, and the third message carries the CSB detection function information corresponding to the terminal device , the security device is used to store the CSB detection function information corresponding to the terminal device.
  • the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including: the terminal device sends a second message to the server of the external network, and the second message is used to request to obtain the CSB detection function information of the external network.
  • the second message is a message transmitted based on HTTPS
  • the CSB detection function information corresponding to the terminal device is carried in the Cookie of the second message, or the URL parameter, or the HTTPS header field, or the HTTPS auto in the definition field.
  • the second message is a message based on HTTP transmission
  • the CSB detection function information corresponding to the terminal device is carried in the Cookie, or the HTTP header field, or the HTTP custom field of the second message.
  • the second message is a message transmitted based on FTP
  • the CSB detection function information corresponding to the terminal device is carried in an FTP redundant field or an FTP custom field of the second message. Since the second message can be transmitted based on different transmission protocols, the method for transmitting the second message is more flexible.
  • the second message can carry the CSB detection function information corresponding to the terminal device in different ways, and this method is more flexible in carrying the CSB detection function information corresponding to the terminal device.
  • the terminal device after the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, it further includes: the terminal device sends a second message to the server of the external network, and the second message is used to request to obtain the external The resource provided by the server of the network, wherein the second packet includes an identity key of the terminal device, and the identity key is used to obtain the CSB detection function of the terminal device.
  • the terminal device in response to the other device being a capability management device, after the terminal device provides other devices with the CSB detection function information corresponding to the terminal device, it further includes: the terminal device receives the random ID of the terminal device sent by the capability management device , the random ID of the terminal device is used as the identity key of the terminal device; or in response to other devices being security devices, after the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, it also includes: the terminal device receives the information sent by the security device The random ID of the terminal device, the random ID of the terminal device is used as the identity key of the terminal device.
  • the third packet further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device.
  • the third packet further includes a local certificate of the terminal device, and user information in the local certificate of the terminal device is used as an identity key of the terminal device.
  • the CSB detection function of the terminal device includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
  • the terminal device before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, it further includes: the terminal device sends a login request to the security device, and the login request includes user information; The authentication result is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the terminal device performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
  • the terminal device before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, it also includes: the terminal device sends a login request to the login authentication device, and the login request includes user information; The authentication result sent by the information, the authentication result is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the terminal device performs an operation of providing other devices with the corresponding CSB detection function information of the terminal device.
  • the terminal device before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, it also includes: the terminal device sends a login request to the login authentication device, and the login request includes the local certificate of the terminal device; receiving the login authentication The authentication result sent by the device based on the local certificate of the terminal device is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the terminal device performs an operation of providing other devices with corresponding CSB detection function information of the terminal device.
  • the login authentication mode of the terminal device is more flexible.
  • a message processing device is provided, the device is applied to a security device, and the security device is deployed on the boundary between an external network and an internal network, and the device includes:
  • the acquiring module is configured to intercept the first message sent from the external network to the internal network, where the first message is used to carry the resource provided by the server of the external network according to the request of the terminal device of the internal network;
  • a determining module configured to determine the CSB detection function to be executed corresponding to the first message
  • a processing module configured to omit performing the first CSB detection function on the first message before forwarding the first message to the terminal device in response to the terminal device having the first CSB detection function, wherein the first CSB detection function is the first CSB detection function of the first message All or part of the CSB detection functions to be executed corresponding to the text.
  • the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, and the processing module is also used to perform the second CSB detection function on the first message,
  • the second CSB detection function is a function other than the first CSB detection function among the to-be-executed CSB detection functions corresponding to the first message.
  • the obtaining module is also used to intercept the second message sent by the terminal device, and the second message is used to request to obtain the resources provided by the server of the external network; based on the second message, the terminal device obtains The CSB detection function it has; the determination module is also used to determine that the terminal device has the first CSB detection function according to the CSB detection function that the terminal device has and the CSB detection function to be executed corresponding to the first message.
  • the second message includes the identity keyword of the terminal device
  • the obtaining module is configured to obtain the identity keyword of the terminal device included in the second message by parsing the second message;
  • the identity keyword is used to obtain the CSB detection function of the terminal device.
  • the acquisition module is configured to send a query request to the capability management device, and the capability management device stores CSB detection function information corresponding to the terminal device, where the query request carries the identity keyword of the terminal device, and the terminal device
  • the corresponding CSB detection function information is used to indicate the CSB detection function of the terminal device;
  • the reception capability management device sends the corresponding CSB detection function information of the terminal device in response to the query request; according to the CSB detection function information, determine the CSB detection function of the terminal device .
  • the obtaining module is configured to send a query request to the capability management device based on HTTP, HTTPS or API.
  • the obtaining module is configured to query the correspondence between the identity keyword stored in the security device and the CSB detection function according to the identity keyword of the terminal device, and obtain the CSB detection function corresponding to the identity keyword of the terminal device .
  • the identity key includes at least one of a random ID, an IP address, or user information in a local certificate.
  • the second message carries CSB detection function information corresponding to the terminal device
  • the obtaining module is configured to obtain the CSB detection function information corresponding to the terminal device carried in the second message by parsing the second message; Determine the CSB detection function of the terminal device according to the CSB detection function information corresponding to the terminal device carried in the second message.
  • the CSB detection function to be executed includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
  • the terminal device is a device that completes login authentication
  • the login authentication manner includes any one of local authentication, server authentication, or certificate authentication.
  • a message processing device is provided, the device is applied to a terminal device, and the terminal device is deployed in an internal network, and the device includes:
  • the supply module is configured to provide other devices with CSB detection function information corresponding to the terminal device, and the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function that the terminal device has;
  • the receiving module is configured to receive the first message sent by the security device, wherein the security device is deployed on the boundary between the external network and the internal network, and the first message is used to carry the resources provided by the server of the external network according to the request of the terminal device.
  • a message is a message for which the security device has not performed the first CSB detection function, and the CSB detection function of the terminal device includes the first CSB detection function;
  • a processing module configured to perform a first CSB detection function on the first packet.
  • the supply module is configured to send a third message to the capability management device, the third message carries the CSB detection function information corresponding to the terminal device, and the capability management device is used to store the CSB detection function information corresponding to the terminal device. function information.
  • the supply module is configured to send a third message to the security device, the third message carries the CSB detection function information corresponding to the terminal device, and the security device is used to store the CSB detection function information corresponding to the terminal device .
  • the supply module is configured to send a second message to a server on the external network, and the second message is used to request to obtain resources provided by the server on the external network, where the second message carries the corresponding CSB detection function information.
  • the second message is a message transmitted based on HTTPS
  • the CSB detection function information corresponding to the terminal device is carried in the Cookie of the second message, or the URL parameter, or the HTTPS header field, or the HTTPS auto in the definition field.
  • the second message is a message based on HTTP transmission
  • the CSB detection function information corresponding to the terminal device is carried in the Cookie, or the HTTP header field, or the HTTP custom field of the second message.
  • the second message is a message transmitted based on FTP
  • the CSB detection function information corresponding to the terminal device is carried in an FTP redundant field or an FTP custom field of the second message.
  • the device further includes: a sending module, configured to send a second message to a server on an external network, where the second message is used to request resources provided by the server on the external network, where the second The message includes an identity keyword of the terminal device, and the identity keyword is used to obtain the CSB detection function of the terminal device.
  • a sending module configured to send a second message to a server on an external network, where the second message is used to request resources provided by the server on the external network, where the second The message includes an identity keyword of the terminal device, and the identity keyword is used to obtain the CSB detection function of the terminal device.
  • the receiving module in response to the fact that the other device is a capability management device, is further configured to receive the random ID of the terminal device sent by the capability management device, and the random ID of the terminal device is used as an identity key of the terminal device ; or in response to the fact that the other device is a security device, the receiving module is also configured to receive the random ID of the terminal device sent by the security device, and the random ID of the terminal device is used as an identity key of the terminal device.
  • the third packet further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device.
  • the third packet further includes a local certificate of the terminal device, and user information in the local certificate of the terminal device is used as an identity key of the terminal device.
  • the CSB detection function of the terminal device includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
  • the apparatus further includes: a request module, configured to send a login request to the security device, where the login request includes user information; receive an authentication result sent by the security device based on the user information, and the authentication result is used to instruct the terminal device Whether the login is successful; in response to the successful login of the terminal device, the provisioning module performs an operation of providing the CSB detection function information corresponding to the terminal device to other devices.
  • a request module configured to send a login request to the security device, where the login request includes user information
  • the provisioning module performs an operation of providing the CSB detection function information corresponding to the terminal device to other devices.
  • the apparatus further includes: a request module, configured to send a login request to the login authentication device, where the login request includes user information; receive an authentication result sent by the login authentication device based on the user information, and the authentication result is used to indicate Whether the terminal device is successfully logged in; in response to the successful login of the terminal device, the supply module performs an operation of providing the CSB detection function information corresponding to the terminal device to other devices.
  • a request module configured to send a login request to the login authentication device, where the login request includes user information
  • the supply module performs an operation of providing the CSB detection function information corresponding to the terminal device to other devices.
  • the apparatus further includes: a request module, configured to send a login request to the login authentication device, where the login request includes the local certificate of the terminal device; and receive the authentication result sent by the login authentication device based on the local certificate of the terminal device , the authentication result is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the supply module performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
  • a message processing device in a fifth aspect, includes: a processor, the processor is coupled with a memory, at least one program instruction or code is stored in the memory, and at least one program instruction or code is loaded by the processor And execute, so that the packet processing device realizes the packet processing method of any one of the first aspect or the second aspect above.
  • a message processing system includes: a security device and a terminal device, the security device is used to execute the message processing method in the first aspect or any one of the first aspect, and the terminal device uses To implement the second aspect or the message processing method of any one of the second aspect.
  • a computer-readable storage medium is provided, and at least one program instruction or code is stored in the computer-readable storage medium, and when the program instruction or code is loaded and executed by a processor, the computer can realize the following aspects of the first aspect or Any message processing method in the second aspect.
  • a computer program product including a computer program.
  • the computer program When the computer program is executed by a computer, the computer implements the message processing method in any one of the first aspect or the second aspect above.
  • a communication device in a ninth aspect, includes: a transceiver, a memory, and a processor.
  • the transceiver, the memory and the processor communicate with each other through an internal connection path, the memory is used to store instructions, and the processor is used to execute the instructions stored in the memory to control the transceiver to receive signals and control the transceiver to send signals , and when the processor executes the instruction stored in the memory, the processor executes the method in the first aspect or any possible implementation manner of the first aspect, or executes the second aspect or any one of the second aspect method in one possible implementation.
  • processors there are one or more processors, and one or more memories.
  • the memory may be integrated with the processor, or the memory may be separated from the processor.
  • the memory can be a non-transitory (non-transitory) memory, for example, a read-only memory (read only memory, ROM), which can be integrated with the processor on the same chip, or can be set in different On the chip, the application does not limit the type of the memory and the arrangement of the memory and the processor.
  • a non-transitory memory for example, a read-only memory (read only memory, ROM), which can be integrated with the processor on the same chip, or can be set in different On the chip, the application does not limit the type of the memory and the arrangement of the memory and the processor.
  • a chip including a processor, configured to call and execute instructions stored in the memory from the memory, so that the communication device installed with the chip executes any one of the above-mentioned first aspect or any possible method of the first aspect.
  • the method in the implementation manner, or execute the method in the above second aspect or any possible implementation manner of the second aspect.
  • another chip including: an input interface, an output interface, a processor, and a memory, the input interface, the output interface, the processor, and the memory are connected through an internal connection path, and the processor is used to execute the memory in the memory.
  • Code when the code is executed, the processor is used to execute the method in the above-mentioned first aspect or any possible implementation manner of the first aspect, or execute the above-mentioned second aspect or any possible implementation manner of the second aspect method in .
  • FIG. 1 is a schematic diagram of an implementation scenario of a message processing method provided in an embodiment of the present application
  • FIG. 2 is a flow chart of a message processing method provided in an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a message processing method provided in an embodiment of the present application.
  • FIG. 4 is a flow chart of another message processing method provided by an embodiment of the present application.
  • Fig. 5 is a flowchart of another message processing method provided by the embodiment of the present application.
  • FIG. 6 is a schematic diagram of a local certificate verification terminal device provided by an embodiment of the present application.
  • FIG. 7 is a flowchart of another message processing method provided by the embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a message processing device provided in an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of another message processing device provided in an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a packet processing device provided in an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of another packet processing device provided by an embodiment of the present application.
  • a security device performs a CSB detection function on packets sent from an external network to an internal network, so as to ensure safe operation of devices on the internal network.
  • the embodiment of the present application provides a packet processing method, which can be applied in the implementation scenario shown in FIG. 1 .
  • this implementation scenario includes a security device 101 , terminal devices 102A- 102C (collectively referred to as terminal devices 102 ), and a server 103 .
  • this implementation scenario further includes a capability management device 104 and a login authentication device 105 .
  • the security device 101 is deployed on the boundary between the external network and the internal network, the terminal device 102 is deployed on the internal network, and the server 103 is deployed on the external network.
  • Information exchange can be performed between the security device 101 and the terminal device 102, information exchange can be performed between the security device 101 and the server 103, information exchange can be performed between the security device 101 and the capability management device 104, and the security device 101 and the login authentication device 105
  • Information exchange can be performed between the terminal device 102 and the capability management device 104, and information exchange can be performed between the terminal device 102 and the login authentication device 105.
  • FIG. 1 only the information interaction between the terminal device 102C, the capability management device 104 and the login authentication device 105 is shown. Information interaction is not shown in FIG. 1 , but it does not limit the implementation scenario.
  • the security device 101 includes but not limited to security gateway devices, firewalls and other devices
  • the terminal device 102 includes but not limited to smart phones, desktop computers, notebook computers, tablet computers and other terminal devices
  • the server 103, the capability management device 104 and the login All authentication devices 105 may be servers. It should be noted that, in the implementation scenario shown in FIG. 1 , the number of devices is only the number illustrated in the embodiment of the present application, which is not limited in the embodiment of the present application.
  • the message processing method provided by the embodiment of the present application is shown in FIG. 2 , and the message processing method includes but not limited to steps 200 to 205 .
  • steps 201 to 203 are the process of executing message processing on the security device side
  • step 200, step 204 and step 205 are the process of executing message processing on the terminal device side.
  • the packet processing method will be described with reference to FIG. 2 .
  • step 200 the terminal device provides other devices with CSB detection function information corresponding to the terminal device.
  • the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function of the terminal device.
  • the CSB detection function of the terminal device includes an intrusion prevention system (intrusion prevention system, IPS) detection function, an anti-virus (anti-virus, AV) detection function, a uniform resource locator (uniform resource locator, URL) detection function 1.
  • intrusion prevention system intrusion prevention system
  • AV anti-virus
  • URL uniform resource locator
  • AIE artificial intelligence engine
  • SA service awareness
  • the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including but not limited to the following two manners.
  • the terminal device provides the CSB detection function information corresponding to the terminal device to the capability management device.
  • the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including: the terminal device sends a third message to the capability management device, the third message carries the CSB detection function information corresponding to the terminal device, and the capability management device It is used to store the CSB detection function information corresponding to the terminal device.
  • the third message is a message transmitted based on hyper text transfer protocol over secure socket layer (HTTPS), and the CSB detection function information corresponding to the terminal device is carried in the third message on the user's local terminal.
  • Small data cookie, Cookie
  • URL parameters or HTTPS header field (authorization), or HTTPS custom field.
  • HTTPS Hypertext transfer protocol
  • the third message may be a message transmitted through an encrypted communication channel.
  • the third message is a message transmitted based on hypertext transfer protocol (hyper text transfer protocol, HTTP), and the CSB detection function information of the terminal device is carried in the Cookie of the third message, or the HTTP header field, or the HTTP auto in the definition field.
  • the third message is a message transmitted based on the file transfer protocol (file transfer protocol, FTP), and the CSB detection function information of the terminal device is carried in the FTP redundant field of the third message or in the custom field of FTP.
  • the method for transmitting the third message is more flexible.
  • the third message can carry the CSB detection function information corresponding to the terminal device in various ways, and the method for carrying the CSB detection function information corresponding to the terminal device in the third message is more flexible.
  • the step of the terminal device providing the CSB detection function information corresponding to the terminal device to the capability management device corresponds to related content of capability management performed by the terminal device and the capability management device shown in FIG. 3 .
  • the terminal device provides the security device with CSB detection function information corresponding to the terminal device.
  • the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including: the terminal device sends a second message to the server of the external network, and the second message is used to request to obtain the information of the external network resources provided by the server, where the second packet carries CSB detection function information corresponding to the terminal device.
  • the second message can be intercepted by the security device, so that the security device acquires the CSB detection function information corresponding to the terminal device carried in the second message.
  • the way the terminal device sends the second message to the server on the external network, and the way the second message carries the CSB detection function information corresponding to the terminal device is similar to the principle of the related process in the above-mentioned way 1, here No longer.
  • the terminal device when the terminal device sends a request message (that is, the second message) for requesting resources provided by the server of the external network , may directly multiplex the second message to send the CSB detection function information corresponding to the terminal device, and the security device can obtain the CSB detection function information corresponding to the terminal device based on the message.
  • the second message since the second message can be transmitted based on multiple transmission protocols, the method for transmitting the second message is more flexible.
  • the second message can carry the CSB detection function information corresponding to the terminal device in various ways, and the method of carrying the CSB detection function information corresponding to the terminal device in the second message is more flexible.
  • the terminal device provides information about the CSB detection function corresponding to the terminal device to other devices, including: the terminal device sends a third message to the security device, and the third message carries the CSB detection function corresponding to the terminal device Information, the security device is used to store the CSB detection function information corresponding to the terminal device.
  • the manner in which the terminal device sends the third message to the security device and the manner in which the third message carries the CSB detection function information corresponding to the terminal device are similar to those in the above-mentioned method 1, and will not be repeated here. .
  • the security device can directly obtain the CSB detection function information corresponding to the terminal device locally when performing subsequent detection, thereby improving the detection efficiency.
  • the terminal device can provide the CSB detection function information corresponding to the terminal device in different ways, the method of providing the CSB detection function information corresponding to the terminal device in the embodiment of the present application is more flexible.
  • the CSB detection function information corresponding to the terminal device is represented by binary numbers.
  • the CSB detection function information corresponding to the terminal device may be represented by the following manner A or manner B.
  • the CSB detection function information corresponding to the terminal device is represented by a binary number.
  • the CSB detection function information corresponding to the terminal device is expressed as xxxxxxxxxx, where the 0th and 1st digits from the right are used to indicate whether the IPS detection function is included, and the 2nd and 3rd digits are used to indicate whether the IPS detection function is included.
  • AV detection function the 4th and 5th bits are used to indicate whether the URL detection function is included, the 6th and 7th bits are used to indicate whether the AIE detection function is included, and the 8th and 9th bits are used to indicate whether the SA detection is included Function.
  • the CSB detection function of the terminal device includes the IPS detection function, the AV detection function and the AIE detection function, and the CSB detection function information corresponding to the terminal device is expressed as 0001000101.
  • the CSB detection function information corresponding to the terminal device is represented by a binary array.
  • the CSB detection function information corresponding to the terminal device can be represented by a binary array [A, B, C, D, E], where A, B, C, D, and E are all used to indicate a detection function, and Represented by binary numbers.
  • A is used to indicate the IPS detection function
  • A is denoted as xx, where xx is 00, indicating that it does not have the IPS detection function, and xx is 01, indicating that it has the IPS detection function.
  • B is used to indicate the AV detection function
  • C is used to indicate the URL detection function
  • D is used to indicate the AIE detection function
  • E is used to indicate the SA detection function.
  • the CSB detection function of the terminal device includes the IPS detection function and the AV detection function
  • the CSB detection function information corresponding to the terminal device is expressed as [01, 01, 00, 00, 00].
  • the CSB detection function information corresponding to the terminal device can also be expressed in other ways, and the above-mentioned representation mode of the CSB detection function information corresponding to the terminal device is only an example for the embodiment of this application. This is not limited.
  • the method further includes: in response to a change in the CSB detection function of the terminal device, the terminal device sends the changed CSB detection function corresponding to the terminal device to a device that stores information about the CSB detection function corresponding to the terminal device. CSB detection function information, so that the device storing the CSB detection function information corresponding to the terminal device updates the stored CSB detection function information corresponding to the terminal device.
  • the terminal device sends the changed CSB detection function information corresponding to the terminal device to the device that stores the CSB detection function information corresponding to the terminal device, including: the terminal device sends to the device that stores the CSB detection function information corresponding to the terminal device All CSB detection function information, or send the difference CSB detection function information to the device that stores the CSB detection function information corresponding to the terminal device, the difference CSB detection function information is based on the CSB detection function before the change and the CSB detection function after the change Determined CSB detection function information.
  • the capability management device stores CSB detection function information corresponding to the terminal device, and the terminal device sends all CSB detection function information to the capability management device, or sends different CSB detection function information to the capability management device.
  • the method further includes: the terminal device periodically sends the CSB detection function information corresponding to the terminal device to the device storing the CSB detection function information corresponding to the terminal device, so that the corresponding CSB detection function information of the terminal device is stored.
  • the CSB detection function information of the device updates the stored CSB detection function information corresponding to the terminal device.
  • the terminal device may also send the CSB detection function information corresponding to the terminal device to the device storing the CSB detection function information corresponding to the terminal device when the device storing the CSB detection function information corresponding to the terminal device requests the terminal device. equipment.
  • the method further includes: the terminal device receives the first result or the second result sent by the other device, where the first The result is used to indicate that the other device successfully stores the CSB detection function information corresponding to the terminal device, and the second result is used to indicate that the other device fails to store the CSB detection function information corresponding to the terminal device.
  • the terminal device provides CSB detection function information corresponding to the terminal device to the capability management device, and the terminal device receives the first result or the second result sent by the capability management device.
  • the security device intercepts the request sent by the terminal device When obtaining the second packet of resources provided by the server of the external network, the second packet may include the identity key of the terminal device, so that the security device can obtain the corresponding CSB detection function information of the terminal device based on the identity key of the terminal device.
  • the capability management device stores CSB detection function information corresponding to the terminal device.
  • the method further includes: the terminal device sends a second message to the server of the external network, and the second message is used to request to obtain the server information of the external network provided resources.
  • the second message includes an identity keyword of the terminal device, and the identity keyword is used to obtain the CSB detection function of the terminal device.
  • the second packet can be intercepted by the security device, so that the security device obtains the identity key of the terminal device carried in the second packet.
  • the identity key includes at least one of a random identity identification number (identity document, ID), an Internet protocol (internet protocol, IP) address, or user information in a local certificate.
  • ID identity document
  • IP Internet protocol
  • the method further includes: The terminal device receives the random ID of the terminal device sent by the capability management device, and the random ID of the terminal device is used as an identity key of the terminal device.
  • the random ID of the terminal device may be a random ID generated by the capability management device.
  • the third packet further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device.
  • the third message further includes a local certificate of the terminal device, and user information in the local certificate of the terminal device is used as an identity key of the terminal device.
  • the terminal device may save the random ID as an identity key of the terminal device.
  • the security device stores CSB detection function information corresponding to the terminal device.
  • the method further includes: the terminal device sends a second message to the server of the external network, and the second message is used to request to obtain the server information of the external network
  • the resource provided wherein the second packet includes an identity key of the terminal device, and the identity key is used to obtain the CSB detection function of the terminal device.
  • the second packet can be intercepted by the security device, so that the security device obtains the identity key of the terminal device carried in the second packet.
  • the identity key includes at least one of random ID, IP address, or user information in the local certificate.
  • the method further includes: the terminal device The random ID of the terminal device sent by the security device is received, and the random ID of the terminal device is used as an identity key of the terminal device.
  • the random ID of the terminal device may be a random ID generated by the security device.
  • the third packet further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device.
  • the third message further includes a local certificate of the terminal device, and user information in the local certificate of the terminal device is used as an identity key of the terminal device.
  • the terminal device may store the random ID as the identity key of the terminal device.
  • the embodiment of the present application does not specify the manner in which the second packet carries the identity keyword of the terminal device, the manner in which the third packet carries the IP address of the terminal device, and the manner in which the third packet carries the local certificate of the terminal device Be limited.
  • the type of the identity key of the terminal device is relatively flexible.
  • the identity key of the terminal device can include various types of information, and the accuracy of obtaining the CSB detection function of the terminal device according to the identity key of the terminal device is relatively high.
  • Step 201 the security device intercepts the first message sent from the external network to the internal network.
  • the first packet is used to bear resources provided by the server of the external network to the terminal device of the internal network.
  • the first packet is used to bear the resource provided by the server of the external network according to the request of the terminal device of the internal network.
  • the security device 101 intercepts the first message sent from the external network to the internal network, and the first message is used to bear the provided resources.
  • the first packet is used to carry the resource actively provided by the server of the external network to the terminal device of the internal network.
  • the terminal device 102C on the internal network does not request to obtain resources provided by the server on the external network, and the security device 101 intercepts the first message sent from the external network to the internal network.
  • the terminal device is a device that has completed login authentication, and the login authentication manner includes any one of local authentication, server authentication, or certificate authentication.
  • the login authentication manner includes any one of local authentication, server authentication, or certificate authentication.
  • Step 202 the security device determines the CSB detection function to be executed corresponding to the first packet.
  • the CSB detection function to be executed includes: at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
  • the security device stores multiple CSB detection policies, where each CSB detection policy corresponds to a resource type, and each CSB detection policy includes at least one CSB detection function.
  • the security device determines the to-be-executed CSB detection function corresponding to the first message, including: the security device obtains the resource type of the resource carried by the first message, searches for a CSB detection strategy corresponding to the resource type according to the resource type, and uses the CSB
  • the CSB detection function included in the detection strategy is determined as the CSB detection function to be executed corresponding to the first packet.
  • resource types include but are not limited to: portable document format (portable document format, pdf) file, document (document, .doc) file, text (text, .txt) file, image interchange format (graphics interchange format, GIF) files, executable (executable, exe) files, dynamic link library (dynamic link library, dll) files, etc.
  • the resource type can also be a broader category, such as exe files and dll files are classified into portable executable (portable executable, PE) files, joint photographic experts group (joint photographic experts group, JPEG) files, bitmap (bitmap, BMP) and GIF files are classified as image files and so on.
  • the security device intercepts the first message, according to the data in the file content carried in the first message, such as the feature word in the file header, or according to the acquisition request sent by the previously cached terminal device (i.e. The suffix name of the resource name in the URL in the second message), or determine the resource type of the resource carried by the first message in other ways.
  • Step 203 in response to the fact that the terminal device has the first CSB detection function, the security device omits performing the first CSB detection function on the first message before forwarding the first message to the terminal device.
  • the first CSB detection function is all or part of the CSB detection functions to be executed corresponding to the first message.
  • the security device omitting to perform the first CSB detection function on the first packet includes the following cases 1 and 2.
  • the first CSB detection function is all of the CSB detection functions to be executed corresponding to the first message.
  • the security device can omit In the process of performing CSB detection on the first packet, the first packet is directly forwarded to the terminal device. In case 1, resources consumed by the security device for CSB detection can be saved.
  • the first CSB detection function is a part of the CSB detection functions to be executed corresponding to the first message.
  • the security device forwards the first message to the terminal device, it also includes: the security device performs a second CSB detection function on the first message, and the second CSB detection function is the waiting Among the CSB detection functions performed, other than the first CSB detection function.
  • the CSB detection function to be executed corresponding to the first message includes an IPS detection function, an AV detection function, and an AIE detection function
  • the terminal device has a first CSB detection function, wherein the first CSB detection function includes: an IPS detection function and an AIE detection function detection function.
  • the second CSB detection function includes the AIE detection function
  • the security device performs the AIE detection function on the first packet.
  • step 203 corresponds to the manner of determining to perform the CSB detection function on the first packet and related content of performing the CSB detection function shown in FIG. 3 .
  • the security device determines the CSB detection function to be executed corresponding to the first message, it executes all the CSB detection functions to be executed by default. CSB detection function.
  • the method further includes: acquiring a detection result of the security device performing the second CSB detection function on the first message; responding to the The detection result is safe, and the security device forwards the first packet to the terminal device.
  • the detection results of the security device performing the at least one detection function on the first message are all safe, and the security device performs the second CSB detection function on the first message.
  • the test result of the detection function is safe.
  • the method further includes: responding to the detection that the security device performs the second CSB detection function on the first packet The result is dangerous, and the security device does not forward the first message to the terminal device.
  • the second CSB detection function includes at least one detection function, and among the detection results obtained by the security device performing the at least one detection function on the first packet, at least one detection result is dangerous, and the security device performs the detection on the first message.
  • a detection result of executing the second CSB detection function on a packet is dangerous.
  • the method further includes a process in which the security device obtains the CSB detection function of the terminal device.
  • the method before step 201, before the security device intercepts the first message sent from the external network to the internal network, the method further includes the following steps 1-1 and 1-2.
  • step 1-1 the security device intercepts the second message sent by the terminal device, where the second message is used to request to acquire resources provided by the server of the external network.
  • the second message is the above request message for requesting to acquire the resource provided by the server of the external network.
  • the second packet includes an identity key of the terminal device.
  • the second packet carries CSB detection function information corresponding to the terminal device. It should be noted that the type of the identity keyword of the terminal device, the representation method of the CSB detection function information corresponding to the terminal device, and the way the second message carries the CSB detection function information corresponding to the terminal device are the same as those in the preceding paragraphs. Same, no more details here.
  • Step 1-2 based on the second message, the security device acquires the CSB detection function of the terminal device.
  • the security device obtains the CSB detection function of the terminal device, including but not limited to the following two ways.
  • the security device obtains the identity keyword of the terminal device included in the second message by parsing the second message; , to obtain the CSB detection function of the terminal device.
  • the security device obtains the CSB detection function of the terminal device according to the identity keyword of the terminal device, including: the security device sends a query request to the capability management device, and the capability management device stores the corresponding The CSB detection function information of the terminal device, wherein the query request carries the identity keyword of the terminal device, and the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function that the terminal device has; the receiving capability management device sends in response to the query request According to the CSB detection function information corresponding to the terminal device, the CSB detection function possessed by the terminal device is determined according to the CSB detection function information.
  • the security device when it sends the query request to the capability management device, it sends the query request to the capability management device based on HTTP, HTTPS or an application programming interface (application programming interface, API). It should be noted that the security device may also send the query request to the capability management device based on other public protocols or private protocols, which is not limited in this embodiment of the present application.
  • the security device obtains the CSB detection function of the terminal device according to the identity key of the terminal device, including: the security device queries the identity key stored in the security device according to the identity key of the terminal device The corresponding relationship between the keyword and the CSB detection function is used to obtain the CSB detection function corresponding to the identity keyword of the terminal device.
  • the security device stores the correspondence between the identity key and the CSB detection function.
  • the corresponding relationship between the identity key and the CSB detection function stored in the security device includes multiple identity keys and a CSB detection function corresponding to each identity key.
  • the security device can obtain the corresponding relationship between the identity keyword and the CSB detection function of the identity keyword of the terminal device by querying the corresponding relationship between the identity keyword and the CSB detection function according to the identity keyword of the terminal device.
  • the CSB detection function is a function that detects the corresponding relationship between the identity keyword and the CSB detection function according to the identity keyword of the terminal device.
  • the security device obtains the CSB detection function information corresponding to the terminal device carried in the second message by analyzing the second message; the security device obtains the CSB detection function information corresponding to the terminal device carried in the second message; The CSB detection function information corresponding to the terminal device carried in the message determines the CSB detection function of the terminal device.
  • the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the second message, including but not limited to the following three situations.
  • the second packet is a packet transmitted based on HTTPS. That is, the second packet is a packet of the HTTPS protocol.
  • the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the Cookie; if the terminal device The corresponding CSB detection function information is carried in the URL parameter of the second message, then the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the URL parameter; if the CSB detection function corresponding to the terminal device The information is carried in the HTTPS header field of the second message, and the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the HTTPS header field; if the CSB detection function information corresponding to the terminal device is carried in the In the HTTPS custom field of the second message, the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the HTTPS custom field.
  • the second packet is a packet based on HTTP transmission. That is, the second packet is a packet of the HTTP protocol.
  • the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the Cookie; if the terminal device The corresponding CSB detection function information is carried in the HTTP header field of the second message, then the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the HTTP header field; if the CSB corresponding to the terminal device The detection function information is carried in the HTTP custom field of the second message, and the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the HTTP custom field.
  • the second packet is a packet based on FTP transmission. That is, the second packet is a packet of the FTP protocol.
  • the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the FTP redundant field.
  • Function information if the CSB detection function information corresponding to the terminal device is carried in the FTP custom field of the second message, the security device parses the second message to obtain the CSB detection function corresponding to the terminal device carried in the FTP custom field information.
  • the security device performs the CSB detection function corresponding to the terminal device carried in the second message information to determine the CSB detection function of the terminal device.
  • the step of the security device obtaining the CSB detection function of the terminal device based on the second message corresponds to identifying the second message shown in FIG. 3 , and obtaining relevant content of the CSB detection function of the terminal device.
  • the security device can determine which of the CSB detection functions to be executed corresponding to the first message are the CSB detection functions of the terminal device, and which CSB detection functions It is a CSB detection function that terminal equipment does not have. That is, the security device can determine the first CSB detection function and the second CSB detection function among the CSB detection functions to be executed.
  • the method further includes: the security device, according to the CSB detection function of the terminal device and the to-be-executed CSB detection function corresponding to the first message, It is determined that the terminal device has the first CSB detection function.
  • the CSB detection function to be executed corresponding to the first message includes an IPS detection function, an AV detection function, and a URL detection function
  • the CSB detection function possessed by the terminal device includes a URL detection function and an AIE detection function
  • the security device determines that the terminal device has A first CSB detection function, the first CSB detection function includes a URL detection function.
  • the method provided by the embodiment of the present application includes step 204 .
  • Step 204 the terminal device receives the first message sent by the security device.
  • the security device is deployed on the boundary between the external network and the internal network, the first message is used to carry the resource provided by the server of the external network according to the request of the terminal device, and the first message is that the security device does not perform the first CSB detection function
  • the CSB detection function of the terminal device includes the first CSB detection function.
  • the CSB detection function to be executed corresponding to the first message includes an IPS detection function, an AV detection function, a URL detection function, an AIE detection function and an SA detection function; the terminal device 102B
  • the CSB detection function it has includes an IPS detection function, an AV detection function, and an AIE detection function, wherein the IPS detection function, the AV detection function, and the AIE detection function are respectively the same as the IPS detection function, AV detection function included in the CSB detection function of the security device 101.
  • the function is the same as the AIE detection function.
  • the first CSB detection function includes IPS detection function, AV detection function and AIE detection function
  • the second CSB detection function includes URL detection function and SA detection function.
  • the terminal device 102B receives the first message sent by the security device 101.
  • the first message is a message that the security device 101 has performed the URL detection function and the SA detection function, but has not performed the IPS detection function, the AV detection function, and the AIE detection function. .
  • Step 205 the terminal device performs the first CSB detection function on the first packet.
  • the terminal device performs a CSB detection function of the terminal device on the first packet. In other words, the terminal device performs all CSB detection functions of the terminal device by default on the received message.
  • the method before the terminal device performs the first CSB detection function on the first message, the method further includes: the terminal device determines the CSB detection function to be performed corresponding to the first message, and according to the terminal device's The CSB detection function and the CSB detection function to be executed corresponding to the first message determine the first CSB detection function.
  • the terminal device stores multiple CSB detection strategies, where each CSB detection strategy corresponds to a resource type, and each CSB detection strategy includes at least one CSB detection function.
  • the terminal device determines the to-be-executed CSB detection function corresponding to the first message, including: the terminal device obtains the resource type of the resource carried by the first message, searches for a CSB detection policy corresponding to the resource type according to the resource type, and uses the CSB
  • the CSB detection function included in the detection strategy is determined as the CSB detection function to be executed corresponding to the first packet.
  • the CSB detection policy stored in the terminal device is the same as the CSB detection policy stored in the security device in step 202 .
  • the terminal device after determining the first CSB detection function, performs an operation of performing the first CSB detection function on the first packet.
  • the method before the terminal device performs the first CSB detection function on the first packet, the method further includes: the terminal device receives indication information sent by the security device, where the indication information is used to indicate that the first CSB A detection function: the terminal device obtains the first CSB detection function according to the indication information, and performs an operation of performing the first CSB detection function on the first packet.
  • the method further includes: the terminal device detects whether the received first message is a message transmitted in a segmented transmission mode (or is part of data or file); in response to the fact that the first message is part of a message transmitted in segments, the terminal device splices multiple first messages to obtain a spliced message, and the terminal device splices the spliced message
  • the text performs the first CSB detection function.
  • the embodiment of the present application does not limit the manner in which the terminal device detects whether the first packet is a part of the packet transmitted in a segmented transmission manner, and the manner in which the terminal device splices multiple first packets.
  • the method further includes: the terminal device sends authentication information to the login authentication device, so that the login authentication device uses the authentication information to A terminal device joining the internal network performs login authentication, and the login authentication method includes but is not limited to any one of local authentication, server authentication, or certificate authentication.
  • the internal network can be accessed locally through the internal network hardware of the enterprise, or remotely accessed through a virtual private network (virtual private network, VPN).
  • VPN virtual private network
  • Login authentication method 1 the terminal device performs login authentication through local authentication.
  • the terminal device may perform login authentication in a local authentication manner.
  • the method further includes: the terminal device sends a login request to the security device, and the login request includes user information; Authentication result, which is used to indicate whether the terminal device has successfully logged in.
  • the user information may include a user name and a password.
  • the terminal device performs login authentication through server authentication.
  • the terminal device may perform login authentication through server authentication.
  • the method further includes: the terminal device sends a login request to the login authentication device, and the login request includes user information;
  • the authentication result sent by the device based on the user information is used to indicate whether the terminal device has successfully logged in.
  • the user information may include a user name and a password.
  • the method further includes: the terminal device sends a login request to the security device, where the login request includes user information, the The login request is used for the security device to send a login authentication request to the login authentication device based on the login request, so that the login authentication device performs login authentication on the terminal device based on the user information; and receives the authentication result sent by the security device, wherein the authentication result is a login
  • the authentication result generated by the authentication device based on the user information is used to indicate whether the terminal device has successfully logged in.
  • the user information may include a user name and a password.
  • Login authentication mode 3 the terminal device performs login authentication through certificate authentication.
  • the terminal device can perform login authentication through certificate authentication.
  • the method further includes: the terminal device sends a login request to the login authentication device, and the login request includes the local certificate of the terminal device; receiving the login authentication device based on The authentication result sent by the local certificate of the terminal device, which is used to indicate whether the terminal device has successfully logged in. Since the terminal device can complete login authentication through different login authentication modes, the login authentication mode of the terminal device is more flexible.
  • the terminal device in response to the successful login of the terminal device, performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
  • the terminal device in response to the unsuccessful login of the terminal device, does not execute the message processing method.
  • the above-mentioned local authentication, server authentication, and certificate authentication are only login authentication methods described in the embodiment of this application, and the terminal device can also perform login authentication through other login authentication methods, which are not limited in this embodiment of the application.
  • the step of the terminal device performing login authentication corresponds to the relevant content of the terminal device login authentication shown in FIG. 3 .
  • the security device can also perform login authentication to join the internal network.
  • the manner of login authentication includes any one of local authentication, server authentication or certificate authentication.
  • the security device may also perform login authentication through other login authentication methods, which is not limited in this embodiment of the present application.
  • the security device intercepts the first message sent from the external network to the internal network, in the case that the terminal device has all or part of the CSB detection function to be executed corresponding to the first message
  • the security device by omitting to perform all or part of the functions on the first packet by the security device, it is possible to reduce device resource occupation when the security device performs the CSB detection function, thereby reducing performance requirements of the security device for performing the CSB detection function.
  • the method reduces the occupancy of device resources for performing the CSB detection function, the unoccupied device resources of the security device can be used to perform other functions, thereby improving the performance of the security device.
  • the terminal device can perform the first CSB detection function on the first message, so as to implement all pending CSB detections corresponding to the first message, ensuring Security of the first message.
  • the terminal device can splice the packets transmitted in segments, and perform the first CSB detection function on the spliced packets. Since the segmented transmitted message only includes part of the content, threats may not be detected when the first CSB detection function is respectively performed on the segmented transmitted message. The terminal device splices the packets transmitted in segments, and performs the first CSB detection function on the spliced packets to improve the CSB detection effect.
  • the terminal device is a device that performs login authentication through local authentication or server authentication, and the security device queries the capability management device for the CSB detection function of the terminal device.
  • the security device integrates a function of the login authentication device, that is, the login authentication function is implemented by the security device.
  • the login authentication function and the capability management function are implemented by the same device, that is, the device is both a login authentication device and a capability management device.
  • the login authentication function and the capability management function are implemented by two other devices except the security device, that is, the security device, the login authentication device and the capability management device are different devices respectively.
  • this embodiment of the present application takes the login authentication function implemented by the login authentication device, and the capability management function implemented by the capability management device as an example for illustration.
  • the message processing method provided by the embodiment of the present application is shown in Figure 4, including but not It is limited to step 401 to step 422.
  • Step 401 the terminal device sends a login request to the login authentication device, and the login request includes user information.
  • the user information included in the login request includes username and password.
  • Step 402 the login authentication device performs login authentication on the terminal device based on the user information.
  • Step 403 the login authentication device sends the authentication result to the terminal device.
  • steps 401 to 403 reference may be made to the related content of local authentication and server authentication mentioned above, and details will not be repeated here.
  • Step 404 in response to the authentication result being that the authentication is passed, the login authentication device sends user information to the security device.
  • the user information is used for the terminal device to perform login authentication through local authentication. After the terminal device successfully logs in, step 405 is performed.
  • Step 405 the terminal device provides the CSB detection function information corresponding to the terminal device to the capability management device.
  • Step 406 the capability management device stores the CSB detection function information corresponding to the terminal device and the identity key of the terminal device.
  • the identity key of the terminal device includes a random ID of the terminal device.
  • step 406 includes: the capability management device stores CSB detection function information corresponding to the terminal device, and generates and stores a random ID of the terminal device.
  • Step 407 the capability management device sends the first result or the second result and the random ID of the terminal device to the terminal device.
  • Step 408 the terminal device saves the random ID of the terminal device.
  • step 405 to step 407 reference may be made to related content in which the terminal device provides the CSB detection function information corresponding to the terminal device to the capability management device above, which will not be repeated here.
  • Step 409 the terminal device sends the second message to the server on the external network.
  • the second message includes the identity key of the terminal device, and the second message is used to request to acquire resources provided by the server of the external network.
  • Step 410 after the security device intercepts the second message, it sends a query request to the capability management device.
  • Step 411 in response to the query request, the capability management device sends CSB detection function information corresponding to the terminal device to the security device.
  • Step 412 the security device forwards the second packet to the server on the external network.
  • Step 413 in response to the second packet, the server of the external network sends the first packet to the terminal device.
  • steps 409 to 413 reference may be made to the related content of steps 200 and 201 above, which will not be repeated here.
  • Step 414 After the security device intercepts the first message, it determines the CSB detection function to be executed corresponding to the first message.
  • Step 415 the security device determines the CSB detection function of the terminal device.
  • the first CSB detection function is all the functions in the CSB detection functions to be executed corresponding to the first message, and step 416 and step 417 are performed; in response to the terminal device having the first CSB detection function function, the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, perform steps 418 to 420; in response to the terminal device not having the first CSB detection function, perform steps 421 and 422 .
  • Step 416 In response to the fact that the terminal device has a first CSB detection function, and the first CSB detection function is all the CSB detection functions to be executed corresponding to the first message, the security device sends the first message to the terminal device.
  • Step 417 the terminal device performs a first CSB detection function on the first packet.
  • Step 418 in response to the fact that the terminal device has a first CSB detection function, the first CSB detection function is part of the CSB detection functions to be executed corresponding to the first message, and the security device performs a second CSB detection function on the first message , the second CSB detection function is a function other than the first CSB detection function among the to-be-executed CSB detection functions corresponding to the first message.
  • Step 419 In response to the fact that the security device performs the second CSB detection function on the first packet and the detection result is safe, the security device sends the first packet to the terminal device.
  • Step 420 the terminal device performs a first CSB detection function on the first packet.
  • Step 421 in response to the fact that the terminal device does not have the first CSB detection function, the security device performs all CSB detection functions to be performed on the first packet.
  • Step 422 In response to the fact that the security device performs all CSB detection functions to be performed on the first packet and the detection result is safe, the security device sends the first packet to the terminal device.
  • Step 414 to step 422 may refer to the relevant content of step 202 and step 203 above, and will not be repeated here.
  • the terminal device is a device that performs login authentication through certificate authentication, and the security device queries the capability management device for the CSB detection function of the terminal device.
  • the security device integrates a function of the login authentication device, that is, the login authentication function is implemented by the security device.
  • the login authentication function and the capability management function are implemented by the same device, that is, the device is both a login authentication device and a capability management device.
  • the login authentication function and the capability management function are implemented by two other devices except the security device, that is, the security device, the login authentication device, and the capability management device are different devices.
  • this embodiment of the application takes the login authentication function implemented by a security device and the capability management function implemented by a capability management device as an example for illustration.
  • the message processing method provided by this embodiment of the application is shown in Figure 5, including but not limited to Step 501 to step 521.
  • Step 501 the terminal device sends a login request to the security device, where the login request includes the local certificate of the terminal device.
  • Step 502 the security device performs login authentication on the terminal device based on the local certificate of the terminal device.
  • the security device performs login authentication on the terminal device based on the local certificate of the terminal device, including but not limited to steps 1 to 3.
  • Step 1 the security device receives the local certificate of the terminal device sent by the terminal device.
  • Step 2 the security device invokes the certificate authority (certificate authority, CA) certificate of the security device.
  • CA certificate authority
  • Step 3 The security device verifies the local certificate of the terminal device based on the CA certificate of the security device, and obtains a verification result.
  • the terminal device sends the local certificate of the terminal device to the security device; the security device invokes the CA certificate of the security device, the CA certificate is stored in the certificate module of the security device, and the CA certificate is a certificate issued by the CA ; The security device verifies the local certificate of the terminal device according to the CA certificate of the security device; the security device sends the verification result to the terminal device.
  • Step 503 in response to the verification result being authentic, the security device adds user information.
  • the user information is used for the terminal device to perform login authentication through local authentication.
  • step 504 is executed.
  • Step 504 the security device sends the authentication result to the terminal device.
  • step 501 to step 504 correspond to the relevant content of the certificate authentication mentioned above, which will not be repeated here.
  • step 505 is executed.
  • Step 505 the terminal device provides the CSB detection function information corresponding to the terminal device and the local certificate of the terminal device to the capability management device.
  • the local certificate includes user information, and the user information is used as an identity key of the terminal device.
  • Step 506 the capability management device stores the CSB detection function information corresponding to the terminal device and the identity key of the terminal device.
  • the identity key of the terminal device includes user information in the local certificate of the terminal device.
  • Step 507 the capability management device sends the first result or the second result to the terminal device.
  • step 505 reference may be made to related content in which the terminal device provides the CSB detection function information corresponding to the terminal device to the capability management device above, which will not be repeated here.
  • Step 508 the terminal device sends the second packet to the server on the external network.
  • the second message includes the identity key of the terminal device, and the second message is used to request to acquire resources provided by the server of the external network.
  • Step 509 After intercepting the second message, the security device sends a query request to the capability management device.
  • Step 510 in response to the query request, the capability management device sends CSB detection function information corresponding to the terminal device to the security device.
  • Step 511 the security device forwards the second message to the server on the external network.
  • Step 512 in response to the second packet, the server of the external network sends the first packet to the terminal device.
  • step 508 to step 512 reference may be made to the related content of step 200 and step 201 above, which will not be repeated here.
  • Step 513 After the security device intercepts the first message, it determines the CSB detection function to be executed corresponding to the first message.
  • Step 514 the security device determines the CSB detection function of the terminal device.
  • the first CSB detection function is all the functions in the CSB detection functions to be executed corresponding to the first message, and step 515 and step 516 are performed; in response to the terminal device having the first CSB detection function function, the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, perform steps 517 to 519; in response to the terminal device not having the first CSB detection function, perform steps 520 and 521 .
  • Step 515 in response to the fact that the terminal device has the first CSB detection function, and the first CSB detection function is all the CSB detection functions to be executed corresponding to the first message, the security device sends the first message to the terminal device.
  • Step 516 the terminal device performs a first CSB detection function on the first packet.
  • Step 517 in response to the fact that the terminal device has a first CSB detection function, the first CSB detection function is part of the CSB detection functions to be executed corresponding to the first message, and the security device performs a second CSB detection function on the first message , the second CSB detection function is a function other than the first CSB detection function among the to-be-executed CSB detection functions corresponding to the first message.
  • Step 518 In response to the detection result of the security device performing the second CSB detection function on the first message being safe, the security device sends the first message to the terminal device.
  • Step 519 the terminal device performs a first CSB detection function on the first packet.
  • Step 520 in response to the fact that the terminal device does not have the first CSB detection function, the security device performs all CSB detection functions to be performed on the first packet.
  • Step 521 In response to the fact that the safety device performs all CSB detection functions to be performed on the first packet and the detection result is safe, the safety device sends the first packet to the terminal device.
  • steps 513 to 521 are the same as those of steps 414 to 422 above, and will not be repeated here.
  • the security device obtains the CSB detection function information corresponding to the terminal device sent by the terminal device.
  • the security device integrates the function of the capability management device, that is, the capability management function is implemented by the security device.
  • a terminal device remotely accesses the internal network, the terminal device establishes a secure sockets layer (SSL) connection with the security device, and the terminal device sends the second message to the server of the external network based on the HTTPS protocol as an example Be explained.
  • SSL secure sockets layer
  • the message processing method provided by the embodiment of the present application is shown in FIG. 7 , including but not limited to step 701 to step 718 .
  • Step 701 the terminal device establishes an SSL connection with the security device.
  • the terminal device unidirectionally authenticates the security device, and in response to passing the authentication, the terminal device establishes an SSL connection with the security device.
  • the terminal device and the security device conduct mutual authentication, and in response to passing the authentication, the terminal device establishes an SSL connection with the security device.
  • step 503 in FIG. 5 or the related description of FIG. 6 The authentication process involved above is similar to step 503 in FIG. 5 or the related description of FIG. 6 . Please refer to the related description of FIG. 5 or FIG. 6 for the specific process, and will not be described in detail here.
  • Step 702 the terminal device sends a login request to the security device.
  • Step 703 the security device forwards the login request to the login authentication device.
  • Step 704 the login authentication device sends the authentication result of the terminal device to the security device.
  • Step 705 the security device forwards the authentication result to the terminal device.
  • step 702 to step 705 reference may be made to the related content of server authentication in the foregoing, and details are not repeated here.
  • the terminal device can perform login authentication through local authentication, server authentication, certificate authentication or other login authentication methods.
  • steps of terminal device login authentication please refer to the relevant content of the login authentication method above, and will not repeat them here.
  • step 706 is executed.
  • Step 706 the terminal device sends the second packet to the server on the external network.
  • the second message carries the CSB detection function information corresponding to the terminal device, and the second message is used to request to acquire resources provided by the server of the external network.
  • Step 707 After the security device intercepts the second message, it obtains the CSB detection function information corresponding to the terminal device.
  • Step 708 the security device forwards the second packet to the server on the external network.
  • Step 709 in response to the second packet, the server of the external network sends the first packet to the terminal device.
  • steps 706 to 709 reference may be made to the related content of steps 200 and 201 above, which will not be repeated here.
  • Step 710 After the security device intercepts the first message, it determines the CSB detection function to be executed corresponding to the first message.
  • Step 711 the security device determines the CSB detection function of the terminal device.
  • the first CSB detection function is all the functions in the CSB detection functions to be executed corresponding to the first message, and step 712 and step 713 are performed; in response to the terminal device having the first CSB detection function function, the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, perform steps 714 to 716; in response to the terminal device not having the first CSB detection function, perform steps 717 and 718 .
  • Step 712 In response to the fact that the terminal device has a first CSB detection function, and the first CSB detection function is all the CSB detection functions to be executed corresponding to the first message, the security device sends the first message to the terminal device.
  • Step 713 the terminal device performs a first CSB detection function on the first packet.
  • Step 714 in response to the fact that the terminal device has a first CSB detection function, the first CSB detection function is part of the CSB detection functions to be executed corresponding to the first message, and the security device performs a second CSB detection function on the first message , the second CSB detection function is a function other than the first CSB detection function among the to-be-executed CSB detection functions corresponding to the first message.
  • Step 715 In response to the detection result of the security device performing the second CSB detection function on the first message being safe, the security device sends the first message to the terminal device.
  • Step 716 the terminal device performs a first CSB detection function on the first packet.
  • Step 717 In response to the fact that the terminal device does not have the first CSB detection function, the security device performs all CSB detection functions to be performed on the first packet.
  • Step 718 In response to the fact that the security device performs all the CSB detection functions to be performed on the first message and the detection result is safe, the security device sends the first message to the terminal device.
  • steps 710 to 718 are the same as those of steps 414 to 422 above, and will not be repeated here.
  • FIG. 8 is a schematic structural diagram of a message processing device provided by an embodiment of the present application.
  • the device is applied to a security device, and the security device is the security device shown in FIGS. 2-7 above.
  • the packet processing apparatus shown in FIG. 8 can perform all or part of the operations performed by the security device.
  • the message processing device with the structure shown in FIG. 8 implements the functions of the security device in the solutions described in the above embodiments.
  • the message processing device is a function of the security device described in the related embodiments of FIG. 2-7, which can omit performing the first CSB detection function on the first message, and reduce the equipment resource occupation when performing the CSB detection function.
  • the device may include more additional modules than those shown or omit some of the modules shown therein, which is not limited in this embodiment of the present application. As shown in Figure 8, the device includes:
  • the acquisition module 801 is configured to intercept a first message sent from the external network to the internal network, where the first message is used to carry resources provided by the server of the external network according to the request of the terminal device of the internal network;
  • a determining module 802 configured to determine the CSB detection function to be executed corresponding to the first message
  • the processing module 803 is configured to omit performing the first CSB detection function on the first message before forwarding the first message to the terminal device in response to the terminal device having the first CSB detection function, wherein the first CSB detection function is the first All or part of the CSB detection functions to be executed corresponding to the message.
  • the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message
  • the processing module 803 is also used to perform the second CSB detection function on the first message
  • the second CSB detection function is a function other than the first CSB detection function among the to-be-executed CSB detection functions corresponding to the first message.
  • the obtaining module 801 is also configured to intercept a second message sent by the terminal device, the second message is used to request to obtain the resource provided by the server of the external network; based on the second message, obtain the terminal The CSB detection function of the device; the determination module 802 is further configured to determine that the terminal device has the first CSB detection function according to the CSB detection function of the terminal device and the CSB detection function to be executed corresponding to the first message.
  • the second message includes the identity keyword of the terminal device
  • the obtaining module 801 is configured to obtain the identity keyword of the terminal device included in the second message by parsing the second message; according to the terminal device The identity keyword to obtain the CSB detection function of the terminal device.
  • the obtaining module 801 is configured to send a query request to the capability management device, and the capability management device stores CSB detection function information corresponding to the terminal device, where the query request carries the identity keyword of the terminal device,
  • the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function that the terminal device has;
  • the reception capability management device sends the CSB detection function information corresponding to the terminal device in response to the query request; according to the CSB detection function information, determine the CSB detection function that the terminal device has. detection function.
  • the obtaining module 801 is configured to send a query request to the capability management device based on HTTP, HTTPS or API.
  • the obtaining module 801 is configured to query the correspondence between the identity keyword stored in the security device and the CSB detection function according to the identity keyword of the terminal device, and obtain the CSB detection function corresponding to the identity keyword of the terminal device. Function.
  • the identity key includes at least one of a random ID, an IP address, or user information in a local certificate.
  • the second message carries the CSB detection function information corresponding to the terminal device
  • the obtaining module 801 is configured to obtain the CSB detection function information corresponding to the terminal device carried in the second message by parsing the second message ; Determine the CSB detection function of the terminal device according to the CSB detection function information corresponding to the terminal device carried in the second message.
  • the CSB detection function to be executed includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
  • the terminal device is a device that completes login authentication
  • the login authentication manner includes any one of local authentication, server authentication, or certificate authentication.
  • FIG. 9 is a schematic structural diagram of a message processing apparatus provided by an embodiment of the present application.
  • the apparatus is applied to a terminal device, and the terminal device is the terminal device shown in FIGS. 2-7 above.
  • the packet processing apparatus shown in FIG. 9 can perform all or part of the operations performed by the terminal device.
  • the packet processing apparatus with the structure shown in FIG. 9 implements the functions of the terminal equipment in the solutions described in the above embodiments.
  • the packet processing apparatus is a function of the terminal device described in the related embodiments in FIGS. 2-7, and can perform a first CSB detection function on the received first packet.
  • the device may include more additional modules than those shown or omit some of the modules shown therein, which is not limited in this embodiment of the present application.
  • the device includes:
  • the supply module 901 is configured to provide other devices with CSB detection function information corresponding to the terminal device, where the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function that the terminal device has;
  • the receiving module 902 is configured to receive a first message sent by the security device, where the security device is deployed on the boundary between the external network and the internal network, and the first message is used to carry the resources provided by the server of the external network according to the request of the terminal device,
  • the first message is a message for which the security device does not perform the first CSB detection function, and the CSB detection function of the terminal device includes the first CSB detection function;
  • the processing module 903 is configured to perform a first CSB detection function on the first packet.
  • the supply module 901 is configured to send a third message to the capability management device, the third message carries the CSB detection function information corresponding to the terminal device, and the capability management device is used to store the CSB corresponding to the terminal device Check feature information.
  • the supply module 901 is configured to send a third message to the security device, the third message carries the CSB detection function information corresponding to the terminal device, and the security device is used to store the CSB detection function corresponding to the terminal device information.
  • the provisioning module 901 is configured to send a second message to a server on the external network, where the second message is used to request to acquire resources provided by the server on the external network, where the second message carries a terminal device Corresponding CSB detection function information.
  • the second message is a message transmitted based on HTTPS
  • the CSB detection function information corresponding to the terminal device is carried in the Cookie of the second message, or the URL parameter, or the HTTPS header field, or the HTTPS auto in the definition field.
  • the second message is a message based on HTTP transmission
  • the CSB detection function information corresponding to the terminal device is carried in the Cookie, or the HTTP header field, or the HTTP custom field of the second message.
  • the second message is a message transmitted based on FTP
  • the CSB detection function information corresponding to the terminal device is carried in an FTP redundant field or an FTP custom field of the second message.
  • the device further includes: a sending module, configured to send a second message to a server on an external network, where the second message is used to request resources provided by the server on the external network, where the second The message includes an identity keyword of the terminal device, and the identity keyword is used to obtain the CSB detection function of the terminal device.
  • a sending module configured to send a second message to a server on an external network, where the second message is used to request resources provided by the server on the external network, where the second The message includes an identity keyword of the terminal device, and the identity keyword is used to obtain the CSB detection function of the terminal device.
  • the receiving module 902 in response to the fact that the other device is a capability management device, is also configured to receive the random ID of the terminal device sent by the capability management device, and the random ID of the terminal device is used as the identity key of the terminal device or in response to other devices being security devices, the receiving module 902 is also configured to receive the random ID of the terminal device sent by the security device, and the random ID of the terminal device is used as an identity key of the terminal device.
  • the third packet further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device.
  • the third message further includes a local certificate of the terminal device, and the user information in the local certificate of the terminal device is used as an identity key of the terminal device.
  • the CSB detection function of the terminal device includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
  • the apparatus further includes: a request module, configured to send a login request to the security device, where the login request includes user information; receive an authentication result sent by the security device based on the user information, and the authentication result is used to instruct the terminal device Whether the login is successful; in response to the successful login of the terminal device, the supply module 901 executes the operation of providing the CSB detection function information corresponding to the terminal device to other devices.
  • a request module configured to send a login request to the security device, where the login request includes user information
  • receive an authentication result sent by the security device based on the user information, and the authentication result is used to instruct the terminal device Whether the login is successful
  • the supply module 901 executes the operation of providing the CSB detection function information corresponding to the terminal device to other devices.
  • the apparatus further includes: a request module, configured to send a login request to the login authentication device, where the login request includes user information; receive an authentication result sent by the login authentication device based on the user information, and the authentication result is used to indicate Whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the supply module 901 performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
  • a request module configured to send a login request to the login authentication device, where the login request includes user information
  • the supply module 901 performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
  • the apparatus further includes: a request module, configured to send a login request to the login authentication device, where the login request includes the local certificate of the terminal device; and receive the authentication result sent by the login authentication device based on the local certificate of the terminal device , the authentication result is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the supply module 901 performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
  • a request module configured to send a login request to the login authentication device, where the login request includes the local certificate of the terminal device
  • receive the authentication result sent by the login authentication device based on the local certificate of the terminal device the authentication result is used to indicate whether the terminal device has successfully logged in
  • the supply module 901 performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
  • FIG. 10 shows a schematic structural diagram of a packet processing device 2000 provided by an exemplary embodiment of the present application.
  • the packet processing device 2000 shown in FIG. 10 may be a security device or a terminal device, and is configured to perform operations involved in the packet processing method shown in FIGS. 2-7 above.
  • the packet processing device 2000 is, for example, a switch, a router, etc., and the packet processing device 2000 may be implemented by a general bus architecture.
  • the packet processing device 2000 includes at least one processor 2001 , a memory 2003 and at least one communication interface 2004 .
  • the processor 2001 is, for example, a general-purpose central processing unit (central processing unit, CPU), a digital signal processor (digital signal processor, DSP), a network processor (network processor, NP), a graphics processing unit (graphics processing unit, GPU), A neural network processor (neural-network processing units, NPU), a data processing unit (data processing unit, DPU), a microprocessor, or one or more integrated circuits for implementing the solution of this application.
  • the processor 2001 includes an application-specific integrated circuit (application-specific integrated circuit, ASIC), a programmable logic device (programmable logic device, PLD) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof.
  • the PLD is, for example, a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a general array logic (generic array logic, GAL) or any combination thereof. It can realize or execute various logical blocks, modules and circuits described in conjunction with the disclosure of the embodiments of the present application.
  • the processor may also be a combination for realizing computing functions, for example, a combination of one or more microprocessors, a combination of DSP and a microprocessor, and so on.
  • the packet processing device 2000 further includes a bus.
  • the bus is used to transfer information between the various components of the message processing device 2000.
  • the bus may be a peripheral component interconnect standard (PCI for short) bus or an extended industry standard architecture (EISA for short) bus or the like.
  • PCI peripheral component interconnect standard
  • EISA extended industry standard architecture
  • the bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 10 , but it does not mean that there is only one bus or one type of bus.
  • the memory 2003 is, for example, a read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions, or a random access memory (random access memory, RAM) or a storage device that can store information and instructions.
  • Other types of dynamic storage devices such as electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc Storage (including Compact Disc, Laser Disc, Optical Disc, Digital Versatile Disc, Blu-ray Disc, etc.), magnetic disk storage medium, or other magnetic storage device, or is capable of carrying or storing desired program instructions in the form of instructions or data structures and capable of Any other medium accessed by a computer, but not limited to.
  • the memory 2003 exists independently, for example, and is connected to the processor 2001 via a bus.
  • the memory 2003 can also be integrated with the processor 2001.
  • the communication interface 2004 uses any device such as a transceiver to communicate with other devices or a communication network.
  • the communication network can be Ethernet, radio access network (RAN) or wireless local area network (wireless local area network, WLAN).
  • the communication interface 2004 may include a wired communication interface, and may also include a wireless communication interface.
  • the communication interface 2004 can be an ethernet (ethernet) interface, a fast ethernet (fast ethernet, FE) interface, a gigabit ethernet (gigabit ethernet, GE) interface, an asynchronous transfer mode (asynchronous transfer mode, ATM) interface, a wireless local area network ( wireless local area networks, WLAN) interface, cellular network communication interface or a combination thereof.
  • the Ethernet interface can be an optical interface, an electrical interface or a combination thereof.
  • the communication interface 2004 may be used for the packet processing device 2000 to communicate with other devices.
  • the processor 2001 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 10 .
  • Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor.
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • the packet processing device 2000 may include multiple processors, such as the processor 2001 and the processor 2005 shown in FIG. 10 .
  • processors can be a single-core processor (single-CPU) or a multi-core processor (multi-CPU).
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data such as computer program instructions.
  • the packet processing device 2000 may further include an output device and an input device.
  • Output devices communicate with processor 2001 and can display information in a variety of ways.
  • the output device may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a cathode ray tube (cathode ray tube, CRT) display device, or a projector (projector).
  • the input device communicates with the processor 2001 and can receive user input in various ways.
  • the input device may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
  • the memory 2003 is used to store program instructions 2010 for implementing the solution of the present application
  • the processor 2001 can execute the program instructions 2010 stored in the memory 2003 . That is, the packet processing device 2000 can implement the packet processing method provided by the method embodiment through the processor 2001 and the program instructions 2010 in the memory 2003 .
  • One or more software modules may be included in the program instructions 2010 .
  • the processor 2001 itself may also store program codes or instructions for executing the solutions of the present application.
  • the message processing device 2000 in the embodiment of the present application may correspond to the security device in the above embodiments of the message processing method, and the processor 2001 in the message processing device 2000 reads the instructions in the memory 2003, This enables the message processing device 2000 shown in FIG. 10 to perform all or part of the operations performed by the security device.
  • the message processing device 2000 in the embodiment of the present application may correspond to the terminal device in each of the foregoing message processing method embodiments, and the processor 2001 in the message processing device 2000 reads the instructions in the memory 2003,
  • the packet processing device 2000 shown in FIG. 10 is enabled to perform all or part of the operations performed by the terminal device.
  • the packet processing device 2000 may also correspond to the packet processing device shown in FIGS. In other words, the functional modules included in the message processing apparatus are generated after the processor 2001 of the message processing device 2000 reads the program instructions 2010 stored in the memory 2003 .
  • each step of the message processing method shown in FIGS. 2-7 is completed by an integrated logic circuit of hardware in a processor of the message processing device 2000 or an instruction in the form of software.
  • the steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, no detailed description is given here.
  • FIG. 11 shows a schematic structural diagram of a packet processing device 2100 provided in another exemplary embodiment of the present application.
  • the packet processing device 2100 shown in FIG. 11 may be a security device or a terminal device, and is configured to perform all or part of the operations involved in the packet processing method shown in FIGS. 2-7 above.
  • the packet processing device 2100 is, for example, a switch, a router, etc., and the packet processing device 2100 may be implemented by a general bus architecture.
  • the packet processing device 2100 includes: a main control board 2110 and an interface board 2130 .
  • the main control board is also called a main processing unit (main processing unit, MPU) or a route processing card (route processor card). Device management, device maintenance, protocol processing functions.
  • the main control board 2110 includes: a central processing unit 2111 and a memory 2112 .
  • the interface board 2130 is also called a line interface unit card (line processing unit, LPU), a line card (line card), or a service board.
  • the interface board 2130 is used to provide various service interfaces and implement data packet forwarding.
  • the service interface includes but not limited to Ethernet interface, POS (packet over SONET/SDH) interface, etc., and the Ethernet interface is, for example, flexible Ethernet service interface (flexible ethernet clients, FlexE Clients).
  • the interface board 2130 includes: a central processing unit 2131 , a network processor 2132 , a forwarding entry storage 2134 and a physical interface card (physical interface card, PIC) 2133 .
  • the central processor 2131 on the interface board 2130 is used to control and manage the interface board 2130 and communicate with the central processor 2111 on the main control board 2110 .
  • the network processor 2132 is configured to implement message forwarding processing.
  • the form of the network processor 2132 may be a forwarding chip.
  • the forwarding chip may be a network processor (network processor, NP).
  • the forwarding chip may be implemented by an application-specific integrated circuit (application-specific integrated circuit, ASIC) or a field programmable gate array (field programmable gate array, FPGA).
  • the network processor 2132 is used to forward the received message based on the forwarding table stored in the forwarding table item storage 2134, and if the destination address of the message is the address of the message processing device 2100, then send the message to CPU (such as central processing unit 2131) processing; If the destination address of message is not the address of message processing device 2100, then according to this destination address, find out the next hop and outgoing interface corresponding to this destination address from the forwarding table, and send the The packet is forwarded to the outbound interface corresponding to the destination address.
  • the processing of the uplink message may include: processing of the inbound interface of the message, forwarding table search; the processing of the downlink message may include: forwarding table search and so on.
  • the central processing unit can also perform the function of the forwarding chip, such as implementing software forwarding based on a general-purpose CPU, so that no forwarding chip is needed in the interface board.
  • the physical interface card 2133 is used to implement the interconnection function of the physical layer, through which the original traffic enters the interface board 2130 , and the processed packets are sent out from the physical interface card 2133 .
  • the physical interface card 2133 is also called a daughter card, which can be installed on the interface board 2130, and is responsible for converting the photoelectric signal into a message, checking the validity of the message and forwarding it to the network processor 2132 for processing.
  • the central processor 2131 can also execute the functions of the network processor 2132 , such as implementing software forwarding based on a general-purpose CPU, so that the physical interface card 2133 does not need the network processor 2132 .
  • the packet processing device 2100 includes a plurality of interface boards, for example, the packet processing device 2100 further includes an interface board 2140, and the interface board 2140 includes: a central processing unit 2141, a network processor 2142, a forwarding entry storage 2144 and a physical interface Card 2143.
  • the functions and implementation methods of the components in the interface board 2140 are the same as or similar to those of the interface board 2130 , and will not be repeated here.
  • the packet processing device 2100 further includes a switching fabric unit 2120 .
  • the SFU 2120 may also be called a switch fabric unit (switch fabric unit, SFU).
  • SFU switch fabric unit
  • the switching fabric board 2120 is used to complete the data exchange between the interface boards.
  • the interface board 2130 and the interface board 2140 may communicate through the SFU 2120 .
  • the main control board 2110 is coupled to the interface board.
  • the main control board 2110, the interface board 2130, the interface board 2140, and the switching fabric board 2120 are connected to the system backplane through the system bus to realize intercommunication.
  • an inter-process communication protocol IPC
  • IPC inter-process communication
  • the packet processing device 2100 includes a control plane and a forwarding plane.
  • the control plane includes a main control board 2110 and a central processing unit 2111.
  • the forwarding plane includes various components for performing forwarding, such as a forwarding entry storage 2134, a physical interface card 2133 and network processor 2132 .
  • the control plane executes routers, generates forwarding tables, processes signaling and protocol packets, configures and maintains the status of network devices, and other functions.
  • the control plane sends the generated forwarding tables to the forwarding plane.
  • the network processor 2132 controls The forwarding table issued by the above checks the table and forwards the packets received by the physical interface card 2133.
  • the forwarding table issued by the control plane may be stored in the forwarding table item storage 2134 . In some embodiments, the control plane and the forwarding plane can be completely separated and not on the same network device.
  • main control boards there may be one or more main control boards, and when there are multiple main control boards, it may include the main main control board and the standby main control board. There may be one or more interface boards. The stronger the data processing capability of the packet processing device, the more interface boards it provides. There may also be one or more physical interface cards on the interface board. There may be no SFU, or there may be one or more SFUs. When there are multiple SFUs, they can jointly implement load sharing and redundant backup. Under the centralized forwarding architecture, the packet processing device does not need a switching network board, and the interface board undertakes the processing function of the service data of the entire system.
  • the message processing device can have at least one SFU, and the data exchange between multiple interface boards can be realized through the SFU, providing large-capacity data exchange and processing capabilities. Therefore, the data access and processing capability of the packet processing device with distributed architecture is greater than that of the packet processing device with centralized architecture.
  • the form of the packet processing device may also be that there is only one board, that is, there is no switching fabric board, and the functions of the interface board and the main control board are integrated on this board. At this time, the CPU and the The central processing unit on the main control board can be combined into one central processing unit on the board to perform the superimposed functions of the two.
  • the data exchange and processing capabilities of this form of message processing equipment are low (for example, low-end network devices such as switches or routers). Which architecture to use depends on the specific networking deployment scenario, and there is no limitation here.
  • the packet processing device 2100 corresponds to the packet processing apparatus applied to a security device shown in FIG. 8 above.
  • the acquiring module 801 in the packet processing apparatus shown in FIG. 8 is equivalent to the physical interface card 2133 in the packet processing device 2100; the determining module 802 and the processing module 803 are equivalent to the CPU 2111 or network processor 2132.
  • the packet processing device 2100 also corresponds to the packet processing apparatus applied to the terminal device shown in FIG. 9 above.
  • the supply module 901 in the message processing apparatus shown in FIG. 9 is equivalent to the physical interface card 2133 in the message processing device 2100; the receiving module 902 and the processing module 903 are equivalent to the CPU 2111 or network processor 2132.
  • the embodiment of the present application further provides a message processing system, which includes: a security device and a terminal device.
  • the security device is the message processing device 2000 shown in FIG. 10 or the message processing device 2100 shown in FIG. 11, and the terminal device is the message processing device 2000 shown in FIG. processing device 2100 .
  • the embodiment of the present application also provides a communication device, which includes: a transceiver, a memory, and a processor.
  • the transceiver, the memory and the processor communicate with each other through an internal connection path, the memory is used to store instructions, and the processor is used to execute the instructions stored in the memory to control the transceiver to receive signals and control the transceiver to send signals , and when the processor executes the instruction stored in the memory, the processor is made to execute the message processing method required by the security device.
  • the embodiment of the present application also provides a communication device, which includes: a transceiver, a memory, and a processor.
  • the transceiver, the memory and the processor communicate with each other through an internal connection path, the memory is used to store instructions, and the processor is used to execute the instructions stored in the memory to control the transceiver to receive signals and control the transceiver to send signals , and when the processor executes the instructions stored in the memory, the processor is made to execute the message processing method required by the terminal device.
  • processor may be a central processing unit (CPU), and may also be other general-purpose processors, digital signal processing (digital signal processing, DSP), application specific integrated circuit (application specific integrated circuit, ASIC), field-programmable gate array (field-programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processing
  • ASIC application specific integrated circuit
  • FPGA field-programmable gate array
  • a general purpose processor may be a microprocessor or any conventional processor or the like. It should be noted that the processor may be a processor supporting advanced RISC machines (ARM) architecture.
  • ARM advanced RISC machines
  • the above-mentioned memory may include a read-only memory and a random-access memory, and provide instructions and data to the processor.
  • Memory may also include non-volatile random access memory.
  • the memory may also store device type information.
  • the memory can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, many forms of RAM are available.
  • static random access memory static random access memory
  • dynamic random access memory dynamic random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • double data rate synchronous dynamic random access Memory double data date SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous link dynamic random access memory direct memory bus random access memory (direct rambus) RAM, DR RAM).
  • the embodiment of the present application also provides a computer-readable storage medium, where at least one instruction is stored in the storage medium, and the instruction is loaded and executed by a processor to implement any one of the packet processing methods described above.
  • the embodiment of the present application also provides a computer program (product).
  • the processor or the computer can execute each step and/or process of the corresponding message processing method in the above method embodiment.
  • the embodiment of the present application also provides a chip, including a processor, configured to call and execute instructions stored in the memory from the memory, so that the communication device installed with the chip executes the message processing method in the above aspects .
  • the embodiment of the present application also provides another chip, including: an input interface, an output interface, a processor, and a memory, the input interface, the output interface, the processor, and the memory are connected through an internal connection path, and the The processor is configured to execute the codes in the memory, and when the codes are executed, the processor is configured to execute the message processing method in the above aspects.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, DSL) or wireless (eg, infrared, wireless, microwave, etc.) means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (such as a floppy disk, a hard disk, or a magnetic tape), an optical medium (such as a DVD), or a semiconductor medium (such as a solid state disk).
  • the computer program product includes one or more computer program instructions.
  • the methods of embodiments of the present application may be described in the context of machine-executable instructions, such as program modules included in a device executed on a real or virtual processor of a target.
  • program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform particular tasks or implement particular abstract data structures.
  • the functionality of the program modules may be combined or divided between the described program modules.
  • Machine-executable instructions for program modules may be executed locally or in distributed devices. In a distributed device, program modules may be located in both local and remote storage media.
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the modules is only a logical function division. In actual implementation, there may be other division methods.
  • multiple modules or components can be combined or can be Integrate into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be indirect coupling or communication connection through some interfaces, devices or modules, and may also be electrical, mechanical or other forms of connection.
  • the modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, that is, they may be located in one place, or may be distributed to multiple network modules. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present application.
  • each functional module in each embodiment of the present application may be integrated into one processing module, each module may exist separately physically, or two or more modules may be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program for or related to an instruction execution system, apparatus, or device.
  • the computer readable storage medium may be a machine readable signal medium or a machine readable storage medium.
  • a computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination thereof.
  • Computer-readable storage media include electrical connections with one or more wires, portable computer diskettes, hard disks, random storage access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash), optical storage, magnetic storage, or any suitable combination thereof.
  • RAM random storage access memory
  • ROM read-only memory
  • EPROM or flash erasable programmable read-only memory
  • optical storage magnetic storage, or any suitable combination thereof.

Abstract

The present application provides a packet processing method and apparatus, a device, a system, and a readable storage medium. The method comprises: a terminal device provides CSB detection function information corresponding to the terminal device to other devices; a security device intercepts a first packet sent from an external network to an internal network; after intercepting the first packet, the security device determines a CSB detection function to be performed corresponding to the first packet; in response to the terminal device having all or part of the CSB detection function, the security device omits to perform all or part of the function on the first packet before forwarding the first packet to the terminal device; and the terminal device receives the first packet sent by the security device, and performs the CSB detection function that is not performed by the security device on the first packet. According to the method, device resource occupation during CSB detection performed by a security gateway can be reduced, and the performance requirements of the security device in performing the CSB detection function can be reduced.

Description

报文处理方法、装置、设备、系统及可读存储介质Message processing method, device, equipment, system and readable storage medium
本申请要求于2021年06月26日提交的申请号为202110714768.5、发明名称为“内容安全的检测方法、装置和系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中;本申请还要求于2021年09月13日提交的申请号为202111069732.2、发明名称为“报文处理方法、装置、设备、系统及可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 202110714768.5 and the invention title "Content Security Detection Method, Device and System" filed on June 26, 2021, the entire contents of which are incorporated in this application by reference; This application also claims the priority of the Chinese patent application with the application number 202111069732.2 and the title of the invention "Message Processing Method, Device, Equipment, System, and Readable Storage Medium" filed on September 13, 2021, the entire content of which is passed References are incorporated in this application.
技术领域technical field
本申请涉及通信技术领域,特别涉及报文处理方法、装置、设备、系统及可读存储介质。The present application relates to the technical field of communications, and in particular to message processing methods, devices, equipment, systems and readable storage media.
背景技术Background technique
随着互连网的迅速发展,网络流量出现爆发式增长。安全网关设备需要对流经该安全网关设备网络流量进行内容安全业务(content security business,CSB)检测等处理,以保证内部网络的网络设备能够安全运行。随着日趋丰富互联网业务类型带来的流量爆炸式增长、以及日趋多样化、复杂化的CSB功能,安全网关设备有限的处理性能更容易成为业务瓶颈。With the rapid development of the Internet, network traffic has experienced explosive growth. The security gateway device needs to perform content security business (content security business, CSB) detection and other processing on the network traffic flowing through the security gateway device, so as to ensure that the network devices of the internal network can operate safely. With the explosive growth of traffic brought about by the increasing variety of Internet business types, and the increasingly diverse and complex CSB functions, the limited processing performance of security gateway equipment is more likely to become a business bottleneck.
缓解瓶颈问题的一种相关技术是更换具有更高性能的中央处理器(central processing unit,CPU)和更多内存的安全网关设备。然而该技术一方面硬件成本较高,另一方面,在更换的高性能安全网关设备接入网络工作之前,对更换的高性能安全网关设备进行调试,也需要较长的开发调试周期。因此该技术的实施代价较高。A related technique to alleviate the bottleneck problem is to replace the security gateway device with a higher performance central processing unit (CPU) and more memory. However, on the one hand, the hardware cost of this technology is relatively high. On the other hand, debugging the replaced high-performance security gateway device before it is connected to the network requires a long development and debugging cycle. Therefore, the implementation cost of this technique is relatively high.
发明内容Contents of the invention
本申请提出一种报文处理方法、装置、设备、系统及可读存储介质,以降低执行CSB检测功能对安全设备的性能的要求,降低安全设备执行CSB检测的设备资源占用。The present application proposes a message processing method, device, device, system, and readable storage medium, so as to reduce the performance requirements of the security equipment for performing the CSB detection function, and reduce the occupation of equipment resources for the security equipment to perform the CSB detection.
第一方面,提供了一种报文处理方法,该方法应用于安全设备,该安全设备部署于外部网络和内部网络的边界,该方法包括:安全设备截获外部网络向内部网络发送的第一报文,其中,第一报文承载有外部网络的服务器根据内部网络的终端设备的请求提供的资源;安全设备截获第一报文之后,确定该第一报文对应的待执行的CSB检测功能;响应于终端设备具有第一CSB检测功能,安全设备向终端设备转发第一报文之前,省略对第一报文执行第一CSB检测功能,该第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的全部功能或部分功能。In the first aspect, a packet processing method is provided, the method is applied to a security device, and the security device is deployed on the boundary between the external network and the internal network, and the method includes: the security device intercepts the first packet sent from the external network to the internal network The first message carries the resource provided by the server of the external network according to the request of the terminal device of the internal network; after the security device intercepts the first message, it determines the CSB detection function to be executed corresponding to the first message; In response to the fact that the terminal device has the first CSB detection function, the security device omits performing the first CSB detection function on the first message before forwarding the first message to the terminal device. All or some of the CSB detection functions performed.
该方法通过安全设备省略对第一报文执行第一CSB检测功能,能够降低安全设备执行CSB检测功能时的设备资源占用,从而降低执行CSB检测功能对安全设备的性能的要求。另外,由于该方法降低了执行CSB检测功能的设备资源占用,安全设备的未被占用的设备资源能够用于执行其他功能,提高了安全设备的性能。In the method, the security device omits the first CSB detection function for the first message, which can reduce equipment resource occupation when the security device performs the CSB detection function, thereby reducing performance requirements of the security device for performing the CSB detection function. In addition, because the method reduces the occupancy of device resources for performing the CSB detection function, the unoccupied device resources of the security device can be used to perform other functions, thereby improving the performance of the security device.
在一种可能的实现方式中,第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的部分功能,安全设备向终端设备转发第一报文之前,还包括:安全设备对第一报文执行 第二CSB检测功能,第二CSB检测功能是第一报文对应的待执行的CSB检测功能中除第一CSB检测功能之外的功能。In a possible implementation manner, the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, and before the security device forwards the first message to the terminal device, it also includes: The first message performs a second CSB detection function, and the second CSB detection function is a function other than the first CSB detection function among the CSB detection functions to be performed corresponding to the first message.
由于终端设备具有的第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的部分功能,安全设备执行除第一CSB检测功能之外的第二CSB检测功能,由安全设备和终端设备共同完成第一报文对应的CSB检测功能,在降低安全设备资源消耗的情况下,保证了第一报文的安全性。Since the first CSB detection function of the terminal device is part of the CSB detection function to be executed corresponding to the first message, the security device performs the second CSB detection function except the first CSB detection function, and the security device and The terminal devices jointly complete the CSB detection function corresponding to the first message, which ensures the security of the first message while reducing the resource consumption of the security device.
在一种可能的实现方式中,安全设备截获由外部网络向内部网络发送的第一报文之前,还包括:安全设备截获终端设备发送的第二报文,第二报文用于请求获取外部网络的服务器提供的资源;基于第二报文,安全设备获取终端设备具有的CSB检测功能;安全设备确定第一报文对应的待执行的CSB检测功能之后,还包括:安全设备根据终端设备具有的CSB检测功能以及第一报文对应的待执行的CSB检测功能,确定终端设备具有第一CSB检测功能。In a possible implementation, before the security device intercepts the first message sent from the external network to the internal network, it further includes: the security device intercepts the second message sent by the terminal device, and the second message is used to request to obtain the external The resource provided by the server of the network; based on the second message, the security device obtains the CSB detection function of the terminal device; after the security device determines the CSB detection function to be executed corresponding to the first message, the security device further includes: The CSB detection function and the CSB detection function to be executed corresponding to the first packet determine that the terminal device has the first CSB detection function.
在一种可能的实现方式中,第二报文包括终端设备的身份关键字,基于第二报文,安全设备获取终端设备具有的CSB检测功能,包括:安全设备通过解析第二报文获取第二报文包括的终端设备的身份关键字;安全设备根据终端设备的身份关键字,获取终端设备具有的CSB检测功能。In a possible implementation, the second message includes the identity keyword of the terminal device, and based on the second message, the security device obtains the CSB detection function of the terminal device, including: the security device obtains the CSB detection function of the terminal device by parsing the second message. The identity keyword of the terminal device included in the second message; the security device obtains the CSB detection function of the terminal device according to the identity keyword of the terminal device.
在一种可能的实现方式中,安全设备根据终端设备的身份关键字,获取终端设备具有的CSB检测功能,包括:安全设备向能力管理设备发送查询请求,能力管理设备存储有终端设备对应的CSB检测功能信息,其中,查询请求中携带终端设备的身份关键字,终端设备对应的CSB检测功能信息用于指示终端设备具有的CSB检测功能;接收能力管理设备响应于查询请求发送的终端设备对应的CSB检测功能信息;根据CSB检测功能信息,确定终端设备具有的CSB检测功能。In a possible implementation, the security device obtains the CSB detection function of the terminal device according to the identity key of the terminal device, including: the security device sends a query request to the capability management device, and the capability management device stores the CSB corresponding to the terminal device Detection function information, wherein the query request carries the identity keyword of the terminal device, and the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function of the terminal device; CSB detection function information: determine the CSB detection function of the terminal device according to the CSB detection function information.
在一种可能的实现方式中,向能力管理设备发送查询请求,包括:基于HTTP、HTTPS或API,向能力管理设备发送查询请求。该方法发送查询请求的方式较为灵活。In a possible implementation manner, sending the query request to the capability management device includes: sending the query request to the capability management device based on HTTP, HTTPS or API. The method of sending query requests is more flexible.
在一种可能的实现方式中,安全设备根据终端设备的身份关键字,获取终端设备具有的CSB检测功能,包括:安全设备根据终端设备的身份关键字,查询安全设备存储的身份关键字和CSB检测功能的对应关系,获取终端设备的身份关键字对应的CSB检测功能。由于终端设备具有的CSB检测功能的相关信息能够存储在能力管理设备中,也能存储在安全设备上,该方法存储终端设备具有的CSB检测功能的相关信息的方式较为灵活。In a possible implementation manner, the security device obtains the CSB detection function of the terminal device according to the identity key of the terminal device, including: the security device queries the identity key and CSB stored in the security device according to the identity key of the terminal device The corresponding relationship of detection functions is to obtain the CSB detection function corresponding to the identity keyword of the terminal device. Since the relevant information of the CSB detection function of the terminal device can be stored in the capability management device and can also be stored on the security device, the method for storing the relevant information of the CSB detection function of the terminal device is more flexible.
在一种可能的实现方式中,身份关键字包括随机ID、IP地址或本地证书中的用户信息中的至少一种。该方法中终端设备的身份关键字的类型较为灵活,并且,由于终端设备的身份关键字能够包括多种类型的信息,根据该终端设备的身份关键字获取终端设备具有的第一CSB检测功能的准确性较高。In a possible implementation manner, the identity key includes at least one of a random ID, an IP address, or user information in a local certificate. In this method, the type of the identity key of the terminal device is relatively flexible, and since the identity key of the terminal device can include various types of information, the first CSB detection function of the terminal device is obtained according to the identity key of the terminal device. Higher accuracy.
在一种可能的实现方式中,第二报文携带终端设备对应的CSB检测功能信息,基于第二报文,安全设备获取终端设备具有的CSB检测功能,包括:安全设备通过解析第二报文获取第二报文携带的终端设备对应的CSB检测功能信息;安全设备根据第二报文携带的终端设备对应的CSB检测功能信息,确定终端设备具有的CSB检测功能。由于第二报文能够直接携带有终端设备对应的CSB检测功能信息,安全设备能够直接通过解析第二报文获取终端设备对应的CSB检测功能信息,该获取终端设备对应的CSB检测功能信息的效率较高。In a possible implementation, the second message carries information about the CSB detection function corresponding to the terminal device. Based on the second message, the security device obtains the CSB detection function of the terminal device, including: the security device parses the second message Obtain CSB detection function information corresponding to the terminal device carried in the second message; the security device determines the CSB detection function of the terminal device according to the CSB detection function information corresponding to the terminal device carried in the second message. Since the second message can directly carry the CSB detection function information corresponding to the terminal device, the security device can directly obtain the CSB detection function information corresponding to the terminal device by parsing the second message. The efficiency of obtaining the CSB detection function information corresponding to the terminal device is higher.
在一种可能的实现方式中,待执行的CSB检测功能包括IPS检测功能、AV检测功能、URL 检测功能、AIE检测功能或SA检测功能中的至少一种。In a possible implementation manner, the CSB detection function to be executed includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
在一种可能的实现方式中,终端设备为完成登录认证的设备,登录认证的方式包括本地认证、服务器认证或证书认证中的任一种。In a possible implementation manner, the terminal device is a device that completes login authentication, and the login authentication manner includes any one of local authentication, server authentication, or certificate authentication.
第二方面,提供了一种报文处理方法,该方法应用于终端设备,终端设备部署于内部网络中,该方法包括:In the second aspect, a message processing method is provided, the method is applied to a terminal device, and the terminal device is deployed in an internal network, and the method includes:
终端设备向其他设备提供终端设备对应的CSB检测功能信息,终端设备对应的CSB检测功能信息用于指示终端设备具有的CSB检测功能;终端设备接收安全设备发送的第一报文,其中,安全设备部署于外部网络和内部网络的边界,第一报文用于承载外部网络的服务器根据终端设备的请求提供的资源,第一报文为安全设备未执行第一CSB检测功能的报文,终端设备具有的CSB检测功能中包括该第一CSB检测功能;终端设备对第一报文执行该第一CSB检测功能。由于终端设备能够对第一报文执行安全设备未执行的CSB检测功能,该方法保证了第一报文的安全性。The terminal device provides CSB detection function information corresponding to the terminal device to other devices, and the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function of the terminal device; the terminal device receives the first message sent by the security device, wherein the security device Deployed at the boundary between the external network and the internal network, the first message is used to carry the resources provided by the server of the external network according to the request of the terminal device, the first message is a message that the security device has not performed the first CSB detection function, and the terminal device The CSB detection function it has includes the first CSB detection function; the terminal device executes the first CSB detection function on the first packet. Since the terminal device can perform the CSB detection function not performed by the security device on the first message, this method ensures the security of the first message.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息,包括:终端设备向能力管理设备发送第三报文,第三报文携带终端设备对应的CSB检测功能信息,能力管理设备用于存储终端设备对应的CSB检测功能信息。In a possible implementation manner, the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including: the terminal device sends a third message to the capability management device, and the third message carries the CSB detection function corresponding to the terminal device Information, the capability management device is used to store the CSB detection function information corresponding to the terminal device.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息,包括:终端设备向安全设备发送第三报文,第三报文携带终端设备对应的CSB检测功能信息,安全设备用于存储终端设备对应的CSB检测功能信息。In a possible implementation manner, the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including: the terminal device sends a third message to the security device, and the third message carries the CSB detection function information corresponding to the terminal device , the security device is used to store the CSB detection function information corresponding to the terminal device.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息,包括:终端设备向外部网络的服务器发送第二报文,第二报文用于请求获取外部网络的服务器提供的资源,其中第二报文携带终端设备对应的CSB检测功能信息。In a possible implementation manner, the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including: the terminal device sends a second message to the server of the external network, and the second message is used to request to obtain the CSB detection function information of the external network. The resource provided by the server, wherein the second packet carries CSB detection function information corresponding to the terminal device.
在一种可能的实现方式中,第二报文为基于HTTPS传输的报文,终端设备对应的CSB检测功能信息携带在第二报文的Cookie,或URL参数,或HTTPS首部字段,或HTTPS自定义字段中。In a possible implementation, the second message is a message transmitted based on HTTPS, and the CSB detection function information corresponding to the terminal device is carried in the Cookie of the second message, or the URL parameter, or the HTTPS header field, or the HTTPS auto in the definition field.
在一种可能的实现方式中,第二报文为基于HTTP传输的报文,终端设备对应的CSB检测功能信息携带在第二报文的Cookie,或HTTP首部字段,或HTTP自定义字段中。In a possible implementation manner, the second message is a message based on HTTP transmission, and the CSB detection function information corresponding to the terminal device is carried in the Cookie, or the HTTP header field, or the HTTP custom field of the second message.
在一种可能的实现方式中,第二报文为基于FTP传输的报文,终端设备对应的CSB检测功能信息携带在第二报文的FTP冗余字段或FTP自定义字段中。由于第二报文能够基于不同的传输协议进行传输,该方法传输第二报文的方式较为灵活。另外,第二报文能够以不同方式携带终端设备对应的CSB检测功能信息,该方法携带终端设备对应的CSB检测功能信息的方式较为灵活。In a possible implementation manner, the second message is a message transmitted based on FTP, and the CSB detection function information corresponding to the terminal device is carried in an FTP redundant field or an FTP custom field of the second message. Since the second message can be transmitted based on different transmission protocols, the method for transmitting the second message is more flexible. In addition, the second message can carry the CSB detection function information corresponding to the terminal device in different ways, and this method is more flexible in carrying the CSB detection function information corresponding to the terminal device.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息之后,还包括:终端设备向外部网络的服务器发送第二报文,第二报文用于请求获取外部网络的服务器提供的资源,其中,第二报文包括终端设备的身份关键字,身份关键字用于获取终端设备具有的CSB检测功能。In a possible implementation manner, after the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, it further includes: the terminal device sends a second message to the server of the external network, and the second message is used to request to obtain the external The resource provided by the server of the network, wherein the second packet includes an identity key of the terminal device, and the identity key is used to obtain the CSB detection function of the terminal device.
在一种可能的实现方式中,响应于其他设备为能力管理设备,终端设备向其他设备提供终端设备对应的CSB检测功能信息之后,还包括:终端设备接收能力管理设备发送的终端设备的随机ID,终端设备的随机ID用于作为终端设备的身份关键字;或响应于其他设备为安全 设备,终端设备向其他设备提供终端设备对应的CSB检测功能信息之后,还包括:终端设备接收安全设备发送的终端设备的随机ID,终端设备的随机ID用于作为终端设备的身份关键字。In a possible implementation manner, in response to the other device being a capability management device, after the terminal device provides other devices with the CSB detection function information corresponding to the terminal device, it further includes: the terminal device receives the random ID of the terminal device sent by the capability management device , the random ID of the terminal device is used as the identity key of the terminal device; or in response to other devices being security devices, after the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, it also includes: the terminal device receives the information sent by the security device The random ID of the terminal device, the random ID of the terminal device is used as the identity key of the terminal device.
在一种可能的实现方式中,第三报文还包括终端设备的IP地址,终端设备的IP地址用于作为终端设备的身份关键字。In a possible implementation manner, the third packet further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device.
在一种可能的实现方式中,第三报文还包括终端设备的本地证书,终端设备的本地证书中的用户信息用于作为终端设备的身份关键字。In a possible implementation manner, the third packet further includes a local certificate of the terminal device, and user information in the local certificate of the terminal device is used as an identity key of the terminal device.
在一种可能的实现方式中,终端设备具有的CSB检测功能包括IPS检测功能、AV检测功能、URL检测功能、AIE检测功能或SA检测功能中的至少一种。In a possible implementation manner, the CSB detection function of the terminal device includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息之前,还包括:终端设备向安全设备发送登录请求,登录请求包括用户信息;接收安全设备基于用户信息发送的认证结果,认证结果用于指示终端设备是否成功登录;响应于终端设备成功登录,终端设备执行向其他设备提供终端设备对应的CSB检测功能信息的操作。In a possible implementation, before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, it further includes: the terminal device sends a login request to the security device, and the login request includes user information; The authentication result is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the terminal device performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息之前,还包括:终端设备向登录认证设备发送登录请求,登录请求包括用户信息;接收登录认证设备基于用户信息发送的认证结果,认证结果用于指示终端设备是否成功登录;响应于终端设备成功登录,终端设备执行向其他设备提供终端设备对应的CSB检测功能信息的操作。In a possible implementation, before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, it also includes: the terminal device sends a login request to the login authentication device, and the login request includes user information; The authentication result sent by the information, the authentication result is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the terminal device performs an operation of providing other devices with the corresponding CSB detection function information of the terminal device.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息之前,还包括:终端设备向登录认证设备发送登录请求,登录请求包括终端设备的本地证书;接收登录认证设备基于终端设备的本地证书发送的认证结果,认证结果用于指示终端设备是否成功登录;响应于终端设备成功登录,终端设备执行向其他设备提供终端设备对应的CSB检测功能信息的操作。In a possible implementation manner, before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, it also includes: the terminal device sends a login request to the login authentication device, and the login request includes the local certificate of the terminal device; receiving the login authentication The authentication result sent by the device based on the local certificate of the terminal device is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the terminal device performs an operation of providing other devices with corresponding CSB detection function information of the terminal device.
由于终端设备能够通过不同的登录认证方式进行登录认证,终端设备登录认证的方式较为灵活。Since the terminal device can perform login authentication through different login authentication modes, the login authentication mode of the terminal device is more flexible.
第三方面,提供了一种报文处理装置,该装置应用于安全设备,安全设备部署于外部网络和内部网络的边界,该装置包括:In a third aspect, a message processing device is provided, the device is applied to a security device, and the security device is deployed on the boundary between an external network and an internal network, and the device includes:
获取模块,用于截获外部网络向内部网络发送的第一报文,第一报文用于承载外部网络的服务器根据内部网络的终端设备的请求提供的资源;The acquiring module is configured to intercept the first message sent from the external network to the internal network, where the first message is used to carry the resource provided by the server of the external network according to the request of the terminal device of the internal network;
确定模块,用于确定第一报文对应的待执行的CSB检测功能;A determining module, configured to determine the CSB detection function to be executed corresponding to the first message;
处理模块,用于响应于终端设备具有第一CSB检测功能,向终端设备转发第一报文之前,省略对第一报文执行第一CSB检测功能,其中,第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的全部功能或部分功能。A processing module, configured to omit performing the first CSB detection function on the first message before forwarding the first message to the terminal device in response to the terminal device having the first CSB detection function, wherein the first CSB detection function is the first CSB detection function of the first message All or part of the CSB detection functions to be executed corresponding to the text.
在一种可能的实现方式中,第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的部分功能,处理模块,还用于对第一报文执行第二CSB检测功能,第二CSB检测功能是第一报文对应的待执行的CSB检测功能中除第一CSB检测功能之外的功能。In a possible implementation manner, the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, and the processing module is also used to perform the second CSB detection function on the first message, The second CSB detection function is a function other than the first CSB detection function among the to-be-executed CSB detection functions corresponding to the first message.
在一种可能的实现方式中,获取模块,还用于截获终端设备发送的第二报文,第二报文用于请求获取外部网络的服务器提供的资源;基于第二报文,获取终端设备具有的CSB检测功能;确定模块,还用于根据终端设备具有的CSB检测功能以及第一报文对应的待执行的CSB检测功能,确定终端设备具有第一CSB检测功能。In a possible implementation, the obtaining module is also used to intercept the second message sent by the terminal device, and the second message is used to request to obtain the resources provided by the server of the external network; based on the second message, the terminal device obtains The CSB detection function it has; the determination module is also used to determine that the terminal device has the first CSB detection function according to the CSB detection function that the terminal device has and the CSB detection function to be executed corresponding to the first message.
在一种可能的实现方式中,第二报文包括终端设备的身份关键字,获取模块,用于通过解析第二报文获取第二报文包括的终端设备的身份关键字;根据终端设备的身份关键字,获取终端设备具有的CSB检测功能。In a possible implementation manner, the second message includes the identity keyword of the terminal device, and the obtaining module is configured to obtain the identity keyword of the terminal device included in the second message by parsing the second message; The identity keyword is used to obtain the CSB detection function of the terminal device.
在一种可能的实现方式中,获取模块,用于向能力管理设备发送查询请求,能力管理设备存储有终端设备对应的CSB检测功能信息,其中查询请求中携带终端设备的身份关键字,终端设备对应的CSB检测功能信息用于指示终端设备具有的CSB检测功能;接收能力管理设备响应于查询请求发送的终端设备对应的CSB检测功能信息;根据CSB检测功能信息,确定终端设备具有的CSB检测功能。In a possible implementation, the acquisition module is configured to send a query request to the capability management device, and the capability management device stores CSB detection function information corresponding to the terminal device, where the query request carries the identity keyword of the terminal device, and the terminal device The corresponding CSB detection function information is used to indicate the CSB detection function of the terminal device; the reception capability management device sends the corresponding CSB detection function information of the terminal device in response to the query request; according to the CSB detection function information, determine the CSB detection function of the terminal device .
在一种可能的实现方式中,获取模块,用于基于HTTP、HTTPS或API,向能力管理设备发送查询请求。In a possible implementation manner, the obtaining module is configured to send a query request to the capability management device based on HTTP, HTTPS or API.
在一种可能的实现方式中,获取模块,用于根据终端设备的身份关键字,查询安全设备存储的身份关键字和CSB检测功能的对应关系,获取终端设备的身份关键字对应的CSB检测功能。In a possible implementation, the obtaining module is configured to query the correspondence between the identity keyword stored in the security device and the CSB detection function according to the identity keyword of the terminal device, and obtain the CSB detection function corresponding to the identity keyword of the terminal device .
在一种可能的实现方式中,身份关键字包括随机ID、IP地址或本地证书中的用户信息中的至少一种。In a possible implementation manner, the identity key includes at least one of a random ID, an IP address, or user information in a local certificate.
在一种可能的实现方式中,第二报文携带终端设备对应的CSB检测功能信息,获取模块,用于通过解析第二报文获取第二报文携带的终端设备对应的CSB检测功能信息;根据第二报文携带的终端设备对应的CSB检测功能信息,确定终端设备具有的CSB检测功能。In a possible implementation manner, the second message carries CSB detection function information corresponding to the terminal device, and the obtaining module is configured to obtain the CSB detection function information corresponding to the terminal device carried in the second message by parsing the second message; Determine the CSB detection function of the terminal device according to the CSB detection function information corresponding to the terminal device carried in the second message.
在一种可能的实现方式中,待执行的CSB检测功能包括IPS检测功能、AV检测功能、URL检测功能、AIE检测功能或SA检测功能中的至少一种。In a possible implementation manner, the CSB detection function to be executed includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
在一种可能的实现方式中,终端设备为完成登录认证的设备,登录认证的方式包括本地认证、服务器认证或证书认证中的任一种。In a possible implementation manner, the terminal device is a device that completes login authentication, and the login authentication manner includes any one of local authentication, server authentication, or certificate authentication.
第四方面,提供了一种报文处理装置,该装置应用于终端设备,终端设备部署于内部网络中,该装置包括:In a fourth aspect, a message processing device is provided, the device is applied to a terminal device, and the terminal device is deployed in an internal network, and the device includes:
供给模块,用于向其他设备提供终端设备对应的CSB检测功能信息,终端设备对应的CSB检测功能信息用于指示终端设备具有的CSB检测功能;The supply module is configured to provide other devices with CSB detection function information corresponding to the terminal device, and the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function that the terminal device has;
接收模块,用于接收安全设备发送的第一报文,其中,安全设备部署于外部网络和内部网络的边界,第一报文用于承载外部网络的服务器根据终端设备的请求提供的资源,第一报文为安全设备未执行第一CSB检测功能的报文,终端设备具有的CSB检测功能中包括第一CSB检测功能;The receiving module is configured to receive the first message sent by the security device, wherein the security device is deployed on the boundary between the external network and the internal network, and the first message is used to carry the resources provided by the server of the external network according to the request of the terminal device. A message is a message for which the security device has not performed the first CSB detection function, and the CSB detection function of the terminal device includes the first CSB detection function;
处理模块,用于对第一报文执行第一CSB检测功能。A processing module, configured to perform a first CSB detection function on the first packet.
在一种可能的实现方式中,供给模块,用于向能力管理设备发送第三报文,第三报文携带终端设备对应的CSB检测功能信息,能力管理设备用于存储终端设备对应的CSB检测功能信息。In a possible implementation manner, the supply module is configured to send a third message to the capability management device, the third message carries the CSB detection function information corresponding to the terminal device, and the capability management device is used to store the CSB detection function information corresponding to the terminal device. function information.
在一种可能的实现方式中,供给模块,用于向安全设备发送第三报文,第三报文携带终端设备对应的CSB检测功能信息,安全设备用于存储终端设备对应的CSB检测功能信息。In a possible implementation manner, the supply module is configured to send a third message to the security device, the third message carries the CSB detection function information corresponding to the terminal device, and the security device is used to store the CSB detection function information corresponding to the terminal device .
在一种可能的实现方式中,供给模块,用于向外部网络的服务器发送第二报文,第二报文用于请求获取外部网络的服务器提供的资源,其中第二报文携带终端设备对应的CSB检测 功能信息。In a possible implementation manner, the supply module is configured to send a second message to a server on the external network, and the second message is used to request to obtain resources provided by the server on the external network, where the second message carries the corresponding CSB detection function information.
在一种可能的实现方式中,第二报文为基于HTTPS传输的报文,终端设备对应的CSB检测功能信息携带在第二报文的Cookie,或URL参数,或HTTPS首部字段,或HTTPS自定义字段中。In a possible implementation, the second message is a message transmitted based on HTTPS, and the CSB detection function information corresponding to the terminal device is carried in the Cookie of the second message, or the URL parameter, or the HTTPS header field, or the HTTPS auto in the definition field.
在一种可能的实现方式中,第二报文为基于HTTP传输的报文,终端设备对应的CSB检测功能信息携带在第二报文的Cookie,或HTTP首部字段,或HTTP自定义字段中。In a possible implementation manner, the second message is a message based on HTTP transmission, and the CSB detection function information corresponding to the terminal device is carried in the Cookie, or the HTTP header field, or the HTTP custom field of the second message.
在一种可能的实现方式中,第二报文为基于FTP传输的报文,终端设备对应的CSB检测功能信息携带在第二报文的FTP冗余字段或FTP自定义字段中。In a possible implementation manner, the second message is a message transmitted based on FTP, and the CSB detection function information corresponding to the terminal device is carried in an FTP redundant field or an FTP custom field of the second message.
在一种可能的实现方式中,该装置还包括:发送模块,用于向外部网络的服务器发送第二报文,第二报文用于请求获取外部网络的服务器提供的资源,其中,第二报文包括终端设备的身份关键字,身份关键字用于获取终端设备具有的CSB检测功能。In a possible implementation manner, the device further includes: a sending module, configured to send a second message to a server on an external network, where the second message is used to request resources provided by the server on the external network, where the second The message includes an identity keyword of the terminal device, and the identity keyword is used to obtain the CSB detection function of the terminal device.
在一种可能的实现方式中,响应于其他设备为能力管理设备,接收模块,还用于接收能力管理设备发送的终端设备的随机ID,终端设备的随机ID用于作为终端设备的身份关键字;或响应于其他设备为安全设备,接收模块,还用于接收安全设备发送的终端设备的随机ID,终端设备的随机ID用于作为终端设备的身份关键字。In a possible implementation, in response to the fact that the other device is a capability management device, the receiving module is further configured to receive the random ID of the terminal device sent by the capability management device, and the random ID of the terminal device is used as an identity key of the terminal device ; or in response to the fact that the other device is a security device, the receiving module is also configured to receive the random ID of the terminal device sent by the security device, and the random ID of the terminal device is used as an identity key of the terminal device.
在一种可能的实现方式中,第三报文还包括终端设备的IP地址,终端设备的IP地址用于作为终端设备的身份关键字。In a possible implementation manner, the third packet further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device.
在一种可能的实现方式中,第三报文还包括终端设备的本地证书,终端设备的本地证书中的用户信息用于作为终端设备的身份关键字。In a possible implementation manner, the third packet further includes a local certificate of the terminal device, and user information in the local certificate of the terminal device is used as an identity key of the terminal device.
在一种可能的实现方式中,终端设备具有的CSB检测功能包括IPS检测功能、AV检测功能、URL检测功能、AIE检测功能或SA检测功能中的至少一种。In a possible implementation manner, the CSB detection function of the terminal device includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
在一种可能的实现方式中,该装置还包括:请求模块,用于向安全设备发送登录请求,登录请求包括用户信息;接收安全设备基于用户信息发送的认证结果,认证结果用于指示终端设备是否成功登录;响应于终端设备成功登录,供给模块执行向其他设备提供终端设备对应的CSB检测功能信息的操作。In a possible implementation manner, the apparatus further includes: a request module, configured to send a login request to the security device, where the login request includes user information; receive an authentication result sent by the security device based on the user information, and the authentication result is used to instruct the terminal device Whether the login is successful; in response to the successful login of the terminal device, the provisioning module performs an operation of providing the CSB detection function information corresponding to the terminal device to other devices.
在一种可能的实现方式中,该装置还包括:请求模块,用于向登录认证设备发送登录请求,登录请求包括用户信息;接收登录认证设备基于用户信息发送的认证结果,认证结果用于指示终端设备是否成功登录;响应于终端设备成功登录,供给模块执行向其他设备提供终端设备对应的CSB检测功能信息的操作。In a possible implementation manner, the apparatus further includes: a request module, configured to send a login request to the login authentication device, where the login request includes user information; receive an authentication result sent by the login authentication device based on the user information, and the authentication result is used to indicate Whether the terminal device is successfully logged in; in response to the successful login of the terminal device, the supply module performs an operation of providing the CSB detection function information corresponding to the terminal device to other devices.
在一种可能的实现方式中,该装置还包括:请求模块,用于向登录认证设备发送登录请求,登录请求包括终端设备的本地证书;接收登录认证设备基于终端设备的本地证书发送的认证结果,认证结果用于指示终端设备是否成功登录;响应于终端设备成功登录,供给模块执行向其他设备提供终端设备对应的CSB检测功能信息的操作。In a possible implementation manner, the apparatus further includes: a request module, configured to send a login request to the login authentication device, where the login request includes the local certificate of the terminal device; and receive the authentication result sent by the login authentication device based on the local certificate of the terminal device , the authentication result is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the supply module performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
第五方面,提供了一种报文处理设备,该报文处理设备包括:处理器,处理器与存储器耦合,存储器中存储有至少一条程序指令或代码,至少一条程序指令或代码由处理器加载并执行,以使该报文处理设备实现如上第一方面或第二方面任一的报文处理方法。In a fifth aspect, a message processing device is provided, the message processing device includes: a processor, the processor is coupled with a memory, at least one program instruction or code is stored in the memory, and at least one program instruction or code is loaded by the processor And execute, so that the packet processing device realizes the packet processing method of any one of the first aspect or the second aspect above.
第六方面,提供了一种报文处理系统,该报文处理系统包括:安全设备和终端设备,安全设备用于执行上述第一方面或第一方面任一的报文处理方法,终端设备用于执行上述第二 方面或第二方面任一的报文处理方法。In the sixth aspect, a message processing system is provided, the message processing system includes: a security device and a terminal device, the security device is used to execute the message processing method in the first aspect or any one of the first aspect, and the terminal device uses To implement the second aspect or the message processing method of any one of the second aspect.
第七方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有至少一条程序指令或代码,程序指令或代码由处理器加载并执行时以使计算机实现如第一方面或第二方面中任一的报文处理方法。According to a seventh aspect, a computer-readable storage medium is provided, and at least one program instruction or code is stored in the computer-readable storage medium, and when the program instruction or code is loaded and executed by a processor, the computer can realize the following aspects of the first aspect or Any message processing method in the second aspect.
第八方面,提供了一种计算机程序产品,包括计算机程序,计算机程序被计算机执行时,以使计算机实现如上第一方面或第二方面任一的报文处理方法。In an eighth aspect, a computer program product is provided, including a computer program. When the computer program is executed by a computer, the computer implements the message processing method in any one of the first aspect or the second aspect above.
第九方面,提供了一种通信装置,该装置包括:收发器、存储器和处理器。其中,该收发器、该存储器和该处理器通过内部连接通路互相通信,该存储器用于存储指令,该处理器用于执行该存储器存储的指令,以控制收发器接收信号,并控制收发器发送信号,并且当该处理器执行该存储器存储的指令时,使得该处理器执行第一方面或第一方面的任一种可能的实施方式中的方法,或者执行第二方面或第二方面的任一种可能的实施方式中的方法。In a ninth aspect, a communication device is provided, and the device includes: a transceiver, a memory, and a processor. Wherein, the transceiver, the memory and the processor communicate with each other through an internal connection path, the memory is used to store instructions, and the processor is used to execute the instructions stored in the memory to control the transceiver to receive signals and control the transceiver to send signals , and when the processor executes the instruction stored in the memory, the processor executes the method in the first aspect or any possible implementation manner of the first aspect, or executes the second aspect or any one of the second aspect method in one possible implementation.
在一种可能的实现方式中,处理器为一个或多个,存储器为一个或多个。In a possible implementation manner, there are one or more processors, and one or more memories.
在一种可能的实现方式中,存储器可以与处理器集成在一起,或者存储器与处理器分离设置。In a possible implementation manner, the memory may be integrated with the processor, or the memory may be separated from the processor.
在具体实现过程中,存储器可以为非瞬时性(non-transitory)存储器,例如,只读存储器(read only memory,ROM),其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请对存储器的类型以及存储器与处理器的设置方式不做限定。In the specific implementation process, the memory can be a non-transitory (non-transitory) memory, for example, a read-only memory (read only memory, ROM), which can be integrated with the processor on the same chip, or can be set in different On the chip, the application does not limit the type of the memory and the arrangement of the memory and the processor.
第十方面,提供了一种芯片,包括处理器,用于从存储器中调用并运行存储器中存储的指令,使得安装有芯片的通信设备执行上述第一方面或第一方面的任一种可能的实施方式中的方法,或者执行上述第二方面或第二方面的任一种可能的实施方式中的方法。In a tenth aspect, a chip is provided, including a processor, configured to call and execute instructions stored in the memory from the memory, so that the communication device installed with the chip executes any one of the above-mentioned first aspect or any possible method of the first aspect. The method in the implementation manner, or execute the method in the above second aspect or any possible implementation manner of the second aspect.
第十一方面,提供了另一种芯片,包括:输入接口、输出接口、处理器和存储器,输入接口、输出接口、处理器以及存储器之间通过内部连接通路相连,处理器用于执行存储器中的代码,当代码被执行时,处理器用于执行上述第一方面或第一方面的任一种可能的实施方式中的方法,或者执行上述第二方面或第二方面的任一种可能的实施方式中的方法。In the eleventh aspect, another chip is provided, including: an input interface, an output interface, a processor, and a memory, the input interface, the output interface, the processor, and the memory are connected through an internal connection path, and the processor is used to execute the memory in the memory. Code, when the code is executed, the processor is used to execute the method in the above-mentioned first aspect or any possible implementation manner of the first aspect, or execute the above-mentioned second aspect or any possible implementation manner of the second aspect method in .
附图说明Description of drawings
图1是本申请实施例提供的一种报文处理方法的实施场景示意图;FIG. 1 is a schematic diagram of an implementation scenario of a message processing method provided in an embodiment of the present application;
图2是本申请实施例提供的一种报文处理方法的流程图;FIG. 2 is a flow chart of a message processing method provided in an embodiment of the present application;
图3是本申请实施例提供的一种报文处理方法的过程示意图;FIG. 3 is a schematic diagram of a message processing method provided in an embodiment of the present application;
图4是本申请实施例提供的另一种报文处理方法的流程图;FIG. 4 is a flow chart of another message processing method provided by an embodiment of the present application;
图5是本申请实施例提供的又一种报文处理方法的流程图;Fig. 5 is a flowchart of another message processing method provided by the embodiment of the present application;
图6是本申请实施例提供的一种验证终端设备的本地证书的示意图;FIG. 6 is a schematic diagram of a local certificate verification terminal device provided by an embodiment of the present application;
图7是本申请实施例提供的又一种报文处理方法的流程图;FIG. 7 is a flowchart of another message processing method provided by the embodiment of the present application;
图8是本申请实施例提供的一种报文处理装置的结构示意图;FIG. 8 is a schematic structural diagram of a message processing device provided in an embodiment of the present application;
图9是本申请实施例提供的另一种报文处理装置的结构示意图;FIG. 9 is a schematic structural diagram of another message processing device provided in an embodiment of the present application;
图10是本申请实施例提供的一种报文处理设备的结构示意图;FIG. 10 is a schematic structural diagram of a packet processing device provided in an embodiment of the present application;
图11是本申请实施例提供的另一种报文处理设备的结构示意图。FIG. 11 is a schematic structural diagram of another packet processing device provided by an embodiment of the present application.
具体实施方式detailed description
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.
在通信技术领域中,安全设备对由外部网络向内部网络发送的报文执行CSB检测功能,以保证内部网络的设备安全运行。本申请实施例提供了一种报文处理方法,该方法可应用在图1所示的实施场景中。如图1所示,该实施场景包括安全设备101、终端设备102A-102C(统称为终端设备102)、服务器103。可选地,该实施场景还包括能力管理设备104和登录认证设备105。In the field of communication technology, a security device performs a CSB detection function on packets sent from an external network to an internal network, so as to ensure safe operation of devices on the internal network. The embodiment of the present application provides a packet processing method, which can be applied in the implementation scenario shown in FIG. 1 . As shown in FIG. 1 , this implementation scenario includes a security device 101 , terminal devices 102A- 102C (collectively referred to as terminal devices 102 ), and a server 103 . Optionally, this implementation scenario further includes a capability management device 104 and a login authentication device 105 .
其中,安全设备101部署于外部网络和内部网络的边界,终端设备102部署于内部网络中,服务器103部署于外部网络中。安全设备101和终端设备102之间能够进行信息交互,安全设备101和服务器103之间能够进行信息交互,安全设备101和能力管理设备104之间能够进行信息交互,安全设备101和登录认证设备105之间能够进行信息交互;终端设备102和能力管理设备104之间能够进行信息交互,终端设备102和登录认证设备105之间能够进行信息交互。需要说明的是,图1中仅示出终端设备102C与能力管理设备104和登录认证设备105之间的信息交互,终端设备102A和终端设备102B与能力管理设备104和登录认证设备105之间的信息交互未在图1中示出,但并不对实施场景进行限制。Wherein, the security device 101 is deployed on the boundary between the external network and the internal network, the terminal device 102 is deployed on the internal network, and the server 103 is deployed on the external network. Information exchange can be performed between the security device 101 and the terminal device 102, information exchange can be performed between the security device 101 and the server 103, information exchange can be performed between the security device 101 and the capability management device 104, and the security device 101 and the login authentication device 105 Information exchange can be performed between the terminal device 102 and the capability management device 104, and information exchange can be performed between the terminal device 102 and the login authentication device 105. It should be noted that in FIG. 1 only the information interaction between the terminal device 102C, the capability management device 104 and the login authentication device 105 is shown. Information interaction is not shown in FIG. 1 , but it does not limit the implementation scenario.
示例性地,安全设备101包括但不限于安全网关设备、防火墙等设备,终端设备102包括但不限于智能手机、台式计算机、笔记本电脑、平板电脑等终端设备,服务器103、能力管理设备104和登录认证设备105均可以为服务器。需要说明的是,图1示出的实施场景中,各个设备的数量仅为本申请实施例举例说明的数量,本申请实施例对此不加以限定。Exemplarily, the security device 101 includes but not limited to security gateway devices, firewalls and other devices, the terminal device 102 includes but not limited to smart phones, desktop computers, notebook computers, tablet computers and other terminal devices, the server 103, the capability management device 104 and the login All authentication devices 105 may be servers. It should be noted that, in the implementation scenario shown in FIG. 1 , the number of devices is only the number illustrated in the embodiment of the present application, which is not limited in the embodiment of the present application.
结合图1所示的实施场景,本申请实施例提供的报文处理方法如图2所示,该报文处理方法包括但不限于步骤200至步骤205。其中,步骤201至步骤203为安全设备侧执行报文处理的过程,步骤200、步骤204和步骤205为终端设备侧执行报文处理的过程。接下来,结合图2对该报文处理方法进行说明。With reference to the implementation scenario shown in FIG. 1 , the message processing method provided by the embodiment of the present application is shown in FIG. 2 , and the message processing method includes but not limited to steps 200 to 205 . Wherein, steps 201 to 203 are the process of executing message processing on the security device side, and step 200, step 204 and step 205 are the process of executing message processing on the terminal device side. Next, the packet processing method will be described with reference to FIG. 2 .
步骤200,终端设备向其他设备提供终端设备对应的CSB检测功能信息。In step 200, the terminal device provides other devices with CSB detection function information corresponding to the terminal device.
其中,终端设备对应的CSB检测功能信息用于指示终端设备具有的CSB检测功能。Wherein, the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function of the terminal device.
示例性地,终端设备具有的CSB检测功能包括入侵防御系统(intrusion prevention system,IPS)检测功能、反病毒(anti-virus,AV)检测功能、统一资源定位器(uniform resource locator,URL)检测功能、人工智能引擎(artificial intelligence engine,AIE)检测功能或业务感知(service awareness,SA)检测功能中的至少一种。Exemplarily, the CSB detection function of the terminal device includes an intrusion prevention system (intrusion prevention system, IPS) detection function, an anti-virus (anti-virus, AV) detection function, a uniform resource locator (uniform resource locator, URL) detection function 1. At least one of an artificial intelligence engine (artificial intelligence engine, AIE) detection function or a service awareness (service awareness, SA) detection function.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息包括但不限于如下两种方式。In a possible implementation manner, the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including but not limited to the following two manners.
方式一,终端设备向能力管理设备提供终端设备对应的CSB检测功能信息。In a first manner, the terminal device provides the CSB detection function information corresponding to the terminal device to the capability management device.
示例性地,终端设备向其他设备提供终端设备对应的CSB检测功能信息,包括:终端设备向能力管理设备发送第三报文,第三报文携带终端设备对应的CSB检测功能信息,能力管理设备用于存储终端设备对应的CSB检测功能信息。Exemplarily, the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including: the terminal device sends a third message to the capability management device, the third message carries the CSB detection function information corresponding to the terminal device, and the capability management device It is used to store the CSB detection function information corresponding to the terminal device.
上述“第三报文”以及后面将出现的“第一报文”、“第二报文”以及其他报文并不是表示顺序关系,而是为了区别不同的报文,以下说明书中提到的第一、第二等也是为了区别不同的信息、数据、请求或消息等。The above-mentioned "third message" and the "first message", "second message" and other messages that will appear later do not indicate the sequence relationship, but to distinguish different messages. The following instructions refer to The first, second, etc. are also used to distinguish different information, data, requests or messages, etc.
例如,第三报文为基于超文本传输安全协议(hyper text transfer protocol over secure socket layer,HTTPS)传输的报文,终端设备对应的CSB检测功能信息携带在第三报文的用户本地终端上的小数据(cookie,Cookie),或URL参数,或HTTPS首部字段(authorization),或HTTPS自定义字段中。其中,若第三报文为基于HTTPS传输的报文,该第三报文可以为通过加密通信通道传输的报文。又例如,第三报文为基于超文本传输协议(hyper text transfer protocol,HTTP)传输的报文,终端设备的CSB检测功能信息携带在第三报文的Cookie,或HTTP首部字段,或HTTP自定义字段中。又例如,第三报文为基于文件传输协议(file transfer protocol,FTP)传输的报文,终端设备的CSB检测功能信息携带在第三报文的FTP冗余字段或FTP的自定义字段中。For example, the third message is a message transmitted based on hyper text transfer protocol over secure socket layer (HTTPS), and the CSB detection function information corresponding to the terminal device is carried in the third message on the user's local terminal. Small data (cookie, Cookie), or URL parameters, or HTTPS header field (authorization), or HTTPS custom field. Wherein, if the third message is a message transmitted based on HTTPS, the third message may be a message transmitted through an encrypted communication channel. For another example, the third message is a message transmitted based on hypertext transfer protocol (hyper text transfer protocol, HTTP), and the CSB detection function information of the terminal device is carried in the Cookie of the third message, or the HTTP header field, or the HTTP auto in the definition field. For another example, the third message is a message transmitted based on the file transfer protocol (file transfer protocol, FTP), and the CSB detection function information of the terminal device is carried in the FTP redundant field of the third message or in the custom field of FTP.
由于第三报文可以基于多种传输协议传输,该方法传输第三报文的方式较为灵活。对于基于一种传输协议传输的第三报文,第三报文可以通过多种方式携带终端设备对应的CSB检测功能信息,第三报文携带终端设备对应的CSB检测功能信息的方式较为灵活。Since the third message can be transmitted based on multiple transmission protocols, the method for transmitting the third message is more flexible. For the third message transmitted based on a transmission protocol, the third message can carry the CSB detection function information corresponding to the terminal device in various ways, and the method for carrying the CSB detection function information corresponding to the terminal device in the third message is more flexible.
示例性地,终端设备向能力管理设备提供终端设备对应的CSB检测功能信息的步骤对应于图3示出的终端设备和能力管理设备进行能力管理的相关内容。Exemplarily, the step of the terminal device providing the CSB detection function information corresponding to the terminal device to the capability management device corresponds to related content of capability management performed by the terminal device and the capability management device shown in FIG. 3 .
方式二,终端设备向安全设备提供终端设备对应的CSB检测功能信息。In a second manner, the terminal device provides the security device with CSB detection function information corresponding to the terminal device.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息,包括:终端设备向外部网络的服务器发送第二报文,该第二报文用于请求获取外部网络的服务器提供的资源,其中该第二报文携带终端设备对应的CSB检测功能信息。其中,第二报文能够被安全设备截获,以使安全设备获取第二报文携带的终端设备对应的CSB检测功能信息。In a possible implementation manner, the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, including: the terminal device sends a second message to the server of the external network, and the second message is used to request to obtain the information of the external network resources provided by the server, where the second packet carries CSB detection function information corresponding to the terminal device. Wherein, the second message can be intercepted by the security device, so that the security device acquires the CSB detection function information corresponding to the terminal device carried in the second message.
需要说明的是,终端设备向外部网络的服务器发送第二报文的方式,以及第二报文携带终端设备对应的CSB检测功能信息的方式与上述方式一中的相关过程的原理类似,此处不再赘述。It should be noted that the way the terminal device sends the second message to the server on the external network, and the way the second message carries the CSB detection function information corresponding to the terminal device is similar to the principle of the related process in the above-mentioned way 1, here No longer.
在外部网络和内部网络的边界没有部署能力管理设备,仅部署一个安全设备的情况下,终端设备在发送用于请求获取外部网络的服务器提供的资源的请求报文(即第二报文)时,可以直接复用第二报文发送该终端设备对应的CSB检测功能信息,安全设备能够基于该报文获取终端设备对应的CSB检测功能信息。这种方式提高了安全设备获取终端设备对应的CSB检测功能信息的效率。此外,由于第二报文可以基于多种传输协议传输,该方法传输第二报文的方式较为灵活。对于基于一种传输协议传输的第二报文,第二报文可以通过多种方式携带终端设备对应的CSB检测功能信息,第二报文携带终端设备对应的CSB检测功能信息的方式较为灵活。In the case where no capability management device is deployed at the boundary between the external network and the internal network, and only one security device is deployed, when the terminal device sends a request message (that is, the second message) for requesting resources provided by the server of the external network , may directly multiplex the second message to send the CSB detection function information corresponding to the terminal device, and the security device can obtain the CSB detection function information corresponding to the terminal device based on the message. This manner improves the efficiency of the security device in obtaining the CSB detection function information corresponding to the terminal device. In addition, since the second message can be transmitted based on multiple transmission protocols, the method for transmitting the second message is more flexible. For the second message transmitted based on a transmission protocol, the second message can carry the CSB detection function information corresponding to the terminal device in various ways, and the method of carrying the CSB detection function information corresponding to the terminal device in the second message is more flexible.
在另一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息,包括:终端设备向安全设备发送第三报文,第三报文携带终端设备对应的CSB检测功能信息,安全设备用于存储终端设备对应的CSB检测功能信息。In another possible implementation, the terminal device provides information about the CSB detection function corresponding to the terminal device to other devices, including: the terminal device sends a third message to the security device, and the third message carries the CSB detection function corresponding to the terminal device Information, the security device is used to store the CSB detection function information corresponding to the terminal device.
需要说明的是,终端设备向安全设备发送第三报文的方式,以及第三报文携带终端设备对应的CSB检测功能信息的方式与上述方式一中的相关内容原理类似,此处不再赘述。此外,无论是以第二报文的方式将终端设备对应的CSB检测功能信息发送给安全设备,还是以第三报文的方式将终端设备对应的CSB检测功能信息发送给安全设备,由于安全设备均可以对接收到的终端设备对应的CSB检测功能信息进行存储,因此,安全设备在后续进行检测时,可直接从本地获取终端设备对应的CSB检测功能信息,进而提高了检测效率。It should be noted that the manner in which the terminal device sends the third message to the security device and the manner in which the third message carries the CSB detection function information corresponding to the terminal device are similar to those in the above-mentioned method 1, and will not be repeated here. . In addition, whether the CSB detection function information corresponding to the terminal device is sent to the security device in the form of the second message, or the CSB detection function information corresponding to the terminal device is sent to the security device in the form of the third message, because the security device The received CSB detection function information corresponding to the terminal device can be stored, therefore, the security device can directly obtain the CSB detection function information corresponding to the terminal device locally when performing subsequent detection, thereby improving the detection efficiency.
由于终端设备能够以不同的方式提供终端设备对应的CSB检测功能信息,本申请实施例提供终端设备对应的CSB检测功能信息的方式较为灵活。Since the terminal device can provide the CSB detection function information corresponding to the terminal device in different ways, the method of providing the CSB detection function information corresponding to the terminal device in the embodiment of the present application is more flexible.
示例性地,终端设备对应的CSB检测功能信息通过二进制数字表示。Exemplarily, the CSB detection function information corresponding to the terminal device is represented by binary numbers.
例如,对于任一项CSB检测功能,00用于表示终端设备具有的CSB检测功能不包括该项检测功能,01用于表示终端设备具有的CSB检测功能包括该项检测功能。示例性地,终端设备对应的CSB检测功能信息可以通过如下方式A或方式B表示。For example, for any CSB detection function, 00 is used to indicate that the CSB detection function of the terminal device does not include this detection function, and 01 is used to indicate that the CSB detection function of the terminal device includes this detection function. Exemplarily, the CSB detection function information corresponding to the terminal device may be represented by the following manner A or manner B.
方式A,终端设备对应的CSB检测功能信息通过一个二进制数字表示。In mode A, the CSB detection function information corresponding to the terminal device is represented by a binary number.
示例性地,终端设备对应的CSB检测功能信息表示为xxxxxxxxxx,其中,从右侧开始第0位和第1位用于指示是否包括IPS检测功能,第2位和第3位用于指示是否包括AV检测功能,第4位和第5位用于指示是否包括URL检测功能,第6位和第7位用于指示是否包括AIE检测功能,第8位和第9位用于指示是否包括SA检测功能。例如,终端设备具有的CSB检测功能包括IPS检测功能、AV检测功能和AIE检测功能,则终端设备对应的CSB检测功能信息表示为0001000101。Exemplarily, the CSB detection function information corresponding to the terminal device is expressed as xxxxxxxxxx, where the 0th and 1st digits from the right are used to indicate whether the IPS detection function is included, and the 2nd and 3rd digits are used to indicate whether the IPS detection function is included. AV detection function, the 4th and 5th bits are used to indicate whether the URL detection function is included, the 6th and 7th bits are used to indicate whether the AIE detection function is included, and the 8th and 9th bits are used to indicate whether the SA detection is included Function. For example, the CSB detection function of the terminal device includes the IPS detection function, the AV detection function and the AIE detection function, and the CSB detection function information corresponding to the terminal device is expressed as 0001000101.
方式B,终端设备对应的CSB检测功能信息通过二进制数组表示。In mode B, the CSB detection function information corresponding to the terminal device is represented by a binary array.
示例性地,终端设备对应的CSB检测功能信息可以通过二进制数组[A,B,C,D,E]表示,其中,A、B、C、D、E均用于指示一项检测功能,并且通过二进制数字进行表示。示例性地,A用于指示IPS检测功能,A表示为xx,其中,xx为00表示不具有IPS检测功能,xx为01表示具有IPS检测功能。同理,B用于指示AV检测功能,C用于指示URL检测功能,D用于指示AIE检测功能,E用于指示SA检测功能。例如,终端设备具有的CSB检测功能包括IPS检测功能和AV检测功能,则终端设备对应的CSB检测功能信息表示为[01,01,00,00,00]。Exemplarily, the CSB detection function information corresponding to the terminal device can be represented by a binary array [A, B, C, D, E], where A, B, C, D, and E are all used to indicate a detection function, and Represented by binary numbers. Exemplarily, A is used to indicate the IPS detection function, and A is denoted as xx, where xx is 00, indicating that it does not have the IPS detection function, and xx is 01, indicating that it has the IPS detection function. Similarly, B is used to indicate the AV detection function, C is used to indicate the URL detection function, D is used to indicate the AIE detection function, and E is used to indicate the SA detection function. For example, the CSB detection function of the terminal device includes the IPS detection function and the AV detection function, and the CSB detection function information corresponding to the terminal device is expressed as [01, 01, 00, 00, 00].
需要说明的是,终端设备对应的CSB检测功能信息也可以通过其他方式进行表示,上述终端设备对应的CSB检测功能信息的表示方式仅为本申请实施例举例说明的表示方式,本申请实施例对此不加以限定。It should be noted that the CSB detection function information corresponding to the terminal device can also be expressed in other ways, and the above-mentioned representation mode of the CSB detection function information corresponding to the terminal device is only an example for the embodiment of this application. This is not limited.
在一种可能的实现方式中,该方法还包括:响应于终端设备具有的CSB检测功能发生变化,终端设备向存储该终端设备对应的CSB检测功能信息的设备发送该终端设备对应的变化后的CSB检测功能信息,以使存储该终端设备对应的CSB检测功能信息的设备更新存储的终端设备对应的CSB检测功能信息。示例性地,终端设备向存储该终端设备对应的CSB检测功能信息的设备发送终端设备对应的变化后的CSB检测功能信息,包括:终端设备向存储该终端设备对应的CSB检测功能信息的设备发送所有CSB检测功能信息,或向存储该终端设备对应的CSB检测功能信息的设备发送差异的CSB检测功能信息,该差异的CSB检测功能信息为根据变化前的CSB检测功能和变化后的CSB检测功能确定的CSB检测功能信息。In a possible implementation manner, the method further includes: in response to a change in the CSB detection function of the terminal device, the terminal device sends the changed CSB detection function corresponding to the terminal device to a device that stores information about the CSB detection function corresponding to the terminal device. CSB detection function information, so that the device storing the CSB detection function information corresponding to the terminal device updates the stored CSB detection function information corresponding to the terminal device. Exemplarily, the terminal device sends the changed CSB detection function information corresponding to the terminal device to the device that stores the CSB detection function information corresponding to the terminal device, including: the terminal device sends to the device that stores the CSB detection function information corresponding to the terminal device All CSB detection function information, or send the difference CSB detection function information to the device that stores the CSB detection function information corresponding to the terminal device, the difference CSB detection function information is based on the CSB detection function before the change and the CSB detection function after the change Determined CSB detection function information.
例如,能力管理设备存储有终端设备对应的CSB检测功能信息,终端设备向能力管理设备发送所有CSB检测功能信息,或向能力管理设备发送差异的CSB检测功能信息。For example, the capability management device stores CSB detection function information corresponding to the terminal device, and the terminal device sends all CSB detection function information to the capability management device, or sends different CSB detection function information to the capability management device.
在一种可能的实现方式中,该方法还包括:终端设备周期性的向存储该终端设备对应的CSB检测功能信息的设备发送该终端设备对应的CSB检测功能信息,以使存储该终端设备对应的CSB检测功能信息的设备更新存储的终端设备对应的CSB检测功能信息。示例性地,终端设备也可以在存储该终端设备对应的CSB检测功能信息的设备向终端设备请求时,再将终端设备对应的CSB检测功能信息发送给存储该终端设备对应的CSB检测功能信息的设备。In a possible implementation, the method further includes: the terminal device periodically sends the CSB detection function information corresponding to the terminal device to the device storing the CSB detection function information corresponding to the terminal device, so that the corresponding CSB detection function information of the terminal device is stored. The CSB detection function information of the device updates the stored CSB detection function information corresponding to the terminal device. Exemplarily, the terminal device may also send the CSB detection function information corresponding to the terminal device to the device storing the CSB detection function information corresponding to the terminal device when the device storing the CSB detection function information corresponding to the terminal device requests the terminal device. equipment.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息之后,该方法还包括:终端设备接收该其他设备发送的第一结果或第二结果,其中,第一结果用于指示该其他设备成功存储终端设备对应的CSB检测功能信息,第二结果用于指示该其他设备未成功存储终端设备对应的CSB检测功能信息。In a possible implementation manner, after the terminal device provides other devices with CSB detection function information corresponding to the terminal device, the method further includes: the terminal device receives the first result or the second result sent by the other device, where the first The result is used to indicate that the other device successfully stores the CSB detection function information corresponding to the terminal device, and the second result is used to indicate that the other device fails to store the CSB detection function information corresponding to the terminal device.
例如,终端设备向能力管理设备提供终端设备对应的CSB检测功能信息,终端设备接收该能力管理设备发送的第一结果或第二结果。For example, the terminal device provides CSB detection function information corresponding to the terminal device to the capability management device, and the terminal device receives the first result or the second result sent by the capability management device.
在上述终端设备向其他设备提供终端设备对应的CSB检测功能信息的两种方式中,由于能力管理设备或安全设备存储有终端设备对应的CSB检测功能信息,安全设备截获终端设备发送的用于请求获取外部网络的服务器提供的资源的第二报文时,第二报文可以包括终端设备的身份关键字,从而安全设备能够基于该终端设备的身份关键字获取终端设备对应的CSB检测功能信息。接下来,分别对能力管理设备存储有终端设备对应的CSB检测功能信息的情况和安全设备存储有终端设备对应的CSB检测功能信息的情况加以说明。In the above two ways in which the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, since the capability management device or the security device stores the CSB detection function information corresponding to the terminal device, the security device intercepts the request sent by the terminal device When obtaining the second packet of resources provided by the server of the external network, the second packet may include the identity key of the terminal device, so that the security device can obtain the corresponding CSB detection function information of the terminal device based on the identity key of the terminal device. Next, the case where the capability management device stores the CSB detection function information corresponding to the terminal device and the case where the security device stores the CSB detection function information corresponding to the terminal device will be respectively described.
情况A,能力管理设备存储有终端设备对应的CSB检测功能信息。In case A, the capability management device stores CSB detection function information corresponding to the terminal device.
示例性地,终端设备向其他设备提供终端设备对应的CSB检测功能信息之后,该方法还包括:终端设备向外部网络的服务器发送第二报文,第二报文用于请求获取外部网络的服务器提供的资源。其中第二报文包括终端设备的身份关键字,身份关键字用于获取终端设备具有的CSB检测功能。需要说明的是,第二报文能够被安全设备截获,以使安全设备获取第二报文携带的终端设备的身份关键字。Exemplarily, after the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, the method further includes: the terminal device sends a second message to the server of the external network, and the second message is used to request to obtain the server information of the external network provided resources. The second message includes an identity keyword of the terminal device, and the identity keyword is used to obtain the CSB detection function of the terminal device. It should be noted that the second packet can be intercepted by the security device, so that the security device obtains the identity key of the terminal device carried in the second packet.
示例性地,身份关键字包括随机身份标识号(identity document,ID)、网际协议(internet protocol,IP)地址或本地证书中的用户信息中的至少一种。Exemplarily, the identity key includes at least one of a random identity identification number (identity document, ID), an Internet protocol (internet protocol, IP) address, or user information in a local certificate.
例如,响应于其他设备为能力管理设备,也即终端设备向能力管理设备提供终端设备对应的CSB检测功能信息,终端设备向其他设备提供终端设备对应的CSB检测功能信息之后,该方法还包括:终端设备接收能力管理设备发送的终端设备的随机ID,终端设备的随机ID用于作为终端设备的身份关键字。其中,该终端设备的随机ID可以为能力管理设备生成的随机ID。又例如,第三报文还包括终端设备的IP地址,终端设备的IP地址用于作为终端设备的身份关键字。又例如,第三报文还包括终端设备的本地证书,终端设备的本地证书中的用户信息用于作为终端设备的身份关键字。For example, in response to the fact that the other device is a capability management device, that is, the terminal device provides the capability management device with the CSB detection function information corresponding to the terminal device, and after the terminal device provides other devices with the CSB detection function information corresponding to the terminal device, the method further includes: The terminal device receives the random ID of the terminal device sent by the capability management device, and the random ID of the terminal device is used as an identity key of the terminal device. Wherein, the random ID of the terminal device may be a random ID generated by the capability management device. For another example, the third packet further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device. For another example, the third message further includes a local certificate of the terminal device, and user information in the local certificate of the terminal device is used as an identity key of the terminal device.
示例性地,若终端设备接收到能力管理设备发送的终端设备的随机ID,如图3所示,终端设备可以保存该随机ID作为终端设备的身份关键字。Exemplarily, if the terminal device receives the random ID of the terminal device sent by the capability management device, as shown in FIG. 3 , the terminal device may save the random ID as an identity key of the terminal device.
情况B,安全设备存储有终端设备对应的CSB检测功能信息。In case B, the security device stores CSB detection function information corresponding to the terminal device.
示例性地,终端设备向其他设备提供终端设备对应的CSB检测功能信息之后,该方法还包括:终端设备向外部网络的服务器发送第二报文,第二报文用于请求获取外部网络的服务器提供的资源,其中第二报文包括终端设备的身份关键字,身份关键字用于获取终端设备具有的CSB检测功能。需要说明的是,第二报文能够被安全设备截获,以使安全设备获取第二报文携带的终端设备的身份关键字。Exemplarily, after the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, the method further includes: the terminal device sends a second message to the server of the external network, and the second message is used to request to obtain the server information of the external network The resource provided, wherein the second packet includes an identity key of the terminal device, and the identity key is used to obtain the CSB detection function of the terminal device. It should be noted that the second packet can be intercepted by the security device, so that the security device obtains the identity key of the terminal device carried in the second packet.
与上述情况A中的相关内容原理相同,在情况B中,身份关键字包括随机ID、IP地址或本地证书中的用户信息中的至少一种。The principle is the same as the related content in case A above, in case B, the identity key includes at least one of random ID, IP address, or user information in the local certificate.
例如,响应于其他设备为安全设备,也即终端设备向安全设备提供终端设备对应的CSB 检测功能信息,终端设备向其他设备提供终端设备对应的CSB检测功能信息之后,该方法还包括:终端设备接收安全设备发送的终端设备的随机ID,终端设备的随机ID用于作为终端设备的身份关键字。其中,该终端设备的随机ID可以为安全设备生成的随机ID。又例如,第三报文还包括终端设备的IP地址,终端设备的IP地址用于作为终端设备的身份关键字。又例如,第三报文还包括终端设备的本地证书,终端设备的本地证书中的用户信息用于作为终端设备的身份关键字。For example, in response to other devices being security devices, that is, the terminal device provides the security device with CSB detection function information corresponding to the terminal device, and after the terminal device provides other devices with CSB detection function information corresponding to the terminal device, the method further includes: the terminal device The random ID of the terminal device sent by the security device is received, and the random ID of the terminal device is used as an identity key of the terminal device. Wherein, the random ID of the terminal device may be a random ID generated by the security device. For another example, the third packet further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device. For another example, the third message further includes a local certificate of the terminal device, and user information in the local certificate of the terminal device is used as an identity key of the terminal device.
示例性地,若终端设备接收到安全设备发送的终端设备的随机ID,如图3所示,终端设备可以保存该随机ID作为终端设备的身份关键字。Exemplarily, if the terminal device receives the random ID of the terminal device sent by the security device, as shown in FIG. 3 , the terminal device may store the random ID as the identity key of the terminal device.
需要说明的是,本申请实施例不对第二报文携带终端设备的身份关键字的方式,第三报文携带终端设备的IP地址的方式,以及第三报文携带终端设备的本地证书的方式加以限定。It should be noted that the embodiment of the present application does not specify the manner in which the second packet carries the identity keyword of the terminal device, the manner in which the third packet carries the IP address of the terminal device, and the manner in which the third packet carries the local certificate of the terminal device Be limited.
本申请实施例中,终端设备的身份关键字的类型较为灵活。并且,终端设备的身份关键字能够包括多种类型的信息,根据该终端设备的身份关键字获取终端设备具有的CSB检测功能的准确性较高。In the embodiment of the present application, the type of the identity key of the terminal device is relatively flexible. Moreover, the identity key of the terminal device can include various types of information, and the accuracy of obtaining the CSB detection function of the terminal device according to the identity key of the terminal device is relatively high.
步骤201,安全设备截获外部网络向内部网络发送的第一报文。Step 201, the security device intercepts the first message sent from the external network to the internal network.
示例性地,该第一报文用于承载外部网络的服务器向内部网络的终端设备提供的资源。Exemplarily, the first packet is used to bear resources provided by the server of the external network to the terminal device of the internal network.
在一种可能的实现方式中,第一报文用于承载外部网络的服务器根据内部网络的终端设备的请求提供的资源。例如,如图1所示的实施场景中,安全设备101截获外部网络向内部网络发送的第一报文,该第一报文用于承载外部网络的服务器103根据内部网络的终端设备102C的请求提供的资源。In a possible implementation manner, the first packet is used to bear the resource provided by the server of the external network according to the request of the terminal device of the internal network. For example, in the implementation scenario shown in Figure 1, the security device 101 intercepts the first message sent from the external network to the internal network, and the first message is used to bear the provided resources.
在另一种可能的实现方式中,第一报文用于承载外部网络的服务器主动向内部网络的终端设备提供的资源。例如,如图1所示的实施场景中,内部网络的终端设备102C未请求获取外部网络的服务器提供的资源,安全设备101截获外部网络向内部网络发送的第一报文,该第一报文承载了外部网络的服务器103主动向内部网络的终端设备102C提供的资源。In another possible implementation manner, the first packet is used to carry the resource actively provided by the server of the external network to the terminal device of the internal network. For example, in the implementation scenario shown in FIG. 1 , the terminal device 102C on the internal network does not request to obtain resources provided by the server on the external network, and the security device 101 intercepts the first message sent from the external network to the internal network. The first message Hosting resources provided by the server 103 on the external network to the terminal device 102C on the internal network.
示例性地,终端设备为完成登录认证的设备,登录认证的方式包括本地认证、服务器认证或证书认证中的任一种。终端设备登录认证的相关过程请参见后文,此处暂不展开说明。Exemplarily, the terminal device is a device that has completed login authentication, and the login authentication manner includes any one of local authentication, server authentication, or certificate authentication. For the relevant process of terminal device login authentication, please refer to the following text, and the description will not be expanded here.
步骤202,安全设备确定第一报文对应的待执行的CSB检测功能。Step 202, the security device determines the CSB detection function to be executed corresponding to the first packet.
在一种可能的实现方式中,待执行的CSB检测功能包括:IPS检测功能、AV检测功能、URL检测功能、AIE检测功能或SA检测功能中的至少一种。In a possible implementation manner, the CSB detection function to be executed includes: at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
示例性地,安全设备存储有多个CSB检测策略,其中,每个CSB检测策略对应一种资源类型,每个CSB检测策略包括至少一种CSB检测功能。安全设备确定第一报文对应的待执行的CSB检测功能,包括:安全设备获取第一报文承载的资源的资源类型,根据该资源类型查找与该资源类型对应的CSB检测策略,将该CSB检测策略包括的CSB检测功能确定为第一报文对应的待执行的CSB检测功能。Exemplarily, the security device stores multiple CSB detection policies, where each CSB detection policy corresponds to a resource type, and each CSB detection policy includes at least one CSB detection function. The security device determines the to-be-executed CSB detection function corresponding to the first message, including: the security device obtains the resource type of the resource carried by the first message, searches for a CSB detection strategy corresponding to the resource type according to the resource type, and uses the CSB The CSB detection function included in the detection strategy is determined as the CSB detection function to be executed corresponding to the first packet.
可选地,资源类型包括但不限于:可携带文档格式(portable document format,pdf)文件,文档(document,.doc)文件,文本(text,.txt)文件,图像交换格式(graphics interchange format,GIF)文件,可执行文件(executable,exe)文件,动态链接库(dynamic link library,dll)文件等等。当然,资源类型也可以是更广义的类别,例如exe文件和dll文件被归类于可移植可执行(portable executable,PE)文件,联合图像专家小组(joint photographic experts group, JPEG)文件、位图(bitmap,BMP)和GIF文件被归类为图像文件等等。Optionally, resource types include but are not limited to: portable document format (portable document format, pdf) file, document (document, .doc) file, text (text, .txt) file, image interchange format (graphics interchange format, GIF) files, executable (executable, exe) files, dynamic link library (dynamic link library, dll) files, etc. Of course, the resource type can also be a broader category, such as exe files and dll files are classified into portable executable (portable executable, PE) files, joint photographic experts group (joint photographic experts group, JPEG) files, bitmap (bitmap, BMP) and GIF files are classified as image files and so on.
可选地,安全设备在截获到第一报文后,根据第一报文中承载的文件内容中的数据,例如文件头中的特征字,或者根据此前缓存的终端设备发送的获取请求(即第二报文)中的URL中的资源名称的后缀名,或者其他方式确定第一报文承载的资源的资源类型。Optionally, after the security device intercepts the first message, according to the data in the file content carried in the first message, such as the feature word in the file header, or according to the acquisition request sent by the previously cached terminal device (i.e. The suffix name of the resource name in the URL in the second message), or determine the resource type of the resource carried by the first message in other ways.
步骤203,响应于终端设备具有第一CSB检测功能,安全设备向终端设备转发第一报文之前,省略对第一报文执行第一CSB检测功能。Step 203, in response to the fact that the terminal device has the first CSB detection function, the security device omits performing the first CSB detection function on the first message before forwarding the first message to the terminal device.
其中,第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的全部或部分功能。示例性地,根据第一CSB检测功能包括的功能的情况,安全设备省略对第一报文执行第一CSB检测功能包括如下情况1和情况2。Wherein, the first CSB detection function is all or part of the CSB detection functions to be executed corresponding to the first message. Exemplarily, according to the functions included in the first CSB detection function, the security device omitting to perform the first CSB detection function on the first packet includes the following cases 1 and 2.
情况1,第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的全部功能。In case 1, the first CSB detection function is all of the CSB detection functions to be executed corresponding to the first message.
针对情况1,响应于第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的全部功能,即终端设备能够独立完成对第一报文的全部CSB检测功能,安全设备可省略对第一报文进行CSB检测的过程,直接向终端设备转发第一报文。此种情况1中,可节省安全设备因进行CSB检测而消耗的资源。For case 1, in response to the fact that the first CSB detection function is all of the CSB detection functions to be executed corresponding to the first message, that is, the terminal device can independently complete all CSB detection functions for the first message, the security device can omit In the process of performing CSB detection on the first packet, the first packet is directly forwarded to the terminal device. In case 1, resources consumed by the security device for CSB detection can be saved.
情况2,第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的部分功能。In case 2, the first CSB detection function is a part of the CSB detection functions to be executed corresponding to the first message.
针对情况2,由于第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的部分功能,意味着终端设备无法独立完成对第一报文的全部CSB检测功能,因而需要协同安全设备共同完成。因此,在该情况2中,安全设备向终端设备转发第一报文之前,还包括:安全设备对第一报文执行第二CSB检测功能,第二CSB检测功能是第一报文对应的待执行的CSB检测功能中除第一CSB检测功能之外的功能。For case 2, because the first CSB detection function is part of the CSB detection function to be executed corresponding to the first message, it means that the terminal device cannot independently complete all the CSB detection functions for the first message, and therefore requires collaborative security equipment together. Therefore, in this case 2, before the security device forwards the first message to the terminal device, it also includes: the security device performs a second CSB detection function on the first message, and the second CSB detection function is the waiting Among the CSB detection functions performed, other than the first CSB detection function.
例如,第一报文对应的待执行的CSB检测功能包括IPS检测功能、AV检测功能和AIE检测功能,终端设备具有第一CSB检测功能,其中,第一CSB检测功能包括:IPS检测功能和AV检测功能。则第二CSB检测功能包括AIE检测功能,安全设备对该第一报文执行AIE检测功能。For example, the CSB detection function to be executed corresponding to the first message includes an IPS detection function, an AV detection function, and an AIE detection function, and the terminal device has a first CSB detection function, wherein the first CSB detection function includes: an IPS detection function and an AIE detection function detection function. Then the second CSB detection function includes the AIE detection function, and the security device performs the AIE detection function on the first packet.
示例性地,该步骤203的过程对应于图3示出的确定对第一报文执行CSB检测功能的方式以及执行CSB检测功能的相关内容。Exemplarily, the process of step 203 corresponds to the manner of determining to perform the CSB detection function on the first packet and related content of performing the CSB detection function shown in FIG. 3 .
示例性地,若第一报文为外部网络的服务器主动向内部网络的终端设备发送的报文,安全设备确定第一报文对应的待执行的CSB检测功能之后,默认执行全部的待执行的CSB检测功能。For example, if the first message is a message actively sent by the server of the external network to the terminal device of the internal network, after the security device determines the CSB detection function to be executed corresponding to the first message, it executes all the CSB detection functions to be executed by default. CSB detection function.
在一种可能的实现方式中,安全设备对第一报文执行第二CSB检测功能之后,该方法还包括:获取安全设备对第一报文执行第二CSB检测功能的检测结果;响应于该检测结果为安全,安全设备向终端设备转发该第一报文。示例性地,响应于第二CSB检测功能包括至少一种检测功能,安全设备对第一报文执行该至少一种检测功能的检测结果均为安全,安全设备对第一报文执行第二CSB检测功能的检测结果为安全。In a possible implementation manner, after the security device performs the second CSB detection function on the first message, the method further includes: acquiring a detection result of the security device performing the second CSB detection function on the first message; responding to the The detection result is safe, and the security device forwards the first packet to the terminal device. Exemplarily, in response to the fact that the second CSB detection function includes at least one detection function, the detection results of the security device performing the at least one detection function on the first message are all safe, and the security device performs the second CSB detection function on the first message. The test result of the detection function is safe.
在一种可能的实现方式中,获取安全设备对第一报文执行第二CSB检测功能的检测结果之后,该方法还包括:响应于安全设备对第一报文执行第二CSB检测功能的检测结果为危险,安全设备不向终端设备转发该第一报文。示例性地,响应于第二CSB检测功能包括至少一种检测功能,安全设备对第一报文执行该至少一种检测功能得到的检测结果中,存在至少一个检测结果为危险,安全设备对第一报文执行第二CSB检测功能的检测结果为危险。In a possible implementation manner, after acquiring the detection result of the security device performing the second CSB detection function on the first packet, the method further includes: responding to the detection that the security device performs the second CSB detection function on the first packet The result is dangerous, and the security device does not forward the first message to the terminal device. Exemplarily, in response to the fact that the second CSB detection function includes at least one detection function, and among the detection results obtained by the security device performing the at least one detection function on the first packet, at least one detection result is dangerous, and the security device performs the detection on the first message. A detection result of executing the second CSB detection function on a packet is dangerous.
可选地,该方法还包括安全设备获取终端设备具有的CSB检测功能的过程。例如,在步骤201,安全设备截获外部网络向内部网络发送的第一报文之前,该方法还包括如下步骤1-1和步骤1-2。Optionally, the method further includes a process in which the security device obtains the CSB detection function of the terminal device. For example, before step 201, before the security device intercepts the first message sent from the external network to the internal network, the method further includes the following steps 1-1 and 1-2.
步骤1-1,安全设备截获终端设备发送的第二报文,该第二报文用于请求获取外部网络的服务器提供的资源。In step 1-1, the security device intercepts the second message sent by the terminal device, where the second message is used to request to acquire resources provided by the server of the external network.
示例性地,该第二报文为前文中用于请求获取外部网络的服务器提供的资源的请求报文。Exemplarily, the second message is the above request message for requesting to acquire the resource provided by the server of the external network.
在一种可能的实现方式中,该第二报文包括终端设备的身份关键字。在另一种可能的实现方式中,该第二报文携带终端设备对应的CSB检测功能信息。需要说明的是,终端设备的身份关键字的类型,终端设备对应的CSB检测功能信息的表示方式,以及第二报文携带该终端设备对应的CSB检测功能信息的方式与前文中的相关内容原理相同,此处不再赘述。In a possible implementation manner, the second packet includes an identity key of the terminal device. In another possible implementation manner, the second packet carries CSB detection function information corresponding to the terminal device. It should be noted that the type of the identity keyword of the terminal device, the representation method of the CSB detection function information corresponding to the terminal device, and the way the second message carries the CSB detection function information corresponding to the terminal device are the same as those in the preceding paragraphs. Same, no more details here.
步骤1-2,基于第二报文,安全设备获取终端设备具有的CSB检测功能。Step 1-2, based on the second message, the security device acquires the CSB detection function of the terminal device.
示例性地,基于第二报文,安全设备获取终端设备具有的CSB检测功能,包括但不限于如下两种方式。Exemplarily, based on the second message, the security device obtains the CSB detection function of the terminal device, including but not limited to the following two ways.
方式1,针对第二报文包括终端设备的身份关键字的情况,安全设备通过解析第二报文获取第二报文包括的终端设备的身份关键字;安全设备根据该终端设备的身份关键字,获取终端设备具有的CSB检测功能。Mode 1, for the case where the second message includes the identity keyword of the terminal device, the security device obtains the identity keyword of the terminal device included in the second message by parsing the second message; , to obtain the CSB detection function of the terminal device.
在一种可能的实现方式中,安全设备根据该终端设备的身份关键字,获取终端设备具有的CSB检测功能,包括:安全设备向能力管理设备发送查询请求,该能力管理设备存储有终端设备对应的CSB检测功能信息,其中该查询请求中携带该终端设备的身份关键字,终端设备对应的CSB检测功能信息用于指示终端设备具有的CSB检测功能;接收能力管理设备响应于该查询请求发送的终端设备对应的CSB检测功能信息,根据该CSB检测功能信息,确定终端设备具有的CSB检测功能。In a possible implementation manner, the security device obtains the CSB detection function of the terminal device according to the identity keyword of the terminal device, including: the security device sends a query request to the capability management device, and the capability management device stores the corresponding The CSB detection function information of the terminal device, wherein the query request carries the identity keyword of the terminal device, and the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function that the terminal device has; the receiving capability management device sends in response to the query request According to the CSB detection function information corresponding to the terminal device, the CSB detection function possessed by the terminal device is determined according to the CSB detection function information.
示例性地,安全设备向能力管理设备发送查询请求时,基于HTTP、HTTPS或应用程序接口(application programming interface,API),向能力管理设备发送查询请求。需要说明的是,安全设备还可以基于其他公有协议或私有协议向能力管理设备发送查询请求,本申请实施例对此不加以限定。Exemplarily, when the security device sends the query request to the capability management device, it sends the query request to the capability management device based on HTTP, HTTPS or an application programming interface (application programming interface, API). It should be noted that the security device may also send the query request to the capability management device based on other public protocols or private protocols, which is not limited in this embodiment of the present application.
在另一种可能的实现方式中,安全设备根据该终端设备的身份关键字,获取终端设备具有的CSB检测功能,包括:安全设备根据该终端设备的身份关键字,查询该安全设备存储的身份关键字和CSB检测功能的对应关系,获取该终端设备的身份关键字对应的CSB检测功能。示例性地,如图3所示,安全设备存储身份关键字和CSB检测功能的对应关系。其中,安全设备存储的身份关键字和CSB检测功能的对应关系包括多个身份关键字,以及与每个身份关键字对应的CSB检测功能。从而,安全设备能够根据该终端设备的身份关键字,通过查询该身份关键字和CSB检测功能的对应关系,获取到该身份关键字和CSB检测功能的对应关系中该终端设备的身份关键字对应的CSB检测功能。In another possible implementation, the security device obtains the CSB detection function of the terminal device according to the identity key of the terminal device, including: the security device queries the identity key stored in the security device according to the identity key of the terminal device The corresponding relationship between the keyword and the CSB detection function is used to obtain the CSB detection function corresponding to the identity keyword of the terminal device. Exemplarily, as shown in FIG. 3 , the security device stores the correspondence between the identity key and the CSB detection function. Wherein, the corresponding relationship between the identity key and the CSB detection function stored in the security device includes multiple identity keys and a CSB detection function corresponding to each identity key. Therefore, the security device can obtain the corresponding relationship between the identity keyword and the CSB detection function of the identity keyword of the terminal device by querying the corresponding relationship between the identity keyword and the CSB detection function according to the identity keyword of the terminal device. The CSB detection function.
方式2,针对该第二报文携带终端设备对应的CSB检测功能信息的情况,安全设备通过解析第二报文获取第二报文携带的终端设备对应的CSB检测功能信息;安全设备根据第二报文携带的终端设备对应的CSB检测功能信息,确定终端设备具有的CSB检测功能。Mode 2, for the case where the second message carries the CSB detection function information corresponding to the terminal device, the security device obtains the CSB detection function information corresponding to the terminal device carried in the second message by analyzing the second message; the security device obtains the CSB detection function information corresponding to the terminal device carried in the second message; The CSB detection function information corresponding to the terminal device carried in the message determines the CSB detection function of the terminal device.
其中,根据第二报文的类型,安全设备通过解析第二报文获取第二报文携带的终端设备对应的CSB检测功能信息包括但不限于如下三种情况。Wherein, according to the type of the second message, the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the second message, including but not limited to the following three situations.
情况一,第二报文为基于HTTPS传输的报文。即第二报文为HTTPS协议的报文。Case 1, the second packet is a packet transmitted based on HTTPS. That is, the second packet is a packet of the HTTPS protocol.
示例性地,若终端设备对应的CSB检测功能信息携带在第二报文的Cookie中,则安全设备解析第二报文,获取该Cookie中携带的终端设备对应的CSB检测功能信息;若终端设备对应的CSB检测功能信息携带在第二报文的URL参数中,则安全设备解析第二报文,获取该URL参数中携带的终端设备对应的CSB检测功能信息;若终端设备对应的CSB检测功能信息携带在第二报文的HTTPS首部字段中,则安全设备解析第二报文,获取该HTTPS首部字段中携带的终端设备对应的CSB检测功能信息;若终端设备对应的CSB检测功能信息携带在第二报文的HTTPS自定义字段中,则安全设备解析第二报文,获取该HTTPS自定义字段中携带的终端设备对应的CSB检测功能信息。Exemplarily, if the CSB detection function information corresponding to the terminal device is carried in the Cookie of the second message, the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the Cookie; if the terminal device The corresponding CSB detection function information is carried in the URL parameter of the second message, then the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the URL parameter; if the CSB detection function corresponding to the terminal device The information is carried in the HTTPS header field of the second message, and the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the HTTPS header field; if the CSB detection function information corresponding to the terminal device is carried in the In the HTTPS custom field of the second message, the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the HTTPS custom field.
情况二,第二报文为基于HTTP传输的报文。即第二报文为HTTP协议的报文。In the second case, the second packet is a packet based on HTTP transmission. That is, the second packet is a packet of the HTTP protocol.
示例性地,若终端设备对应的CSB检测功能信息携带在第二报文的Cookie中,则安全设备解析第二报文,获取该Cookie中携带的终端设备对应的CSB检测功能信息;若终端设备对应的CSB检测功能信息携带在第二报文的HTTP首部字段中,则安全设备解析第二报文,获取该HTTP首部字段中携带的终端设备对应的CSB检测功能信息;若终端设备对应的CSB检测功能信息携带在第二报文的HTTP自定义字段中,则安全设备解析第二报文,获取该HTTP自定义字段中携带的终端设备对应的CSB检测功能信息。Exemplarily, if the CSB detection function information corresponding to the terminal device is carried in the Cookie of the second message, the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the Cookie; if the terminal device The corresponding CSB detection function information is carried in the HTTP header field of the second message, then the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the HTTP header field; if the CSB corresponding to the terminal device The detection function information is carried in the HTTP custom field of the second message, and the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the HTTP custom field.
情况三,第二报文为基于FTP传输的报文。即第二报文为FTP协议的报文。In case three, the second packet is a packet based on FTP transmission. That is, the second packet is a packet of the FTP protocol.
示例性地,若终端设备对应的CSB检测功能信息携带在第二报文的FTP冗余字段中,则安全设备解析第二报文,获取该FTP冗余字段中携带的终端设备对应的CSB检测功能信息;若终端设备对应的CSB检测功能信息携带在第二报文的FTP自定义字段中,则安全设备解析第二报文,获取该FTP自定义字段中携带的终端设备对应的CSB检测功能信息。For example, if the CSB detection function information corresponding to the terminal device is carried in the FTP redundant field of the second message, the security device parses the second message to obtain the CSB detection function information corresponding to the terminal device carried in the FTP redundant field. Function information; if the CSB detection function information corresponding to the terminal device is carried in the FTP custom field of the second message, the security device parses the second message to obtain the CSB detection function corresponding to the terminal device carried in the FTP custom field information.
无论为上述三种情况中的哪种情况获取的终端设备对应的CSB检测功能信息,获取终端设备对应的CSB检测功能信息之后,安全设备根据该第二报文携带的终端设备对应的CSB检测功能信息,确定终端设备具有的CSB检测功能。Regardless of the CSB detection function information corresponding to the terminal device obtained for any of the above three situations, after obtaining the CSB detection function information corresponding to the terminal device, the security device performs the CSB detection function corresponding to the terminal device carried in the second message information to determine the CSB detection function of the terminal device.
示例性地,该基于第二报文,安全设备获取终端设备具有的CSB检测功能的步骤对应于图3示出的识别第二报文,获取终端设备具有的CSB检测功能的相关内容。Exemplarily, the step of the security device obtaining the CSB detection function of the terminal device based on the second message corresponds to identifying the second message shown in FIG. 3 , and obtaining relevant content of the CSB detection function of the terminal device.
由于安全设备获取了终端设备具有的CSB检测功能,安全设备能够确定出第一报文对应的待执行的CSB检测功能中的哪些CSB检测功能是终端设备具有的CSB检测功能,以及哪些CSB检测功能是终端设备不具有的CSB检测功能。也即,安全设备能够确定出待执行的CSB检测功能中的第一CSB检测功能和第二CSB检测功能。Since the security device has acquired the CSB detection function of the terminal device, the security device can determine which of the CSB detection functions to be executed corresponding to the first message are the CSB detection functions of the terminal device, and which CSB detection functions It is a CSB detection function that terminal equipment does not have. That is, the security device can determine the first CSB detection function and the second CSB detection function among the CSB detection functions to be executed.
示例性地,安全设备确定第一报文对应的待执行的CSB检测功能之后,该方法还包括:安全设备根据终端设备具有的CSB检测功能以及第一报文对应的待执行的CSB检测功能,确定终端设备具有第一CSB检测功能。例如,第一报文对应的待执行的CSB检测功能包括IPS检测功能、AV检测功能和URL检测功能,终端设备具有的CSB检测功能包括URL检测功能和AIE检测功能,则安全设备确定终端设备具有第一CSB检测功能,该第一CSB检测功能包括URL检测功能。Exemplarily, after the security device determines the to-be-executed CSB detection function corresponding to the first message, the method further includes: the security device, according to the CSB detection function of the terminal device and the to-be-executed CSB detection function corresponding to the first message, It is determined that the terminal device has the first CSB detection function. For example, the CSB detection function to be executed corresponding to the first message includes an IPS detection function, an AV detection function, and a URL detection function, and the CSB detection function possessed by the terminal device includes a URL detection function and an AIE detection function, then the security device determines that the terminal device has A first CSB detection function, the first CSB detection function includes a URL detection function.
接下来,请继续参见图2,本申请实施例提供的方法包括步骤204。Next, please continue to refer to FIG. 2 , the method provided by the embodiment of the present application includes step 204 .
步骤204,终端设备接收安全设备发送的第一报文。Step 204, the terminal device receives the first message sent by the security device.
其中,该安全设备部署于外部网络和内部网络的边界,第一报文用于承载外部网络的服务器根据终端设备的请求提供的资源,第一报文为安全设备未执行第一CSB检测功能的报文,终端设备具有的CSB检测功能中包括该第一CSB检测功能。Wherein, the security device is deployed on the boundary between the external network and the internal network, the first message is used to carry the resource provided by the server of the external network according to the request of the terminal device, and the first message is that the security device does not perform the first CSB detection function For the packet, the CSB detection function of the terminal device includes the first CSB detection function.
示例性地,如图1所示的实施场景中,第一报文对应的待执行的CSB检测功能包括IPS检测功能、AV检测功能、URL检测功能、AIE检测功能和SA检测功能;终端设备102B具有的CSB检测功能包括IPS检测功能、AV检测功能和AIE检测功能,其中,该IPS检测功能、AV检测功能和AIE检测功能分别与安全设备101具有的CSB检测功能包括的IPS检测功能、AV检测功能和AIE检测功能相同。则第一CSB检测功能包括IPS检测功能、AV检测功能和AIE检测功能,第二CSB检测功能包括URL检测功能和SA检测功能。终端设备102B接收到安全设备101发送的第一报文,该第一报文为安全设备101执行了URL检测功能和SA检测功能,未执行IPS检测功能、AV检测功能和AIE检测功能的报文。Exemplarily, in the implementation scenario shown in Figure 1, the CSB detection function to be executed corresponding to the first message includes an IPS detection function, an AV detection function, a URL detection function, an AIE detection function and an SA detection function; the terminal device 102B The CSB detection function it has includes an IPS detection function, an AV detection function, and an AIE detection function, wherein the IPS detection function, the AV detection function, and the AIE detection function are respectively the same as the IPS detection function, AV detection function included in the CSB detection function of the security device 101. The function is the same as the AIE detection function. Then the first CSB detection function includes IPS detection function, AV detection function and AIE detection function, and the second CSB detection function includes URL detection function and SA detection function. The terminal device 102B receives the first message sent by the security device 101. The first message is a message that the security device 101 has performed the URL detection function and the SA detection function, but has not performed the IPS detection function, the AV detection function, and the AIE detection function. .
步骤205,终端设备对第一报文执行该第一CSB检测功能。Step 205, the terminal device performs the first CSB detection function on the first packet.
在一种可能的实现方式中,终端设备对第一报文执行本终端设备具有的CSB检测功能。换句话说,终端设备对接收到的报文默认执行本终端设备具有的所有CSB检测功能。In a possible implementation manner, the terminal device performs a CSB detection function of the terminal device on the first packet. In other words, the terminal device performs all CSB detection functions of the terminal device by default on the received message.
在一种可能的实现方式中,终端设备对第一报文执行该第一CSB检测功能之前,该方法还包括:终端设备确定第一报文对应的待执行的CSB检测功能,根据终端设备具有的CSB检测功能以及第一报文对应的待执行的CSB检测功能,确定第一CSB检测功能。In a possible implementation manner, before the terminal device performs the first CSB detection function on the first message, the method further includes: the terminal device determines the CSB detection function to be performed corresponding to the first message, and according to the terminal device's The CSB detection function and the CSB detection function to be executed corresponding to the first message determine the first CSB detection function.
示例性地,终端设备存储有多个CSB检测策略,其中,每个CSB检测策略对应一种资源类型,每个CSB检测策略包括至少一种CSB检测功能。终端设备确定第一报文对应的待执行的CSB检测功能,包括:终端设备获取第一报文承载的资源的资源类型,根据该资源类型查找与该资源类型对应的CSB检测策略,将该CSB检测策略包括的CSB检测功能确定为第一报文对应的待执行的CSB检测功能。示例性地,终端设备存储的CSB检测策略与步骤202中安全设备存储的CSB检测策略相同。Exemplarily, the terminal device stores multiple CSB detection strategies, where each CSB detection strategy corresponds to a resource type, and each CSB detection strategy includes at least one CSB detection function. The terminal device determines the to-be-executed CSB detection function corresponding to the first message, including: the terminal device obtains the resource type of the resource carried by the first message, searches for a CSB detection policy corresponding to the resource type according to the resource type, and uses the CSB The CSB detection function included in the detection strategy is determined as the CSB detection function to be executed corresponding to the first packet. Exemplarily, the CSB detection policy stored in the terminal device is the same as the CSB detection policy stored in the security device in step 202 .
示例性地,终端设备确定第一CSB检测功能之后,执行对第一报文执行该第一CSB检测功能的操作。Exemplarily, after determining the first CSB detection function, the terminal device performs an operation of performing the first CSB detection function on the first packet.
在另一种可能的实现方式中,终端设备对第一报文执行该第一CSB检测功能之前,该方法还包括:终端设备接收安全设备发送的指示信息,该指示信息用于指示第一CSB检测功能;终端设备根据该指示信息获取第一CSB检测功能,执行对第一报文执行该第一CSB检测功能的操作。In another possible implementation manner, before the terminal device performs the first CSB detection function on the first packet, the method further includes: the terminal device receives indication information sent by the security device, where the indication information is used to indicate that the first CSB A detection function: the terminal device obtains the first CSB detection function according to the indication information, and performs an operation of performing the first CSB detection function on the first packet.
示例性地,终端设备对第一报文执行该第一CSB检测功能之前,该方法还包括:终端设备检测接收到的第一报文是否为采用分段传输的方式传输的报文(也可以是数据或文件)的一部分;响应于该第一报文为采用分段传输的报文的一部分,终端设备拼接多个第一报文得到拼接后的报文,终端设备对该拼接后的报文执行第一CSB检测功能。关于终端设备检测第一报文是否为采用分段传输的方式传输的报文的一部分的方式,以及终端设备拼接多个第一报文的方式,本申请实施例对此不加以限定。Exemplarily, before the terminal device performs the first CSB detection function on the first message, the method further includes: the terminal device detects whether the received first message is a message transmitted in a segmented transmission mode (or is part of data or file); in response to the fact that the first message is part of a message transmitted in segments, the terminal device splices multiple first messages to obtain a spliced message, and the terminal device splices the spliced message The text performs the first CSB detection function. The embodiment of the present application does not limit the manner in which the terminal device detects whether the first packet is a part of the packet transmitted in a segmented transmission manner, and the manner in which the terminal device splices multiple first packets.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息之前,该方法还包括:终端设备向登录认证设备发送认证信息,以使登录认证设备基于该认证信息对加入内部网络的终端设备进行登录认证,登录认证的方式包括且不限于本地认证、 服务器认证或证书认证中的任一种。其中,内部网络可以通过企业内部网络硬件本地接入,也可通过虚拟专用网络(virtual private network,VPN)远程接入。接下来,分别对终端设备采用三种登录认证方式进行登录认证加以说明。In a possible implementation manner, before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, the method further includes: the terminal device sends authentication information to the login authentication device, so that the login authentication device uses the authentication information to A terminal device joining the internal network performs login authentication, and the login authentication method includes but is not limited to any one of local authentication, server authentication, or certificate authentication. Wherein, the internal network can be accessed locally through the internal network hardware of the enterprise, or remotely accessed through a virtual private network (virtual private network, VPN). Next, the login authentication performed by the terminal device in three login authentication modes will be described respectively.
登录认证方式一,终端设备通过本地认证的方式进行登录认证。Login authentication method 1, the terminal device performs login authentication through local authentication.
示例性地,若安全设备具有登录认证设备的功能,也即,安全设备为登录认证设备,终端设备可以通过本地认证的方式进行登录认证。示例性地,终端设备向其他设备提供终端设备对应的CSB检测功能信息之前,该方法还包括:终端设备向安全设备发送登录请求,该登录请求包括用户信息;接收安全设备基于该用户信息发送的认证结果,该认证结果用于指示终端设备是否成功登录。其中,用户信息可以包括用户名和密码。Exemplarily, if the security device has a login authentication device function, that is, the security device is a login authentication device, the terminal device may perform login authentication in a local authentication manner. Exemplarily, before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, the method further includes: the terminal device sends a login request to the security device, and the login request includes user information; Authentication result, which is used to indicate whether the terminal device has successfully logged in. Wherein, the user information may include a user name and a password.
登录认证方式二,终端设备通过服务器认证的方式进行登录认证。In the second login authentication method, the terminal device performs login authentication through server authentication.
示例性地,若登录认证设备为安全设备和终端设备以外的其他设备,终端设备可以通过服务器认证的方式进行登录认证。Exemplarily, if the login authentication device is other than the security device and the terminal device, the terminal device may perform login authentication through server authentication.
在一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息之前,该方法还包括:终端设备向登录认证设备发送登录请求,该登录请求包括用户信息;接收登录认证设备基于该用户信息发送的认证结果,该认证结果用于指示终端设备是否成功登录。其中,用户信息可以包括用户名和密码。In a possible implementation manner, before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, the method further includes: the terminal device sends a login request to the login authentication device, and the login request includes user information; The authentication result sent by the device based on the user information is used to indicate whether the terminal device has successfully logged in. Wherein, the user information may include a user name and a password.
在另一种可能的实现方式中,终端设备向其他设备提供终端设备对应的CSB检测功能信息之前,该方法还包括:终端设备向安全设备发送登录请求,其中,该登录请求包括用户信息,该登录请求用于安全设备基于该登录请求向登录认证设备发送登录认证请求,以使登录认证设备基于用户信息对该终端设备进行登录认证;接收安全设备发送的认证结果,其中,该认证结果为登录认证设备基于用户信息生成的认证结果,该认证结果用于指示终端设备是否成功登录。其中,用户信息可以包括用户名和密码。In another possible implementation manner, before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, the method further includes: the terminal device sends a login request to the security device, where the login request includes user information, the The login request is used for the security device to send a login authentication request to the login authentication device based on the login request, so that the login authentication device performs login authentication on the terminal device based on the user information; and receives the authentication result sent by the security device, wherein the authentication result is a login The authentication result generated by the authentication device based on the user information is used to indicate whether the terminal device has successfully logged in. Wherein, the user information may include a user name and a password.
登录认证方式三,终端设备通过证书认证的方式进行登录认证。Login authentication mode 3, the terminal device performs login authentication through certificate authentication.
无论登录认证设备为安全设备或安全设备和终端设备以外的其他设备,终端设备均可以通过证书认证的方式进行登录认证。示例性地,终端设备向其他设备提供终端设备对应的CSB检测功能信息之前,该方法还包括:终端设备向登录认证设备发送登录请求,该登录请求包括终端设备的本地证书;接收登录认证设备基于终端设备的本地证书发送的认证结果,该认证结果用于指示终端设备是否成功登录。由于终端设备能够通过不同的登录认证方式完成登录认证,终端设备的登录认证的方式较为灵活。Regardless of whether the login authentication device is a security device or other devices other than the security device and the terminal device, the terminal device can perform login authentication through certificate authentication. Exemplarily, before the terminal device provides the CSB detection function information corresponding to the terminal device to other devices, the method further includes: the terminal device sends a login request to the login authentication device, and the login request includes the local certificate of the terminal device; receiving the login authentication device based on The authentication result sent by the local certificate of the terminal device, which is used to indicate whether the terminal device has successfully logged in. Since the terminal device can complete login authentication through different login authentication modes, the login authentication mode of the terminal device is more flexible.
需要说明的是,无论通过上述哪种登录认证方式进行登录认证,响应于终端设备成功登录,终端设备执行向其他设备提供终端设备对应的CSB检测功能信息的操作。示例性地,响应于终端设备未成功登录,终端设备不执行该报文处理方法。此外,上述本地认证、服务器认证和证书认证仅为本申请实施例举例说明的登录认证的方式,终端设备还可以通过其他登录认证的方式进行登录认证,本申请实施例对此不加以限定。It should be noted that no matter which login authentication method is used for login authentication, in response to the successful login of the terminal device, the terminal device performs an operation of providing other devices with CSB detection function information corresponding to the terminal device. Exemplarily, in response to the unsuccessful login of the terminal device, the terminal device does not execute the message processing method. In addition, the above-mentioned local authentication, server authentication, and certificate authentication are only login authentication methods described in the embodiment of this application, and the terminal device can also perform login authentication through other login authentication methods, which are not limited in this embodiment of the application.
示例性地,终端设备进行登录认证的步骤对应于图3示出的终端设备登录认证的相关内容。需要说明的是,如图3所示,若登录认证设备为安全设备和终端设备以外的其他设备,安全设备也可以进行登录认证以加入内部网络。其中,登录认证的方式包括本地认证、服务器认证或证书认证中的任一种。当然,安全设备还可以通过其他登录认证的方式进行登录认证,本申请实施例对此不加以限定。Exemplarily, the step of the terminal device performing login authentication corresponds to the relevant content of the terminal device login authentication shown in FIG. 3 . It should be noted that, as shown in FIG. 3 , if the login authentication device is other than the security device and the terminal device, the security device can also perform login authentication to join the internal network. Wherein, the manner of login authentication includes any one of local authentication, server authentication or certificate authentication. Of course, the security device may also perform login authentication through other login authentication methods, which is not limited in this embodiment of the present application.
本申请实施例提供的方法,安全设备对于截获的外部网络向内部网络发送的第一报文,在终端设备具有该第一报文对应的待执行的CSB检测功能中的全部或部分功能的情况下,通过安全设备省略对第一报文执行该全部或部分功能,能够降低安全设备执行CSB检测功能时的设备资源占用,从而降低执行CSB检测功能对安全设备的性能的要求。另外,由于该方法降低了执行CSB检测功能的设备资源占用,安全设备的未被占用的设备资源能够用于执行其他功能,提高了安全设备的性能。In the method provided in the embodiment of the present application, the security device intercepts the first message sent from the external network to the internal network, in the case that the terminal device has all or part of the CSB detection function to be executed corresponding to the first message Next, by omitting to perform all or part of the functions on the first packet by the security device, it is possible to reduce device resource occupation when the security device performs the CSB detection function, thereby reducing performance requirements of the security device for performing the CSB detection function. In addition, because the method reduces the occupancy of device resources for performing the CSB detection function, the unoccupied device resources of the security device can be used to perform other functions, thereby improving the performance of the security device.
另外,终端设备接收到安全设备发送的第一报文之后,终端设备能够对该第一报文执行第一CSB检测功能,以实现执行第一报文对应的全部待执行的CSB检测,保证了第一报文的安全性。此外,终端设备能够将分段传输的报文进行拼接,对拼接后的报文执行第一CSB检测功能。由于分段传输的报文仅包括部分内容,对该分段传输的报文分别执行第一CSB检测功能可能存在威胁未检出的情况。终端设备将分段传输的报文进行拼接,对拼接后的报文执行第一CSB检测功能提高了CSB检测效果。In addition, after the terminal device receives the first message sent by the security device, the terminal device can perform the first CSB detection function on the first message, so as to implement all pending CSB detections corresponding to the first message, ensuring Security of the first message. In addition, the terminal device can splice the packets transmitted in segments, and perform the first CSB detection function on the spliced packets. Since the segmented transmitted message only includes part of the content, threats may not be detected when the first CSB detection function is respectively performed on the segmented transmitted message. The terminal device splices the packets transmitted in segments, and performs the first CSB detection function on the spliced packets to improve the CSB detection effect.
下面以如下三种场景为例,对本申请实施例提供的报文处理方法进行说明。The following three scenarios are taken as examples to describe the packet processing method provided in the embodiment of the present application.
场景一,终端设备为通过本地认证或服务器认证进行登录认证的设备,安全设备向能力管理设备查询终端设备具有的CSB检测功能。Scenario 1, the terminal device is a device that performs login authentication through local authentication or server authentication, and the security device queries the capability management device for the CSB detection function of the terminal device.
在一种可能的实现方式中,安全设备中集成了登录认证设备的功能,也即,登录认证功能由安全设备实现。在另一种可能的实现方式中,登录认证功能和能力管理功能由同一个设备实现,即该设备既是登录认证设备又是能力管理设备。在另一种可能的实现方式中,登录认证功能和能力管理功能由除安全设备以外的其他两个设备实现,也即,安全设备、登录认证设备和能力管理设备分别为不同的设备。In a possible implementation manner, the security device integrates a function of the login authentication device, that is, the login authentication function is implemented by the security device. In another possible implementation manner, the login authentication function and the capability management function are implemented by the same device, that is, the device is both a login authentication device and a capability management device. In another possible implementation manner, the login authentication function and the capability management function are implemented by two other devices except the security device, that is, the security device, the login authentication device and the capability management device are different devices respectively.
示例性地,本申请实施例以登录认证功能由登录认证设备实现,能力管理功能由能力管理设备实现为例进行说明,本申请实施例提供的报文处理方法如图4所示,包括但不限于步骤401至步骤422。Exemplarily, this embodiment of the present application takes the login authentication function implemented by the login authentication device, and the capability management function implemented by the capability management device as an example for illustration. The message processing method provided by the embodiment of the present application is shown in Figure 4, including but not It is limited to step 401 to step 422.
步骤401,终端设备向登录认证设备发送登录请求,该登录请求包括用户信息。Step 401, the terminal device sends a login request to the login authentication device, and the login request includes user information.
例如,登录请求包括的用户信息包括用户名和密码。For example, the user information included in the login request includes username and password.
步骤402,登录认证设备基于该用户信息对终端设备进行登录认证。Step 402, the login authentication device performs login authentication on the terminal device based on the user information.
步骤403,登录认证设备向终端设备发送认证结果。Step 403, the login authentication device sends the authentication result to the terminal device.
步骤401至步骤403可参照前文中本地认证和服务器认证的相关内容,此处不再赘述。For steps 401 to 403, reference may be made to the related content of local authentication and server authentication mentioned above, and details will not be repeated here.
步骤404,响应于认证结果为认证通过,登录认证设备向安全设备发送用户信息。Step 404, in response to the authentication result being that the authentication is passed, the login authentication device sends user information to the security device.
示例性地,该用户信息用于终端设备通过本地认证的方式进行登录认证。终端设备成功登录后,执行步骤405。Exemplarily, the user information is used for the terminal device to perform login authentication through local authentication. After the terminal device successfully logs in, step 405 is performed.
步骤405,终端设备向能力管理设备提供终端设备对应的CSB检测功能信息。Step 405, the terminal device provides the CSB detection function information corresponding to the terminal device to the capability management device.
步骤406,能力管理设备存储终端设备对应的CSB检测功能信息以及终端设备的身份关键字。Step 406, the capability management device stores the CSB detection function information corresponding to the terminal device and the identity key of the terminal device.
示例性地,终端设备的身份关键字包括终端设备的随机ID。示例性地,步骤406包括:能力管理设备存储终端设备对应的CSB检测功能信息,生成并存储终端设备的随机ID。Exemplarily, the identity key of the terminal device includes a random ID of the terminal device. Exemplarily, step 406 includes: the capability management device stores CSB detection function information corresponding to the terminal device, and generates and stores a random ID of the terminal device.
步骤407,能力管理设备向终端设备发送第一结果或第二结果,以及终端设备的随机ID。Step 407, the capability management device sends the first result or the second result and the random ID of the terminal device to the terminal device.
步骤408,终端设备保存该终端设备的随机ID。Step 408, the terminal device saves the random ID of the terminal device.
需要说明的是,步骤405至步骤407可参照前文中终端设备向能力管理设备提供终端设备对应的CSB检测功能信息的相关内容,此处不再赘述。It should be noted that, from step 405 to step 407, reference may be made to related content in which the terminal device provides the CSB detection function information corresponding to the terminal device to the capability management device above, which will not be repeated here.
步骤409,终端设备向外部网络的服务器发送第二报文。Step 409, the terminal device sends the second message to the server on the external network.
其中,第二报文包括终端设备的身份关键字,第二报文用于请求获取外部网络的服务器提供的资源。Wherein, the second message includes the identity key of the terminal device, and the second message is used to request to acquire resources provided by the server of the external network.
步骤410,安全设备截获到第二报文后,向能力管理设备发送查询请求。Step 410, after the security device intercepts the second message, it sends a query request to the capability management device.
步骤411,响应于该查询请求,能力管理设备向安全设备发送终端设备对应的CSB检测功能信息。Step 411, in response to the query request, the capability management device sends CSB detection function information corresponding to the terminal device to the security device.
步骤412,安全设备向外部网络的服务器转发第二报文。Step 412, the security device forwards the second packet to the server on the external network.
步骤413,响应于该第二报文,外部网络的服务器向终端设备发送第一报文。Step 413, in response to the second packet, the server of the external network sends the first packet to the terminal device.
需要说明的是,步骤409至步骤413可参照前文中步骤200和步骤201的相关内容,此处不再赘述。It should be noted that, for steps 409 to 413, reference may be made to the related content of steps 200 and 201 above, which will not be repeated here.
步骤414,安全设备截获到第一报文后,确定第一报文对应的待执行的CSB检测功能。Step 414: After the security device intercepts the first message, it determines the CSB detection function to be executed corresponding to the first message.
步骤415,安全设备确定终端设备具有的CSB检测功能。Step 415, the security device determines the CSB detection function of the terminal device.
响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的全部功能,执行步骤416和步骤417;响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的部分功能,执行步骤418至步骤420;响应于终端设备不具有第一CSB检测功能,执行步骤421和步骤422。In response to the terminal device having the first CSB detection function, the first CSB detection function is all the functions in the CSB detection functions to be executed corresponding to the first message, and step 416 and step 417 are performed; in response to the terminal device having the first CSB detection function function, the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, perform steps 418 to 420; in response to the terminal device not having the first CSB detection function, perform steps 421 and 422 .
步骤416,响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的全部功能,安全设备向终端设备发送第一报文。Step 416: In response to the fact that the terminal device has a first CSB detection function, and the first CSB detection function is all the CSB detection functions to be executed corresponding to the first message, the security device sends the first message to the terminal device.
步骤417,终端设备对第一报文执行第一CSB检测功能。Step 417, the terminal device performs a first CSB detection function on the first packet.
步骤418,响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的部分功能,安全设备对第一报文执行第二CSB检测功能,第二CSB检测功能是第一报文对应的待执行的CSB检测功能中除第一CSB检测功能之外的功能。Step 418, in response to the fact that the terminal device has a first CSB detection function, the first CSB detection function is part of the CSB detection functions to be executed corresponding to the first message, and the security device performs a second CSB detection function on the first message , the second CSB detection function is a function other than the first CSB detection function among the to-be-executed CSB detection functions corresponding to the first message.
步骤419,响应于安全设备对第一报文执行第二CSB检测功能的检测结果为安全,安全设备向终端设备发送第一报文。Step 419: In response to the fact that the security device performs the second CSB detection function on the first packet and the detection result is safe, the security device sends the first packet to the terminal device.
步骤420,终端设备对第一报文执行第一CSB检测功能。Step 420, the terminal device performs a first CSB detection function on the first packet.
步骤421,响应于终端设备不具有第一CSB检测功能,安全设备对第一报文执行全部的待执行的CSB检测功能。Step 421, in response to the fact that the terminal device does not have the first CSB detection function, the security device performs all CSB detection functions to be performed on the first packet.
步骤422,响应于安全设备对第一报文执行全部的待执行的CSB检测功能的检测结果为安全,安全设备向终端设备发送第一报文。Step 422: In response to the fact that the security device performs all CSB detection functions to be performed on the first packet and the detection result is safe, the security device sends the first packet to the terminal device.
步骤414至步骤422可参照前文中步骤202和步骤203的相关内容,此处不再赘述。Step 414 to step 422 may refer to the relevant content of step 202 and step 203 above, and will not be repeated here.
场景二,终端设备为通过证书认证进行登录认证的设备,安全设备向能力管理设备查询终端设备具有的CSB检测功能。In the second scenario, the terminal device is a device that performs login authentication through certificate authentication, and the security device queries the capability management device for the CSB detection function of the terminal device.
在一种可能的实现方式中,安全设备中集成了登录认证设备的功能,也即,登录认证功能由安全设备实现。在另一种可能的实现方式中,登录认证功能和能力管理功能由同一个设备实现,即该设备既是登录认证设备又是能力管理设备。在另一种可能的实现方式中,登录认证功能和能力管理功能由除安全设备以外的其他两个设备实现,也即,安全设备、登录认 证设备和能力管理设备分别为不同的设备。In a possible implementation manner, the security device integrates a function of the login authentication device, that is, the login authentication function is implemented by the security device. In another possible implementation manner, the login authentication function and the capability management function are implemented by the same device, that is, the device is both a login authentication device and a capability management device. In another possible implementation manner, the login authentication function and the capability management function are implemented by two other devices except the security device, that is, the security device, the login authentication device, and the capability management device are different devices.
示例性地,本申请实施例以登录认证功能由安全设备实现,能力管理功能由能力管理设备实现为例进行说明,本申请实施例提供的报文处理方法如图5所示,包括但不限于步骤501至步骤521。Exemplarily, this embodiment of the application takes the login authentication function implemented by a security device and the capability management function implemented by a capability management device as an example for illustration. The message processing method provided by this embodiment of the application is shown in Figure 5, including but not limited to Step 501 to step 521.
步骤501,终端设备向安全设备发送登录请求,该登录请求包括终端设备的本地证书。Step 501, the terminal device sends a login request to the security device, where the login request includes the local certificate of the terminal device.
步骤502,安全设备基于终端设备的本地证书对终端设备进行登录认证。Step 502, the security device performs login authentication on the terminal device based on the local certificate of the terminal device.
示例性地,安全设备基于终端设备的本地证书对终端设备进行登录认证,包括但不限于步骤1至步骤3。Exemplarily, the security device performs login authentication on the terminal device based on the local certificate of the terminal device, including but not limited to steps 1 to 3.
步骤1,安全设备接收终端设备发送的终端设备的本地证书。Step 1, the security device receives the local certificate of the terminal device sent by the terminal device.
步骤2,安全设备调用安全设备的证书颁发机构(certificate authority,CA)证书。Step 2, the security device invokes the certificate authority (certificate authority, CA) certificate of the security device.
步骤3,安全设备基于该安全设备的CA证书验证该终端设备的本地证书,获取验证结果。Step 3: The security device verifies the local certificate of the terminal device based on the CA certificate of the security device, and obtains a verification result.
例如,如图6所示,终端设备向安全设备发送终端设备的本地证书;安全设备调用该安全设备的CA证书,该CA证书存储在安全设备的证书模块中,该CA证书为CA发布的证书;安全设备根据该安全设备的CA证书验证终端设备的本地证书;安全设备向终端设备发送验证结果。For example, as shown in Figure 6, the terminal device sends the local certificate of the terminal device to the security device; the security device invokes the CA certificate of the security device, the CA certificate is stored in the certificate module of the security device, and the CA certificate is a certificate issued by the CA ; The security device verifies the local certificate of the terminal device according to the CA certificate of the security device; the security device sends the verification result to the terminal device.
步骤503,响应于验证结果为可信,安全设备添加用户信息。Step 503, in response to the verification result being authentic, the security device adds user information.
示例性地,该用户信息用于终端设备通过本地认证的方式进行登录认证。在安全设备基于终端设备的本地证书对终端设备进行登录认证之后,执行步骤504。Exemplarily, the user information is used for the terminal device to perform login authentication through local authentication. After the security device performs login authentication on the terminal device based on the local certificate of the terminal device, step 504 is executed.
步骤504,安全设备向终端设备发送认证结果。Step 504, the security device sends the authentication result to the terminal device.
需要说明的是,上述步骤501至步骤504对应于前文中的证书认证的相关内容,此处不再赘述。It should be noted that the above step 501 to step 504 correspond to the relevant content of the certificate authentication mentioned above, which will not be repeated here.
终端设备成功登录后,执行步骤505。After the terminal device successfully logs in, step 505 is executed.
步骤505,终端设备向能力管理设备提供终端设备对应的CSB检测功能信息以及终端设备的本地证书。Step 505, the terminal device provides the CSB detection function information corresponding to the terminal device and the local certificate of the terminal device to the capability management device.
示例性地,该本地证书包括用户信息,该用户信息用于作为该终端设备的身份关键字。Exemplarily, the local certificate includes user information, and the user information is used as an identity key of the terminal device.
步骤506,能力管理设备存储终端设备对应的CSB检测功能信息以及终端设备的身份关键字。Step 506, the capability management device stores the CSB detection function information corresponding to the terminal device and the identity key of the terminal device.
示例性地,终端设备的身份关键字包括终端设备的本地证书中的用户信息。Exemplarily, the identity key of the terminal device includes user information in the local certificate of the terminal device.
步骤507,能力管理设备向终端设备发送第一结果或第二结果。Step 507, the capability management device sends the first result or the second result to the terminal device.
需要说明的是,步骤505至步骤507可参照前文中终端设备向能力管理设备提供终端设备对应的CSB检测功能信息的相关内容,此处不再赘述。It should be noted that, from step 505 to step 507, reference may be made to related content in which the terminal device provides the CSB detection function information corresponding to the terminal device to the capability management device above, which will not be repeated here.
步骤508,终端设备向外部网络的服务器发送第二报文。Step 508, the terminal device sends the second packet to the server on the external network.
其中,第二报文包括终端设备的身份关键字,第二报文用于请求获取外部网络的服务器提供的资源。Wherein, the second message includes the identity key of the terminal device, and the second message is used to request to acquire resources provided by the server of the external network.
步骤509,安全设备截获到第二报文后,向能力管理设备发送查询请求。Step 509: After intercepting the second message, the security device sends a query request to the capability management device.
步骤510,响应于该查询请求,能力管理设备向安全设备发送终端设备对应的CSB检测功能信息。Step 510, in response to the query request, the capability management device sends CSB detection function information corresponding to the terminal device to the security device.
步骤511,安全设备向外部网络的服务器转发第二报文。Step 511, the security device forwards the second message to the server on the external network.
步骤512,响应于该第二报文,外部网络的服务器向终端设备发送第一报文。Step 512, in response to the second packet, the server of the external network sends the first packet to the terminal device.
需要说明的是,步骤508至步骤512可参照前文中步骤200和步骤201的相关内容,此处不 再赘述。It should be noted that, from step 508 to step 512, reference may be made to the related content of step 200 and step 201 above, which will not be repeated here.
步骤513,安全设备截获到第一报文后,确定第一报文对应的待执行的CSB检测功能。Step 513: After the security device intercepts the first message, it determines the CSB detection function to be executed corresponding to the first message.
步骤514,安全设备确定终端设备具有的CSB检测功能。Step 514, the security device determines the CSB detection function of the terminal device.
响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的全部功能,执行步骤515和步骤516;响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的部分功能,执行步骤517至步骤519;响应于终端设备不具有第一CSB检测功能,执行步骤520和步骤521。In response to the terminal device having the first CSB detection function, the first CSB detection function is all the functions in the CSB detection functions to be executed corresponding to the first message, and step 515 and step 516 are performed; in response to the terminal device having the first CSB detection function function, the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, perform steps 517 to 519; in response to the terminal device not having the first CSB detection function, perform steps 520 and 521 .
步骤515,响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的全部功能,安全设备向终端设备发送第一报文。Step 515, in response to the fact that the terminal device has the first CSB detection function, and the first CSB detection function is all the CSB detection functions to be executed corresponding to the first message, the security device sends the first message to the terminal device.
步骤516,终端设备对第一报文执行第一CSB检测功能。Step 516, the terminal device performs a first CSB detection function on the first packet.
步骤517,响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的部分功能,安全设备对第一报文执行第二CSB检测功能,第二CSB检测功能是第一报文对应的待执行的CSB检测功能中除第一CSB检测功能之外的功能。Step 517, in response to the fact that the terminal device has a first CSB detection function, the first CSB detection function is part of the CSB detection functions to be executed corresponding to the first message, and the security device performs a second CSB detection function on the first message , the second CSB detection function is a function other than the first CSB detection function among the to-be-executed CSB detection functions corresponding to the first message.
步骤518,响应于安全设备对第一报文执行第二CSB检测功能的检测结果为安全,安全设备向终端设备发送第一报文。Step 518: In response to the detection result of the security device performing the second CSB detection function on the first message being safe, the security device sends the first message to the terminal device.
步骤519,终端设备对第一报文执行第一CSB检测功能。Step 519, the terminal device performs a first CSB detection function on the first packet.
步骤520,响应于终端设备不具有第一CSB检测功能,安全设备对第一报文执行全部的待执行的CSB检测功能。Step 520, in response to the fact that the terminal device does not have the first CSB detection function, the security device performs all CSB detection functions to be performed on the first packet.
步骤521,响应于安全设备对第一报文执行全部的待执行的CSB检测功能的检测结果为安全,安全设备向终端设备发送第一报文。Step 521: In response to the fact that the safety device performs all CSB detection functions to be performed on the first packet and the detection result is safe, the safety device sends the first packet to the terminal device.
步骤513至步骤521与前文中步骤414至步骤422相关内容原理相同,此处不再赘述。The principles of steps 513 to 521 are the same as those of steps 414 to 422 above, and will not be repeated here.
场景三,安全设备获取终端设备发送的终端设备对应的CSB检测功能信息。In the third scenario, the security device obtains the CSB detection function information corresponding to the terminal device sent by the terminal device.
在一种可能的实现方式中,安全设备中集成了能力管理设备的功能,也即,能力管理功能由安全设备实现。示例性地,以终端设备远程接入内部网络,终端设备与安全设备建立安全套接字协议(secure sockets layer,SSL)连接,终端设备基于HTTPS协议向外部网络的服务器发送第二报文为例进行说明。本申请实施例提供的报文处理方法如图7所示,包括但不限于步骤701至步骤718。In a possible implementation manner, the security device integrates the function of the capability management device, that is, the capability management function is implemented by the security device. Exemplarily, a terminal device remotely accesses the internal network, the terminal device establishes a secure sockets layer (SSL) connection with the security device, and the terminal device sends the second message to the server of the external network based on the HTTPS protocol as an example Be explained. The message processing method provided by the embodiment of the present application is shown in FIG. 7 , including but not limited to step 701 to step 718 .
步骤701,终端设备与安全设备建立SSL连接。Step 701, the terminal device establishes an SSL connection with the security device.
在一种可能的实现方式中,终端设备单向认证安全设备,响应于认证通过,终端设备与安全设备建立SSL连接。在另一种可能的实现方式中,终端设备与安全设备双向认证,响应于认证通过,终端设备与安全设备建立SSL连接。In a possible implementation manner, the terminal device unidirectionally authenticates the security device, and in response to passing the authentication, the terminal device establishes an SSL connection with the security device. In another possible implementation manner, the terminal device and the security device conduct mutual authentication, and in response to passing the authentication, the terminal device establishes an SSL connection with the security device.
上述涉及的认证过程与附图5中步骤503或附图6的相关描述类似,具体过程请参照附图5或附图6的相关描述,在这里不再详述。The authentication process involved above is similar to step 503 in FIG. 5 or the related description of FIG. 6 . Please refer to the related description of FIG. 5 or FIG. 6 for the specific process, and will not be described in detail here.
无论采用哪种方式建立SSL连接,终端设备与安全设备之间均通过SSL连接建立了加密通信通道。因此,终端设备与安全设备通过该加密通信通道进行报文传输的安全性较高。No matter which method is used to establish the SSL connection, an encrypted communication channel is established between the terminal device and the security device through the SSL connection. Therefore, the security of message transmission between the terminal device and the security device through the encrypted communication channel is relatively high.
步骤702,终端设备向安全设备发送登录请求。Step 702, the terminal device sends a login request to the security device.
步骤703,安全设备向登录认证设备转发登录请求。Step 703, the security device forwards the login request to the login authentication device.
步骤704,登录认证设备向安全设备发送该终端设备的认证结果。Step 704, the login authentication device sends the authentication result of the terminal device to the security device.
步骤705,安全设备向终端设备转发认证结果。Step 705, the security device forwards the authentication result to the terminal device.
其中,步骤702至步骤705可参照前文中服务器认证的相关内容,此处不再赘述。Wherein, from step 702 to step 705, reference may be made to the related content of server authentication in the foregoing, and details are not repeated here.
需要说明的是,若终端设备无需与安全设备建立SSL连接,终端设备可以通过本地认证、服务器认证、证书认证或其他登录认证的方式进行登录认证。终端设备登录认证的步骤可参照前文中登录认证的方式的相关内容,此处不再赘述。It should be noted that if the terminal device does not need to establish an SSL connection with the security device, the terminal device can perform login authentication through local authentication, server authentication, certificate authentication or other login authentication methods. For the steps of terminal device login authentication, please refer to the relevant content of the login authentication method above, and will not repeat them here.
终端设备成功登录后,执行步骤706。After the terminal device successfully logs in, step 706 is executed.
步骤706,终端设备向外部网络的服务器发送第二报文。Step 706, the terminal device sends the second packet to the server on the external network.
其中,该第二报文携带终端设备对应的CSB检测功能信息,第二报文用于请求获取外部网络的服务器提供的资源。Wherein, the second message carries the CSB detection function information corresponding to the terminal device, and the second message is used to request to acquire resources provided by the server of the external network.
步骤707,安全设备截获到第二报文后,获取终端设备对应的CSB检测功能信息。Step 707: After the security device intercepts the second message, it obtains the CSB detection function information corresponding to the terminal device.
步骤708,安全设备向外部网络的服务器转发第二报文。Step 708, the security device forwards the second packet to the server on the external network.
步骤709,响应于该第二报文,外部网络的服务器向终端设备发送第一报文。Step 709, in response to the second packet, the server of the external network sends the first packet to the terminal device.
需要说明的是,步骤706至步骤709可参照前文中步骤200和步骤201的相关内容,此处不再赘述。It should be noted that, for steps 706 to 709, reference may be made to the related content of steps 200 and 201 above, which will not be repeated here.
步骤710,安全设备截获到第一报文后,确定第一报文对应的待执行的CSB检测功能。Step 710: After the security device intercepts the first message, it determines the CSB detection function to be executed corresponding to the first message.
步骤711,安全设备确定终端设备具有的CSB检测功能。Step 711, the security device determines the CSB detection function of the terminal device.
响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的全部功能,执行步骤712和步骤713;响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的部分功能,执行步骤714至步骤716;响应于终端设备不具有第一CSB检测功能,执行步骤717和步骤718。In response to the terminal device having the first CSB detection function, the first CSB detection function is all the functions in the CSB detection functions to be executed corresponding to the first message, and step 712 and step 713 are performed; in response to the terminal device having the first CSB detection function function, the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, perform steps 714 to 716; in response to the terminal device not having the first CSB detection function, perform steps 717 and 718 .
步骤712,响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的全部功能,安全设备向终端设备发送第一报文。Step 712: In response to the fact that the terminal device has a first CSB detection function, and the first CSB detection function is all the CSB detection functions to be executed corresponding to the first message, the security device sends the first message to the terminal device.
步骤713,终端设备对第一报文执行第一CSB检测功能。Step 713, the terminal device performs a first CSB detection function on the first packet.
步骤714,响应于终端设备具有第一CSB检测功能,第一CSB检测功能为第一报文对应的待执行的CSB检测功能中的部分功能,安全设备对第一报文执行第二CSB检测功能,第二CSB检测功能是第一报文对应的待执行的CSB检测功能中除第一CSB检测功能之外的功能。Step 714, in response to the fact that the terminal device has a first CSB detection function, the first CSB detection function is part of the CSB detection functions to be executed corresponding to the first message, and the security device performs a second CSB detection function on the first message , the second CSB detection function is a function other than the first CSB detection function among the to-be-executed CSB detection functions corresponding to the first message.
步骤715,响应于安全设备对第一报文执行第二CSB检测功能的检测结果为安全,安全设备向终端设备发送第一报文。Step 715: In response to the detection result of the security device performing the second CSB detection function on the first message being safe, the security device sends the first message to the terminal device.
步骤716,终端设备对第一报文执行第一CSB检测功能。Step 716, the terminal device performs a first CSB detection function on the first packet.
步骤717,响应于终端设备不具有第一CSB检测功能,安全设备对第一报文执行全部的待执行的CSB检测功能。Step 717: In response to the fact that the terminal device does not have the first CSB detection function, the security device performs all CSB detection functions to be performed on the first packet.
步骤718,响应于安全设备对第一报文执行全部的待执行的CSB检测功能的检测结果为安全,安全设备向终端设备发送第一报文。Step 718: In response to the fact that the security device performs all the CSB detection functions to be performed on the first message and the detection result is safe, the security device sends the first message to the terminal device.
步骤710至步骤718与前文中步骤414至步骤422相关内容原理相同,此处不再赘述。The principles of steps 710 to 718 are the same as those of steps 414 to 422 above, and will not be repeated here.
图8是本申请实施例提供的一种报文处理装置的结构示意图,该装置应用于安全设备,该安全设备为上述图2-7所示的安全设备。基于图8所示的如下多个模块,该图8所示的报文处理装置能够执行安全设备所执行的全部或部分操作。例如,具有图8所示结构的报文处理装置实现上述各实施例描述的方案中安全设备的功能。可选地,该报文处理装置是图2-7相关实施例 中描述的安全设备的功能,能够省略对第一报文执行第一CSB检测功能,降低执行CSB检测功能时的设备资源占用,从而降低执行CSB检测功能对性能的要求。应理解到,该装置可以包括比所示模块更多的附加模块或者省略其中所示的一部分模块,本申请实施例对此并不进行限制。如图8所示,该装置包括:FIG. 8 is a schematic structural diagram of a message processing device provided by an embodiment of the present application. The device is applied to a security device, and the security device is the security device shown in FIGS. 2-7 above. Based on the following multiple modules shown in FIG. 8 , the packet processing apparatus shown in FIG. 8 can perform all or part of the operations performed by the security device. For example, the message processing device with the structure shown in FIG. 8 implements the functions of the security device in the solutions described in the above embodiments. Optionally, the message processing device is a function of the security device described in the related embodiments of FIG. 2-7, which can omit performing the first CSB detection function on the first message, and reduce the equipment resource occupation when performing the CSB detection function. In this way, performance requirements for performing the CSB detection function are reduced. It should be understood that the device may include more additional modules than those shown or omit some of the modules shown therein, which is not limited in this embodiment of the present application. As shown in Figure 8, the device includes:
获取模块801,用于截获外部网络向内部网络发送的第一报文,第一报文用于承载外部网络的服务器根据内部网络的终端设备的请求提供的资源;The acquisition module 801 is configured to intercept a first message sent from the external network to the internal network, where the first message is used to carry resources provided by the server of the external network according to the request of the terminal device of the internal network;
确定模块802,用于确定第一报文对应的待执行的CSB检测功能;A determining module 802, configured to determine the CSB detection function to be executed corresponding to the first message;
处理模块803,用于响应于终端设备具有第一CSB检测功能,向终端设备转发第一报文之前,省略对第一报文执行第一CSB检测功能,其中,第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的全部功能或部分功能。The processing module 803 is configured to omit performing the first CSB detection function on the first message before forwarding the first message to the terminal device in response to the terminal device having the first CSB detection function, wherein the first CSB detection function is the first All or part of the CSB detection functions to be executed corresponding to the message.
在一种可能的实现方式中,第一CSB检测功能是第一报文对应的待执行的CSB检测功能中的部分功能,处理模块803,还用于对第一报文执行第二CSB检测功能,第二CSB检测功能是第一报文对应的待执行的CSB检测功能中除第一CSB检测功能之外的功能。In a possible implementation, the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, and the processing module 803 is also used to perform the second CSB detection function on the first message , the second CSB detection function is a function other than the first CSB detection function among the to-be-executed CSB detection functions corresponding to the first message.
在一种可能的实现方式中,获取模块801,还用于截获终端设备发送的第二报文,第二报文用于请求获取外部网络的服务器提供的资源;基于第二报文,获取终端设备具有的CSB检测功能;确定模块802,还用于根据终端设备具有的CSB检测功能以及第一报文对应的待执行的CSB检测功能,确定终端设备具有第一CSB检测功能。In a possible implementation, the obtaining module 801 is also configured to intercept a second message sent by the terminal device, the second message is used to request to obtain the resource provided by the server of the external network; based on the second message, obtain the terminal The CSB detection function of the device; the determination module 802 is further configured to determine that the terminal device has the first CSB detection function according to the CSB detection function of the terminal device and the CSB detection function to be executed corresponding to the first message.
在一种可能的实现方式中,第二报文包括终端设备的身份关键字,获取模块801,用于通过解析第二报文获取第二报文包括的终端设备的身份关键字;根据终端设备的身份关键字,获取终端设备具有的CSB检测功能。In a possible implementation, the second message includes the identity keyword of the terminal device, and the obtaining module 801 is configured to obtain the identity keyword of the terminal device included in the second message by parsing the second message; according to the terminal device The identity keyword to obtain the CSB detection function of the terminal device.
在一种可能的实现方式中,获取模块801,用于向能力管理设备发送查询请求,能力管理设备存储有终端设备对应的CSB检测功能信息,其中,查询请求中携带终端设备的身份关键字,终端设备对应的CSB检测功能信息用于指示终端设备具有的CSB检测功能;接收能力管理设备响应于查询请求发送的终端设备对应的CSB检测功能信息;根据CSB检测功能信息,确定终端设备具有的CSB检测功能。In a possible implementation manner, the obtaining module 801 is configured to send a query request to the capability management device, and the capability management device stores CSB detection function information corresponding to the terminal device, where the query request carries the identity keyword of the terminal device, The CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function that the terminal device has; the reception capability management device sends the CSB detection function information corresponding to the terminal device in response to the query request; according to the CSB detection function information, determine the CSB detection function that the terminal device has. detection function.
在一种可能的实现方式中,获取模块801,用于基于HTTP、HTTPS或API,向能力管理设备发送查询请求。In a possible implementation manner, the obtaining module 801 is configured to send a query request to the capability management device based on HTTP, HTTPS or API.
在一种可能的实现方式中,获取模块801,用于根据终端设备的身份关键字,查询安全设备存储的身份关键字和CSB检测功能的对应关系,获取终端设备的身份关键字对应的CSB检测功能。In a possible implementation, the obtaining module 801 is configured to query the correspondence between the identity keyword stored in the security device and the CSB detection function according to the identity keyword of the terminal device, and obtain the CSB detection function corresponding to the identity keyword of the terminal device. Function.
在一种可能的实现方式中,身份关键字包括随机ID、IP地址或本地证书中的用户信息中的至少一种。In a possible implementation manner, the identity key includes at least one of a random ID, an IP address, or user information in a local certificate.
在一种可能的实现方式中,第二报文携带终端设备对应的CSB检测功能信息,获取模块801,用于通过解析第二报文获取第二报文携带的终端设备对应的CSB检测功能信息;根据第二报文携带的终端设备对应的CSB检测功能信息,确定终端设备具有的CSB检测功能。In a possible implementation manner, the second message carries the CSB detection function information corresponding to the terminal device, and the obtaining module 801 is configured to obtain the CSB detection function information corresponding to the terminal device carried in the second message by parsing the second message ; Determine the CSB detection function of the terminal device according to the CSB detection function information corresponding to the terminal device carried in the second message.
在一种可能的实现方式中,待执行的CSB检测功能包括IPS检测功能、AV检测功能、URL检测功能、AIE检测功能或SA检测功能中的至少一种。In a possible implementation manner, the CSB detection function to be executed includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
在一种可能的实现方式中,终端设备为完成登录认证的设备,登录认证的方式包括本地认证、服务器认证或证书认证中的任一种。In a possible implementation manner, the terminal device is a device that completes login authentication, and the login authentication manner includes any one of local authentication, server authentication, or certificate authentication.
图9是本申请实施例提供的一种报文处理装置的结构示意图,该装置应用于终端设备,该终端设备为上述图2-7所示的终端设备。基于图9所示的如下多个模块,该图9所示的报文处理装置能够执行终端设备所执行的全部或部分操作。例如,具有图9所示结构的报文处理装置实现上述各实施例描述的方案中终端设备的功能。可选地,该报文处理装置是图2-7相关实施例中描述的终端设备的功能,能够对接收的第一报文执行第一CSB检测功能。应理解到,该装置可以包括比所示模块更多的附加模块或者省略其中所示的一部分模块,本申请实施例对此并不进行限制。如图9所示,该装置包括:FIG. 9 is a schematic structural diagram of a message processing apparatus provided by an embodiment of the present application. The apparatus is applied to a terminal device, and the terminal device is the terminal device shown in FIGS. 2-7 above. Based on the following multiple modules shown in FIG. 9 , the packet processing apparatus shown in FIG. 9 can perform all or part of the operations performed by the terminal device. For example, the packet processing apparatus with the structure shown in FIG. 9 implements the functions of the terminal equipment in the solutions described in the above embodiments. Optionally, the packet processing apparatus is a function of the terminal device described in the related embodiments in FIGS. 2-7, and can perform a first CSB detection function on the received first packet. It should be understood that the device may include more additional modules than those shown or omit some of the modules shown therein, which is not limited in this embodiment of the present application. As shown in Figure 9, the device includes:
供给模块901,用于向其他设备提供终端设备对应的CSB检测功能信息,终端设备对应的CSB检测功能信息用于指示终端设备具有的CSB检测功能;The supply module 901 is configured to provide other devices with CSB detection function information corresponding to the terminal device, where the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function that the terminal device has;
接收模块902,用于接收安全设备发送的第一报文,其中,安全设备部署于外部网络和内部网络的边界,第一报文用于承载外部网络的服务器根据终端设备的请求提供的资源,第一报文为安全设备未执行第一CSB检测功能的报文,终端设备具有的CSB检测功能中包括该第一CSB检测功能;The receiving module 902 is configured to receive a first message sent by the security device, where the security device is deployed on the boundary between the external network and the internal network, and the first message is used to carry the resources provided by the server of the external network according to the request of the terminal device, The first message is a message for which the security device does not perform the first CSB detection function, and the CSB detection function of the terminal device includes the first CSB detection function;
处理模块903,用于对第一报文执行第一CSB检测功能。The processing module 903 is configured to perform a first CSB detection function on the first packet.
在一种可能的实现方式中,供给模块901,用于向能力管理设备发送第三报文,第三报文携带终端设备对应的CSB检测功能信息,能力管理设备用于存储终端设备对应的CSB检测功能信息。In a possible implementation manner, the supply module 901 is configured to send a third message to the capability management device, the third message carries the CSB detection function information corresponding to the terminal device, and the capability management device is used to store the CSB corresponding to the terminal device Check feature information.
在一种可能的实现方式中,供给模块901,用于向安全设备发送第三报文,第三报文携带终端设备对应的CSB检测功能信息,安全设备用于存储终端设备对应的CSB检测功能信息。In a possible implementation manner, the supply module 901 is configured to send a third message to the security device, the third message carries the CSB detection function information corresponding to the terminal device, and the security device is used to store the CSB detection function corresponding to the terminal device information.
在一种可能的实现方式中,供给模块901,用于向外部网络的服务器发送第二报文,第二报文用于请求获取外部网络的服务器提供的资源,其中第二报文携带终端设备对应的CSB检测功能信息。In a possible implementation manner, the provisioning module 901 is configured to send a second message to a server on the external network, where the second message is used to request to acquire resources provided by the server on the external network, where the second message carries a terminal device Corresponding CSB detection function information.
在一种可能的实现方式中,第二报文为基于HTTPS传输的报文,终端设备对应的CSB检测功能信息携带在第二报文的Cookie,或URL参数,或HTTPS首部字段,或HTTPS自定义字段中。In a possible implementation, the second message is a message transmitted based on HTTPS, and the CSB detection function information corresponding to the terminal device is carried in the Cookie of the second message, or the URL parameter, or the HTTPS header field, or the HTTPS auto in the definition field.
在一种可能的实现方式中,第二报文为基于HTTP传输的报文,终端设备对应的CSB检测功能信息携带在第二报文的Cookie,或HTTP首部字段,或HTTP自定义字段中。In a possible implementation manner, the second message is a message based on HTTP transmission, and the CSB detection function information corresponding to the terminal device is carried in the Cookie, or the HTTP header field, or the HTTP custom field of the second message.
在一种可能的实现方式中,第二报文为基于FTP传输的报文,终端设备对应的CSB检测功能信息携带在第二报文的FTP冗余字段或FTP自定义字段中。In a possible implementation manner, the second message is a message transmitted based on FTP, and the CSB detection function information corresponding to the terminal device is carried in an FTP redundant field or an FTP custom field of the second message.
在一种可能的实现方式中,该装置还包括:发送模块,用于向外部网络的服务器发送第二报文,第二报文用于请求获取外部网络的服务器提供的资源,其中,第二报文包括终端设备的身份关键字,身份关键字用于获取终端设备具有的CSB检测功能。In a possible implementation manner, the device further includes: a sending module, configured to send a second message to a server on an external network, where the second message is used to request resources provided by the server on the external network, where the second The message includes an identity keyword of the terminal device, and the identity keyword is used to obtain the CSB detection function of the terminal device.
在一种可能的实现方式中,响应于其他设备为能力管理设备,接收模块902,还用于接收能力管理设备发送的终端设备的随机ID,终端设备的随机ID用于作为终端设备的身份关键字;或响应于其他设备为安全设备,接收模块902,还用于接收安全设备发送的终端设备的随机ID,终端设备的随机ID用于作为终端设备的身份关键字。In a possible implementation, in response to the fact that the other device is a capability management device, the receiving module 902 is also configured to receive the random ID of the terminal device sent by the capability management device, and the random ID of the terminal device is used as the identity key of the terminal device or in response to other devices being security devices, the receiving module 902 is also configured to receive the random ID of the terminal device sent by the security device, and the random ID of the terminal device is used as an identity key of the terminal device.
在一种可能的实现方式中,第三报文还包括终端设备的IP地址,终端设备的IP地址用于作为终端设备的身份关键字。In a possible implementation manner, the third packet further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device.
在一种可能的实现方式中,第三报文还包括终端设备的本地证书,终端设备的本地证书 中的用户信息用于作为终端设备的身份关键字。In a possible implementation manner, the third message further includes a local certificate of the terminal device, and the user information in the local certificate of the terminal device is used as an identity key of the terminal device.
在一种可能的实现方式中,终端设备具有的CSB检测功能包括IPS检测功能、AV检测功能、URL检测功能、AIE检测功能或SA检测功能中的至少一种。In a possible implementation manner, the CSB detection function of the terminal device includes at least one of an IPS detection function, an AV detection function, a URL detection function, an AIE detection function, or an SA detection function.
在一种可能的实现方式中,该装置还包括:请求模块,用于向安全设备发送登录请求,登录请求包括用户信息;接收安全设备基于用户信息发送的认证结果,认证结果用于指示终端设备是否成功登录;响应于终端设备成功登录,供给模块901执行向其他设备提供终端设备对应的CSB检测功能信息的操作。In a possible implementation manner, the apparatus further includes: a request module, configured to send a login request to the security device, where the login request includes user information; receive an authentication result sent by the security device based on the user information, and the authentication result is used to instruct the terminal device Whether the login is successful; in response to the successful login of the terminal device, the supply module 901 executes the operation of providing the CSB detection function information corresponding to the terminal device to other devices.
在一种可能的实现方式中,该装置还包括:请求模块,用于向登录认证设备发送登录请求,登录请求包括用户信息;接收登录认证设备基于用户信息发送的认证结果,认证结果用于指示终端设备是否成功登录;响应于终端设备成功登录,供给模块901执行向其他设备提供终端设备对应的CSB检测功能信息的操作。In a possible implementation manner, the apparatus further includes: a request module, configured to send a login request to the login authentication device, where the login request includes user information; receive an authentication result sent by the login authentication device based on the user information, and the authentication result is used to indicate Whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the supply module 901 performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
在一种可能的实现方式中,该装置还包括:请求模块,用于向登录认证设备发送登录请求,登录请求包括终端设备的本地证书;接收登录认证设备基于终端设备的本地证书发送的认证结果,认证结果用于指示终端设备是否成功登录;响应于终端设备成功登录,供给模块901执行向其他设备提供终端设备对应的CSB检测功能信息的操作。In a possible implementation manner, the apparatus further includes: a request module, configured to send a login request to the login authentication device, where the login request includes the local certificate of the terminal device; and receive the authentication result sent by the login authentication device based on the local certificate of the terminal device , the authentication result is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the supply module 901 performs an operation of providing other devices with CSB detection function information corresponding to the terminal device.
应理解的是,上述图8和图9提供的装置在实现其功能时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的装置与方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。It should be understood that, when the above-mentioned devices provided in Fig. 8 and Fig. 9 realize their functions, they are only illustrated by the division of the above-mentioned functional modules. In practical applications, the above-mentioned function allocation can be completed by different functional modules according to needs. , which divides the internal structure of the device into different functional modules to complete all or part of the functions described above. In addition, the device and the method embodiment provided by the above embodiment belong to the same idea, and the specific implementation process thereof is detailed in the method embodiment, and will not be repeated here.
参见图10,图10示出了本申请一个示例性实施例提供的报文处理设备2000的结构示意图。图10所示的报文处理设备2000可为安全设备或终端设备,用于执行上述图2-7所示的报文处理方法所涉及的操作。该报文处理设备2000例如是交换机、路由器等,该报文处理设备2000可以由一般性的总线体系结构来实现。Referring to FIG. 10 , FIG. 10 shows a schematic structural diagram of a packet processing device 2000 provided by an exemplary embodiment of the present application. The packet processing device 2000 shown in FIG. 10 may be a security device or a terminal device, and is configured to perform operations involved in the packet processing method shown in FIGS. 2-7 above. The packet processing device 2000 is, for example, a switch, a router, etc., and the packet processing device 2000 may be implemented by a general bus architecture.
如图10所示,报文处理设备2000包括至少一个处理器2001、存储器2003以及至少一个通信接口2004。As shown in FIG. 10 , the packet processing device 2000 includes at least one processor 2001 , a memory 2003 and at least one communication interface 2004 .
处理器2001例如是通用中央处理器(central processing unit,CPU)、数字信号处理器(digital signal processor,DSP)、网络处理器(network processer,NP)、图形处理器(graphics processing unit,GPU)、神经网络处理器(neural-network processing units,NPU)、数据处理单元(data processing unit,DPU)、微处理器或者一个或多个用于实现本申请方案的集成电路。例如,处理器2001包括专用集成电路(application-specific integrated circuit,ASIC),可编程逻辑器件(programmable logic device,PLD)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。PLD例如是复杂可编程逻辑器件(complex programmable logic device,CPLD)、现场可编程逻辑门阵列(field-programmable gate array,FPGA)、通用阵列逻辑(generic array logic,GAL)或其任意组合。其可以实现或执行结合本申请实施例公开内容所描述的各种逻辑方框、模块和电路。该处理器也可以是实现计算功能的组合,例如包括一个或多个微处理器组合,DSP和微处理器的组合等等。The processor 2001 is, for example, a general-purpose central processing unit (central processing unit, CPU), a digital signal processor (digital signal processor, DSP), a network processor (network processor, NP), a graphics processing unit (graphics processing unit, GPU), A neural network processor (neural-network processing units, NPU), a data processing unit (data processing unit, DPU), a microprocessor, or one or more integrated circuits for implementing the solution of this application. For example, the processor 2001 includes an application-specific integrated circuit (application-specific integrated circuit, ASIC), a programmable logic device (programmable logic device, PLD) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof. The PLD is, for example, a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a general array logic (generic array logic, GAL) or any combination thereof. It can realize or execute various logical blocks, modules and circuits described in conjunction with the disclosure of the embodiments of the present application. The processor may also be a combination for realizing computing functions, for example, a combination of one or more microprocessors, a combination of DSP and a microprocessor, and so on.
可选的,报文处理设备2000还包括总线。总线用于在报文处理设备2000的各组件之间 传送信息。总线可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。总线可以分为地址总线、数据总线、控制总线等。为便于表示,图10中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。Optionally, the packet processing device 2000 further includes a bus. The bus is used to transfer information between the various components of the message processing device 2000. The bus may be a peripheral component interconnect standard (PCI for short) bus or an extended industry standard architecture (EISA for short) bus or the like. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 10 , but it does not mean that there is only one bus or one type of bus.
存储器2003例如是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其它类型的静态存储设备,又如是随机存取存储器(random access memory,RAM)或者可存储信息和指令的其它类型的动态存储设备,又如是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其它光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其它磁存储设备,或者是能够用于携带或存储具有指令或数据结构形式的期望的程序指令并能够由计算机存取的任何其它介质,但不限于此。存储器2003例如是独立存在,并通过总线与处理器2001相连接。存储器2003也可以和处理器2001集成在一起。The memory 2003 is, for example, a read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions, or a random access memory (random access memory, RAM) or a storage device that can store information and instructions. Other types of dynamic storage devices, such as electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc Storage (including Compact Disc, Laser Disc, Optical Disc, Digital Versatile Disc, Blu-ray Disc, etc.), magnetic disk storage medium, or other magnetic storage device, or is capable of carrying or storing desired program instructions in the form of instructions or data structures and capable of Any other medium accessed by a computer, but not limited to. The memory 2003 exists independently, for example, and is connected to the processor 2001 via a bus. The memory 2003 can also be integrated with the processor 2001.
通信接口2004使用任何收发器一类的装置,用于与其它设备或通信网络通信,通信网络可以为以太网、无线接入网(RAN)或无线局域网(wireless local area network,WLAN)等。通信接口2004可以包括有线通信接口,还可以包括无线通信接口。具体的,通信接口2004可以为以太(ethernet)接口、快速以太(fast ethernet,FE)接口、千兆以太(gigabit ethernet,GE)接口,异步传输模式(asynchronous transfer mode,ATM)接口,无线局域网(wireless local area networks,WLAN)接口,蜂窝网络通信接口或其组合。以太网接口可以是光接口,电接口或其组合。在本申请实施例中,通信接口2004可以用于报文处理设备2000与其他设备进行通信。The communication interface 2004 uses any device such as a transceiver to communicate with other devices or a communication network. The communication network can be Ethernet, radio access network (RAN) or wireless local area network (wireless local area network, WLAN). The communication interface 2004 may include a wired communication interface, and may also include a wireless communication interface. Specifically, the communication interface 2004 can be an ethernet (ethernet) interface, a fast ethernet (fast ethernet, FE) interface, a gigabit ethernet (gigabit ethernet, GE) interface, an asynchronous transfer mode (asynchronous transfer mode, ATM) interface, a wireless local area network ( wireless local area networks, WLAN) interface, cellular network communication interface or a combination thereof. The Ethernet interface can be an optical interface, an electrical interface or a combination thereof. In this embodiment of the present application, the communication interface 2004 may be used for the packet processing device 2000 to communicate with other devices.
在具体实现中,作为一种实施例,处理器2001可以包括一个或多个CPU,如图10中所示的CPU0和CPU1。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。In a specific implementation, as an embodiment, the processor 2001 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 10 . Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
在具体实现中,作为一种实施例,报文处理设备2000可以包括多个处理器,如图10中所示的处理器2001和处理器2005。这些处理器中的每一个可以是一个单核处理器(single-CPU),也可以是一个多核处理器(multi-CPU)。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(如计算机程序指令)的处理核。In a specific implementation, as an embodiment, the packet processing device 2000 may include multiple processors, such as the processor 2001 and the processor 2005 shown in FIG. 10 . Each of these processors can be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data such as computer program instructions.
在具体实现中,作为一种实施例,报文处理设备2000还可以包括输出设备和输入设备。输出设备和处理器2001通信,可以以多种方式来显示信息。例如,输出设备可以是液晶显示器(liquid crystal display,LCD)、发光二级管(light emitting diode,LED)显示设备、阴极射线管(cathode ray tube,CRT)显示设备或投影仪(projector)等。输入设备和处理器2001通信,可以以多种方式接收用户的输入。例如,输入设备可以是鼠标、键盘、触摸屏设备或传感设备等。In a specific implementation, as an example, the packet processing device 2000 may further include an output device and an input device. Output devices communicate with processor 2001 and can display information in a variety of ways. For example, the output device may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a cathode ray tube (cathode ray tube, CRT) display device, or a projector (projector). The input device communicates with the processor 2001 and can receive user input in various ways. For example, the input device may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
在一些实施例中,存储器2003用于存储执行本申请方案的程序指令2010,处理器2001可以执行存储器2003中存储的程序指令2010。也即是,报文处理设备2000可以通过处理器2001以及存储器2003中的程序指令2010,来实现方法实施例提供的报文处理方法。程序指令2010中可以包括一个或多个软件模块。可选地,处理器2001自身也可以存储执行本申请 方案的程序代码或指令。In some embodiments, the memory 2003 is used to store program instructions 2010 for implementing the solution of the present application, and the processor 2001 can execute the program instructions 2010 stored in the memory 2003 . That is, the packet processing device 2000 can implement the packet processing method provided by the method embodiment through the processor 2001 and the program instructions 2010 in the memory 2003 . One or more software modules may be included in the program instructions 2010 . Optionally, the processor 2001 itself may also store program codes or instructions for executing the solutions of the present application.
在具体实施例中,本申请实施例的报文处理设备2000可对应于上述各个报文处理方法实施例中的安全设备,报文处理设备2000中的处理器2001读取存储器2003中的指令,使图10所示的报文处理设备2000能够执行安全设备所执行的全部或部分操作。In a specific embodiment, the message processing device 2000 in the embodiment of the present application may correspond to the security device in the above embodiments of the message processing method, and the processor 2001 in the message processing device 2000 reads the instructions in the memory 2003, This enables the message processing device 2000 shown in FIG. 10 to perform all or part of the operations performed by the security device.
在具体实施例中,本申请实施例的报文处理设备2000可对应于上述各个报文处理方法实施例中的终端设备,报文处理设备2000中的处理器2001读取存储器2003中的指令,使图10所示的报文处理设备2000能够执行终端设备所执行的全部或部分操作。In a specific embodiment, the message processing device 2000 in the embodiment of the present application may correspond to the terminal device in each of the foregoing message processing method embodiments, and the processor 2001 in the message processing device 2000 reads the instructions in the memory 2003, The packet processing device 2000 shown in FIG. 10 is enabled to perform all or part of the operations performed by the terminal device.
报文处理设备2000还可以对应于上述图8-9所示的报文处理装置,报文处理装置中的每个功能模块采用报文处理设备2000的软件实现。换句话说,报文处理装置中包括的功能模块为报文处理设备2000的处理器2001读取存储器2003中存储的程序指令2010后生成的。The packet processing device 2000 may also correspond to the packet processing device shown in FIGS. In other words, the functional modules included in the message processing apparatus are generated after the processor 2001 of the message processing device 2000 reads the program instructions 2010 stored in the memory 2003 .
其中,图2-7所示的报文处理方法的各步骤通过报文处理设备2000的处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤,为避免重复,这里不再详细描述。Wherein, each step of the message processing method shown in FIGS. 2-7 is completed by an integrated logic circuit of hardware in a processor of the message processing device 2000 or an instruction in the form of software. The steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor. The software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register. The storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, no detailed description is given here.
参见图11,图11示出了本申请另一个示例性实施例提供的报文处理设备2100的结构示意图。图11所示的报文处理设备2100可为安全设备或终端设备,用于执行上述图2-7所示的报文处理方法所涉及的全部或部分操作。该报文处理设备2100例如是交换机、路由器等,该报文处理设备2100可以由一般性的总线体系结构来实现。Referring to FIG. 11 , FIG. 11 shows a schematic structural diagram of a packet processing device 2100 provided in another exemplary embodiment of the present application. The packet processing device 2100 shown in FIG. 11 may be a security device or a terminal device, and is configured to perform all or part of the operations involved in the packet processing method shown in FIGS. 2-7 above. The packet processing device 2100 is, for example, a switch, a router, etc., and the packet processing device 2100 may be implemented by a general bus architecture.
如图11所示,报文处理设备2100包括:主控板2110和接口板2130。As shown in FIG. 11 , the packet processing device 2100 includes: a main control board 2110 and an interface board 2130 .
主控板也称为主处理单元(main processing unit,MPU)或路由处理卡(route processor card),主控板2110用于对报文处理设备2100中各个组件的控制和管理,包括路由计算、设备管理、设备维护、协议处理功能。主控板2110包括:中央处理器2111和存储器2112。The main control board is also called a main processing unit (main processing unit, MPU) or a route processing card (route processor card). Device management, device maintenance, protocol processing functions. The main control board 2110 includes: a central processing unit 2111 and a memory 2112 .
接口板2130也称为线路接口单元卡(line processing unit,LPU)、线卡(line card)或业务板。接口板2130用于提供各种业务接口并实现数据包的转发。业务接口包括而不限于以太网接口、POS(packet over SONET/SDH)接口等,以太网接口例如是灵活以太网业务接口(flexible ethernet clients,FlexE Clients)。接口板2130包括:中央处理器2131网络处理器2132、转发表项存储器2134和物理接口卡(physical interface card,PIC)2133。The interface board 2130 is also called a line interface unit card (line processing unit, LPU), a line card (line card), or a service board. The interface board 2130 is used to provide various service interfaces and implement data packet forwarding. The service interface includes but not limited to Ethernet interface, POS (packet over SONET/SDH) interface, etc., and the Ethernet interface is, for example, flexible Ethernet service interface (flexible ethernet clients, FlexE Clients). The interface board 2130 includes: a central processing unit 2131 , a network processor 2132 , a forwarding entry storage 2134 and a physical interface card (physical interface card, PIC) 2133 .
接口板2130上的中央处理器2131用于对接口板2130进行控制管理并与主控板2110上的中央处理器2111进行通信。The central processor 2131 on the interface board 2130 is used to control and manage the interface board 2130 and communicate with the central processor 2111 on the main control board 2110 .
网络处理器2132用于实现报文的转发处理。网络处理器2132的形态可以是转发芯片。转发芯片可以是网络处理器(network processor,NP)。在一些实施例中,转发芯片可以通过专用集成电路(application-specific integrated circuit,ASIC)或现场可编程门阵列(field programmable gate array,FPGA)实现。具体而言,网络处理器2132用于基于转发表项存储器2134保存的转发表转发接收到的报文,如果报文的目的地址为报文处理设备2100的地址,则将该报文上送至CPU(如中央处理器2131)处理;如果报文的目的地址不是报文处理设备2100的地址,则根据该目的地址从转发表中查找到该目的地址对应的下一跳和出接口,将该报文转发到该目的地址对应的出接口。其中,上行报文的处理可以包括:报文入接口的处理, 转发表查找;下行报文的处理可以包括:转发表查找等等。在一些实施例中,中央处理器也可执行转发芯片的功能,比如基于通用CPU实现软件转发,从而接口板中不需要转发芯片。The network processor 2132 is configured to implement message forwarding processing. The form of the network processor 2132 may be a forwarding chip. The forwarding chip may be a network processor (network processor, NP). In some embodiments, the forwarding chip may be implemented by an application-specific integrated circuit (application-specific integrated circuit, ASIC) or a field programmable gate array (field programmable gate array, FPGA). Specifically, the network processor 2132 is used to forward the received message based on the forwarding table stored in the forwarding table item storage 2134, and if the destination address of the message is the address of the message processing device 2100, then send the message to CPU (such as central processing unit 2131) processing; If the destination address of message is not the address of message processing device 2100, then according to this destination address, find out the next hop and outgoing interface corresponding to this destination address from the forwarding table, and send the The packet is forwarded to the outbound interface corresponding to the destination address. Wherein, the processing of the uplink message may include: processing of the inbound interface of the message, forwarding table search; the processing of the downlink message may include: forwarding table search and so on. In some embodiments, the central processing unit can also perform the function of the forwarding chip, such as implementing software forwarding based on a general-purpose CPU, so that no forwarding chip is needed in the interface board.
物理接口卡2133用于实现物理层的对接功能,原始的流量由此进入接口板2130,以及处理后的报文从该物理接口卡2133发出。物理接口卡2133也称为子卡,可安装在接口板2130上,负责将光电信号转换为报文并对报文进行合法性检查后转发给网络处理器2132处理。在一些实施例中,中央处理器2131也可执行网络处理器2132的功能,比如基于通用CPU实现软件转发,从而物理接口卡2133中不需要网络处理器2132。The physical interface card 2133 is used to implement the interconnection function of the physical layer, through which the original traffic enters the interface board 2130 , and the processed packets are sent out from the physical interface card 2133 . The physical interface card 2133 is also called a daughter card, which can be installed on the interface board 2130, and is responsible for converting the photoelectric signal into a message, checking the validity of the message and forwarding it to the network processor 2132 for processing. In some embodiments, the central processor 2131 can also execute the functions of the network processor 2132 , such as implementing software forwarding based on a general-purpose CPU, so that the physical interface card 2133 does not need the network processor 2132 .
示例性地,报文处理设备2100包括多个接口板,例如报文处理设备2100还包括接口板2140,接口板2140包括:中央处理器2141、网络处理器2142、转发表项存储器2144和物理接口卡2143。接口板2140中各部件的功能和实现方式与接口板2130相同或相似,在此不再赘述。Exemplarily, the packet processing device 2100 includes a plurality of interface boards, for example, the packet processing device 2100 further includes an interface board 2140, and the interface board 2140 includes: a central processing unit 2141, a network processor 2142, a forwarding entry storage 2144 and a physical interface Card 2143. The functions and implementation methods of the components in the interface board 2140 are the same as or similar to those of the interface board 2130 , and will not be repeated here.
示例性地,报文处理设备2100还包括交换网板2120。交换网板2120也可以称为交换网板单元(switch fabric unit,SFU)。在报文处理设备有多个接口板的情况下,交换网板2120用于完成各接口板之间的数据交换。例如,接口板2130和接口板2140之间可以通过交换网板2120通信。Exemplarily, the packet processing device 2100 further includes a switching fabric unit 2120 . The SFU 2120 may also be called a switch fabric unit (switch fabric unit, SFU). In the case that the packet processing device has multiple interface boards, the switching fabric board 2120 is used to complete the data exchange between the interface boards. For example, the interface board 2130 and the interface board 2140 may communicate through the SFU 2120 .
主控板2110和接口板耦合。例如。主控板2110、接口板2130和接口板2140,以及交换网板2120之间通过系统总线与系统背板相连实现互通。在一种可能的实现方式中,主控板2110和接口板2130及接口板2140之间建立进程间通信协议(inter-process communication,IPC)通道,主控板2110和接口板2130及接口板2140之间通过IPC通道进行通信。The main control board 2110 is coupled to the interface board. E.g. The main control board 2110, the interface board 2130, the interface board 2140, and the switching fabric board 2120 are connected to the system backplane through the system bus to realize intercommunication. In a possible implementation manner, an inter-process communication protocol (inter-process communication, IPC) channel is established between the main control board 2110, the interface board 2130, and the interface board 2140, and the main control board 2110, the interface board 2130, and the interface board 2140 Communicate through IPC channels.
在逻辑上,报文处理设备2100包括控制面和转发面,控制面包括主控板2110和中央处理器2111,转发面包括执行转发的各个组件,比如转发表项存储器2134、物理接口卡2133和网络处理器2132。控制面执行路由器、生成转发表、处理信令和协议报文、配置与维护网络设备的状态等功能,控制面将生成的转发表下发给转发面,在转发面,网络处理器2132基于控制面下发的转发表对物理接口卡2133收到的报文查表转发。控制面下发的转发表可以保存在转发表项存储器2134中。在有些实施例中,控制面和转发面可以完全分离,不在同一网络设备上。Logically, the packet processing device 2100 includes a control plane and a forwarding plane. The control plane includes a main control board 2110 and a central processing unit 2111. The forwarding plane includes various components for performing forwarding, such as a forwarding entry storage 2134, a physical interface card 2133 and network processor 2132 . The control plane executes routers, generates forwarding tables, processes signaling and protocol packets, configures and maintains the status of network devices, and other functions. The control plane sends the generated forwarding tables to the forwarding plane. On the forwarding plane, the network processor 2132 controls The forwarding table issued by the above checks the table and forwards the packets received by the physical interface card 2133. The forwarding table issued by the control plane may be stored in the forwarding table item storage 2134 . In some embodiments, the control plane and the forwarding plane can be completely separated and not on the same network device.
值得说明的是,主控板可能有一块或多块,有多块的时候可以包括主用主控板和备用主控板。接口板可能有一块或多块,报文处理设备的数据处理能力越强,提供的接口板越多。接口板上的物理接口卡也可以有一块或多块。交换网板可能没有,也可能有一块或多块,有多块的时候可以共同实现负荷分担冗余备份。在集中式转发架构下,报文处理设备可以不需要交换网板,接口板承担整个系统的业务数据的处理功能。在分布式转发架构下,报文处理设备可以有至少一块交换网板,通过交换网板实现多块接口板之间的数据交换,提供大容量的数据交换和处理能力。所以,分布式架构的报文处理设备的数据接入和处理能力要大于集中式架构的报文处理设备。示例性地,报文处理设备的形态也可以是只有一块板卡,即没有交换网板,接口板和主控板的功能集成在该一块板卡上,此时接口板上的中央处理器和主控板上的中央处理器在该一块板卡上可以合并为一个中央处理器,执行两者叠加后的功能,这种形态报文处理设备的数据交换和处理能力较低(例如,低端交换机或路由器等网络设备)。具体采用哪种架构,取决于具体的组网部署场景,此处不做任何限定。It is worth noting that there may be one or more main control boards, and when there are multiple main control boards, it may include the main main control board and the standby main control board. There may be one or more interface boards. The stronger the data processing capability of the packet processing device, the more interface boards it provides. There may also be one or more physical interface cards on the interface board. There may be no SFU, or there may be one or more SFUs. When there are multiple SFUs, they can jointly implement load sharing and redundant backup. Under the centralized forwarding architecture, the packet processing device does not need a switching network board, and the interface board undertakes the processing function of the service data of the entire system. Under the distributed forwarding architecture, the message processing device can have at least one SFU, and the data exchange between multiple interface boards can be realized through the SFU, providing large-capacity data exchange and processing capabilities. Therefore, the data access and processing capability of the packet processing device with distributed architecture is greater than that of the packet processing device with centralized architecture. Exemplarily, the form of the packet processing device may also be that there is only one board, that is, there is no switching fabric board, and the functions of the interface board and the main control board are integrated on this board. At this time, the CPU and the The central processing unit on the main control board can be combined into one central processing unit on the board to perform the superimposed functions of the two. The data exchange and processing capabilities of this form of message processing equipment are low (for example, low-end network devices such as switches or routers). Which architecture to use depends on the specific networking deployment scenario, and there is no limitation here.
在具体实施例中,报文处理设备2100对应于上述图8所示的应用于安全设备的报文处理 装置。在一些实施例中,图8所示的报文处理装置中的获取模块801相当于报文处理设备2100中的物理接口卡2133;确定模块802和处理模块803相当于报文处理设备2100中的中央处理器2111或网络处理器2132。In a specific embodiment, the packet processing device 2100 corresponds to the packet processing apparatus applied to a security device shown in FIG. 8 above. In some embodiments, the acquiring module 801 in the packet processing apparatus shown in FIG. 8 is equivalent to the physical interface card 2133 in the packet processing device 2100; the determining module 802 and the processing module 803 are equivalent to the CPU 2111 or network processor 2132.
在一些实施例中,报文处理设备2100还对应于上述图9所示的应用于终端设备的报文处理装置。在一些实施例中,图9所示的报文处理装置中的供给模块901相当于报文处理设备2100中的物理接口卡2133;接收模块902和处理模块903相当于报文处理设备2100中的中央处理器2111或网络处理器2132。In some embodiments, the packet processing device 2100 also corresponds to the packet processing apparatus applied to the terminal device shown in FIG. 9 above. In some embodiments, the supply module 901 in the message processing apparatus shown in FIG. 9 is equivalent to the physical interface card 2133 in the message processing device 2100; the receiving module 902 and the processing module 903 are equivalent to the CPU 2111 or network processor 2132.
基于上述图10及图11所示的报文处理设备,本申请实施例还提供了一种报文处理系统,该系统包括:安全设备和终端设备。可选的,安全设备为图10所示的报文处理设备2000或图11所示的报文处理设备2100,终端设备为图10所示的报文处理设备2000或图11所示的报文处理设备2100。Based on the message processing device shown in FIG. 10 and FIG. 11 , the embodiment of the present application further provides a message processing system, which includes: a security device and a terminal device. Optionally, the security device is the message processing device 2000 shown in FIG. 10 or the message processing device 2100 shown in FIG. 11, and the terminal device is the message processing device 2000 shown in FIG. processing device 2100 .
安全设备和终端设备所执行的报文处理方法可参见上述图2-7所示实施例的相关描述,此处不再加以赘述。For the message processing methods performed by the security device and the terminal device, reference may be made to the relevant descriptions of the embodiments shown in FIGS. 2-7 above, and details are not repeated here.
本申请实施例还提供了一种通信装置,该装置包括:收发器、存储器和处理器。其中,该收发器、该存储器和该处理器通过内部连接通路互相通信,该存储器用于存储指令,该处理器用于执行该存储器存储的指令,以控制收发器接收信号,并控制收发器发送信号,并且当该处理器执行该存储器存储的指令时,使得该处理器执行安全设备所需执行的报文处理方法。The embodiment of the present application also provides a communication device, which includes: a transceiver, a memory, and a processor. Wherein, the transceiver, the memory and the processor communicate with each other through an internal connection path, the memory is used to store instructions, and the processor is used to execute the instructions stored in the memory to control the transceiver to receive signals and control the transceiver to send signals , and when the processor executes the instruction stored in the memory, the processor is made to execute the message processing method required by the security device.
本申请实施例还提供了一种通信装置,该装置包括:收发器、存储器和处理器。其中,该收发器、该存储器和该处理器通过内部连接通路互相通信,该存储器用于存储指令,该处理器用于执行该存储器存储的指令,以控制收发器接收信号,并控制收发器发送信号,并且当该处理器执行该存储器存储的指令时,使得该处理器执行终端设备所需执行的报文处理方法。The embodiment of the present application also provides a communication device, which includes: a transceiver, a memory, and a processor. Wherein, the transceiver, the memory and the processor communicate with each other through an internal connection path, the memory is used to store instructions, and the processor is used to execute the instructions stored in the memory to control the transceiver to receive signals and control the transceiver to send signals , and when the processor executes the instructions stored in the memory, the processor is made to execute the message processing method required by the terminal device.
应理解的是,上述处理器可以是中央处理器(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processing,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field-programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者是任何常规的处理器等。值得说明的是,处理器可以是支持进阶精简指令集机器(advanced RISC machines,ARM)架构的处理器。It should be understood that the above-mentioned processor may be a central processing unit (CPU), and may also be other general-purpose processors, digital signal processing (digital signal processing, DSP), application specific integrated circuit (application specific integrated circuit, ASIC), field-programmable gate array (field-programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general purpose processor may be a microprocessor or any conventional processor or the like. It should be noted that the processor may be a processor supporting advanced RISC machines (ARM) architecture.
进一步地,在一种可选的实施例中,上述存储器可以包括只读存储器和随机存取存储器,并向处理器提供指令和数据。存储器还可以包括非易失性随机存取存储器。例如,存储器还可以存储设备类型的信息。Further, in an optional embodiment, the above-mentioned memory may include a read-only memory and a random-access memory, and provide instructions and data to the processor. Memory may also include non-volatile random access memory. For example, the memory may also store device type information.
该存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用。例如,静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic random access memory,DRAM)、同步动态随机存取存储器 (synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data date SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。The memory can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. Among them, the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory. Volatile memory can be random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, many forms of RAM are available. For example, static random access memory (static RAM, SRAM), dynamic random access memory (dynamic random access memory, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access Memory (double data date SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synchlink DRAM, SLDRAM) and direct memory bus random access memory (direct rambus) RAM, DR RAM).
本申请实施例还提供了一种计算机可读存储介质,存储介质中存储有至少一条指令,指令由处理器加载并执行以实现如上任一所述的报文处理方法。The embodiment of the present application also provides a computer-readable storage medium, where at least one instruction is stored in the storage medium, and the instruction is loaded and executed by a processor to implement any one of the packet processing methods described above.
本申请实施例还提供了一种计算机程序(产品),当计算机程序被计算机执行时,可以使得处理器或计算机执行上述方法实施例中对应的报文处理方法的各个步骤和/或流程。The embodiment of the present application also provides a computer program (product). When the computer program is executed by the computer, the processor or the computer can execute each step and/or process of the corresponding message processing method in the above method embodiment.
本申请实施例还提供了一种芯片,包括处理器,用于从存储器中调用并运行所述存储器中存储的指令,使得安装有所述芯片的通信设备执行上述各方面中的报文处理方法。The embodiment of the present application also provides a chip, including a processor, configured to call and execute instructions stored in the memory from the memory, so that the communication device installed with the chip executes the message processing method in the above aspects .
本申请实施例还提供另一种芯片,包括:输入接口、输出接口、处理器和存储器,所述输入接口、输出接口、所述处理器以及所述存储器之间通过内部连接通路相连,所述处理器用于执行所述存储器中的代码,当所述代码被执行时,所述处理器用于执行上述各方面中的报文处理方法。The embodiment of the present application also provides another chip, including: an input interface, an output interface, a processor, and a memory, the input interface, the output interface, the processor, and the memory are connected through an internal connection path, and the The processor is configured to execute the codes in the memory, and when the codes are executed, the processor is configured to execute the message processing method in the above aspects.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘solid state disk)等。In the above embodiments, all or part of them may be implemented by software, hardware, firmware or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the present application will be generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, DSL) or wireless (eg, infrared, wireless, microwave, etc.) means. The computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media. The available medium may be a magnetic medium (such as a floppy disk, a hard disk, or a magnetic tape), an optical medium (such as a DVD), or a semiconductor medium (such as a solid state disk).
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,该程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。Those of ordinary skill in the art can understand that all or part of the steps for implementing the above-mentioned embodiments can be completed by hardware, and can also be completed by instructing related hardware through a program. The program can be stored in a computer-readable storage medium. The above-mentioned The storage medium can be read-only memory, magnetic disk or optical disk and so on.
当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机程序指令。作为示例,本申请实施例的方法可以在机器可执行指令的上下文中被描述,机器可执行指令诸如包括在目标的真实或者虚拟处理器上的器件中执行的程序模块中。一般而言,程序模块包括例程、程序、库、对象、类、组件、数据结构等,其执行特定的任务或者实现特定的抽象数据结构。在各实施例中,程序模块的功能可以在所描述的程序模块之间合并或者分割。用于程序模块的机器可执行指令可以在本地或者分布式设备内执行。在分布式设备中,程序模块可以位于本地和远程存储介质二者中。When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer program instructions. As an example, the methods of embodiments of the present application may be described in the context of machine-executable instructions, such as program modules included in a device executed on a real or virtual processor of a target. Generally, program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform particular tasks or implement particular abstract data structures. In various embodiments, the functionality of the program modules may be combined or divided between the described program modules. Machine-executable instructions for program modules may be executed locally or in distributed devices. In a distributed device, program modules may be located in both local and remote storage media.
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的系统、设备和模块的具体工作过程,可以参见前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and module can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、设备和方法,可以通过其它的方式实现。例如,以上所描述的设备实施例仅仅是示意性的,例如,该模块的划分, 仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个模块或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口、设备或模块的间接耦合或通信连接,也可以是电的,机械的或其它的形式连接。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the modules is only a logical function division. In actual implementation, there may be other division methods. For example, multiple modules or components can be combined or can be Integrate into another system, or some features may be ignored, or not implemented. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be indirect coupling or communication connection through some interfaces, devices or modules, and may also be electrical, mechanical or other forms of connection.
该作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理模块,即可以位于一个地方,或者也可以分布到多个网络模块上。可以根据实际的需要选择其中的部分或者全部模块来实现本申请实施例方案的目的。The modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, that is, they may be located in one place, or may be distributed to multiple network modules. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present application.
另外,在本申请各个实施例中的各功能模块可以集成在一个处理模块中,也可以是各个模块单独物理存在,也可以是两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。In addition, each functional module in each embodiment of the present application may be integrated into one processing module, each module may exist separately physically, or two or more modules may be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules.
该集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读存储介质中。计算机可读存储介质可以是包含或存储用于或有关于指令执行系统、装置或设备的程序的任何有形介质。计算机可读存储介质可以是机器可读信号介质或机器可读存储介质。计算机可读存储介质可以包括但不限于电子的、磁的、光学的、电磁的、红外的或半导体系统、装置或设备,或其任意合适的组合。计算机可读存储介质的更详细示例包括带有一根或多根导线的电气连接、便携式计算机磁盘、硬盘、随机存储存取器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或闪存)、光存储设备、磁存储设备,或其任意合适的组合。If the integrated module is realized in the form of a software function module and sold or used as an independent product, it can be stored in a computer-readable storage medium. A computer-readable storage medium may be any tangible medium that contains or stores a program for or related to an instruction execution system, apparatus, or device. The computer readable storage medium may be a machine readable signal medium or a machine readable storage medium. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination thereof. More detailed examples of computer-readable storage media include electrical connections with one or more wires, portable computer diskettes, hard disks, random storage access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash), optical storage, magnetic storage, or any suitable combination thereof.
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求的范围之内,则本申请也意图包括这些改动和变型在内。Apparently, those skilled in the art can make various changes and modifications to the present application without departing from the scope of the present application. Thus, if these modifications and variations of the application fall within the scope of the claims of the application, the application also intends to include these modifications and variations.

Claims (54)

  1. 一种报文处理方法,其特征在于,所述方法应用于安全设备,所述安全设备部署于外部网络和内部网络的边界,所述方法包括:A message processing method, characterized in that the method is applied to a security device, and the security device is deployed on the boundary between an external network and an internal network, and the method includes:
    所述安全设备截获所述外部网络向所述内部网络发送的第一报文,所述第一报文用于承载所述外部网络的服务器根据所述内部网络的终端设备的请求提供的资源;The security device intercepts a first message sent from the external network to the internal network, where the first message is used to carry resources provided by a server of the external network according to a request of a terminal device of the internal network;
    所述安全设备确定所述第一报文对应的待执行的内容安全业务CSB检测功能;The security device determines the content security service CSB detection function to be executed corresponding to the first message;
    响应于所述终端设备具有第一CSB检测功能,所述安全设备向所述终端设备转发所述第一报文之前,省略对所述第一报文执行所述第一CSB检测功能,其中,所述第一CSB检测功能是所述第一报文对应的待执行的CSB检测功能中的全部功能或部分功能。In response to the terminal device having a first CSB detection function, before the security device forwards the first message to the terminal device, omitting to perform the first CSB detection function on the first message, wherein, The first CSB detection function is all or part of the CSB detection functions to be executed corresponding to the first message.
  2. 根据权利要求1所述的方法,其特征在于,所述第一CSB检测功能是所述第一报文对应的待执行的CSB检测功能中的部分功能,所述安全设备向所述终端设备转发所述第一报文之前,还包括:The method according to claim 1, wherein the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, and the security device forwards the CSB detection function to the terminal device Before the first message, it also includes:
    所述安全设备对所述第一报文执行第二CSB检测功能,所述第二CSB检测功能是所述第一报文对应的待执行的CSB检测功能中除所述第一CSB检测功能之外的功能。The security device performs a second CSB detection function on the first message, and the second CSB detection function is one of the CSB detection functions to be performed corresponding to the first message except the first CSB detection function outside functions.
  3. 根据权利要求1或2所述的方法,其特征在于,所述安全设备截获所述外部网络向所述内部网络发送的第一报文之前,还包括:The method according to claim 1 or 2, wherein before the security device intercepts the first message sent from the external network to the internal network, further comprising:
    所述安全设备截获所述终端设备发送的第二报文,所述第二报文用于请求获取所述外部网络的服务器提供的所述资源;The security device intercepts a second message sent by the terminal device, where the second message is used to request to obtain the resource provided by the server of the external network;
    基于所述第二报文,所述安全设备获取所述终端设备具有的CSB检测功能;Based on the second message, the security device acquires the CSB detection function of the terminal device;
    所述安全设备确定所述第一报文对应的待执行的内容安全业务CSB检测功能之后,还包括:After the security device determines the to-be-executed content security service CSB detection function corresponding to the first message, it further includes:
    所述安全设备根据所述终端设备具有的CSB检测功能以及所述第一报文对应的待执行的CSB检测功能,确定所述终端设备具有第一CSB检测功能。The security device determines that the terminal device has a first CSB detection function according to the CSB detection function possessed by the terminal device and the CSB detection function to be executed corresponding to the first message.
  4. 根据权利要求3所述的方法,其特征在于,所述第二报文包括所述终端设备的身份关键字,所述基于所述第二报文,所述安全设备获取所述终端设备具有的CSB检测功能,包括:The method according to claim 3, wherein the second message includes the identity key of the terminal device, and based on the second message, the security device acquires the identity key of the terminal device CSB detection functions, including:
    所述安全设备通过解析所述第二报文获取所述第二报文包括的所述终端设备的身份关键字;The security device acquires the identity key of the terminal device included in the second message by parsing the second message;
    所述安全设备根据所述终端设备的身份关键字,获取所述终端设备具有的CSB检测功能。The security device acquires the CSB detection function of the terminal device according to the identity key of the terminal device.
  5. 根据权利要求4所述的方法,其特征在于,所述安全设备根据所述终端设备的身份关键字,获取所述终端设备具有的CSB检测功能,包括:The method according to claim 4, wherein the security device obtains the CSB detection function of the terminal device according to the identity key of the terminal device, including:
    所述安全设备向能力管理设备发送查询请求,所述能力管理设备存储有所述终端设备对应的CSB检测功能信息,其中,所述查询请求中携带所述终端设备的身份关键字,所述终端设备对应的CSB检测功能信息用于指示所述终端设备具有的CSB检测功能;The security device sends a query request to a capability management device, and the capability management device stores CSB detection function information corresponding to the terminal device, wherein the query request carries an identity keyword of the terminal device, and the terminal device The CSB detection function information corresponding to the device is used to indicate the CSB detection function of the terminal device;
    接收所述能力管理设备响应于所述查询请求发送的所述终端设备对应的CSB检测功能信息;receiving the CSB detection function information corresponding to the terminal device sent by the capability management device in response to the query request;
    根据所述CSB检测功能信息,确定所述终端设备具有的CSB检测功能。Determine the CSB detection function of the terminal device according to the CSB detection function information.
  6. 根据权利要求5所述的方法,其特征在于,所述向能力管理设备发送查询请求,包括:The method according to claim 5, wherein the sending the query request to the capability management device comprises:
    基于超文本传输协议HTTP、超文本传输安全协议HTTPS或应用程序编程接口API,向所述能力管理设备发送查询请求。Send a query request to the capability management device based on Hypertext Transfer Protocol HTTP, Hypertext Transfer Security Protocol HTTPS or Application Programming Interface API.
  7. 根据权利要求4所述的方法,其特征在于,所述安全设备根据所述终端设备的身份关键字,获取所述终端设备具有的CSB检测功能,包括:The method according to claim 4, wherein the security device obtains the CSB detection function of the terminal device according to the identity key of the terminal device, including:
    所述安全设备根据所述终端设备的身份关键字,查询所述安全设备存储的身份关键字和CSB检测功能的对应关系,获取所述终端设备的身份关键字对应的CSB检测功能。The security device queries the correspondence between the identity key and the CSB detection function stored in the security device according to the identity key of the terminal device, and acquires the CSB detection function corresponding to the identity key of the terminal device.
  8. 根据权利要求4-7任一所述的方法,其特征在于,所述身份关键字包括随机身份标识号ID、网际协议IP地址或本地证书中的用户信息中的至少一种。The method according to any one of claims 4-7, wherein the identity key includes at least one of a random ID, an Internet Protocol IP address, or user information in a local certificate.
  9. 根据权利要求3所述的方法,其特征在于,所述第二报文携带所述终端设备对应的CSB检测功能信息,所述基于所述第二报文,所述安全设备获取所述终端设备具有的CSB检测功能,包括:The method according to claim 3, wherein the second message carries CSB detection function information corresponding to the terminal device, and based on the second message, the security device obtains the terminal device It has the CSB detection function, including:
    所述安全设备通过解析所述第二报文获取所述第二报文携带的所述终端设备对应的CSB检测功能信息;The security device acquires CSB detection function information corresponding to the terminal device carried in the second message by parsing the second message;
    所述安全设备根据所述第二报文携带的所述终端设备对应的CSB检测功能信息,确定所述终端设备具有的CSB检测功能。The security device determines the CSB detection function of the terminal device according to the CSB detection function information corresponding to the terminal device carried in the second message.
  10. 根据权利要求1-9任一所述的方法,其特征在于,所述待执行的内容安全业务CSB检测功能包括入侵防御系统IPS检测功能、反病毒AV检测功能、统一资源定位器URL检测功能、人工智能引擎AIE检测功能或业务感知SA检测功能中的至少一种。The method according to any one of claims 1-9, wherein the content security service CSB detection function to be executed includes an intrusion prevention system IPS detection function, an anti-virus AV detection function, a uniform resource locator URL detection function, At least one of the artificial intelligence engine AIE detection function or the service perception SA detection function.
  11. 一种报文处理方法,其特征在于,所述方法应用于终端设备,所述终端设备部署于内部网络中,所述方法包括:A message processing method, characterized in that the method is applied to a terminal device, and the terminal device is deployed in an internal network, and the method includes:
    所述终端设备向其他设备提供所述终端设备对应的内容安全业务CSB检测功能信息,所述终端设备对应的CSB检测功能信息用于指示所述终端设备具有的CSB检测功能;The terminal device provides other devices with content security service CSB detection function information corresponding to the terminal device, and the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function of the terminal device;
    所述终端设备接收安全设备发送的第一报文,其中,所述安全设备部署于外部网络和所述内部网络的边界,所述第一报文用于承载所述外部网络的服务器根据所述终端设备的请求提供的资源,所述第一报文为所述安全设备未执行第一CSB检测功能的报文,所述终端设备具有的CSB检测功能中包括所述第一CSB检测功能;The terminal device receives a first message sent by a security device, where the security device is deployed on the boundary between the external network and the internal network, and the first message is used to carry the server of the external network according to the The resource provided by the terminal device's request, the first message is a message that the security device does not perform the first CSB detection function, and the CSB detection function of the terminal device includes the first CSB detection function;
    所述终端设备对所述第一报文执行所述第一CSB检测功能。The terminal device performs the first CSB detection function on the first packet.
  12. 根据权利要求11所述的方法,其特征在于,所述终端设备向其他设备提供所述终端设 备对应的内容安全业务CSB检测功能信息,包括:The method according to claim 11, wherein the terminal device provides other devices with content security service CSB detection function information corresponding to the terminal device, including:
    所述终端设备向能力管理设备发送第三报文,所述第三报文携带所述终端设备对应的CSB检测功能信息,所述能力管理设备用于存储所述终端设备对应的CSB检测功能信息。The terminal device sends a third message to the capability management device, the third message carries CSB detection function information corresponding to the terminal device, and the capability management device is used to store the CSB detection function information corresponding to the terminal device .
  13. 根据权利要求11所述的方法,其特征在于,所述终端设备向其他设备提供所述终端设备对应的内容安全业务CSB检测功能信息,包括:The method according to claim 11, wherein the terminal device provides other devices with content security service CSB detection function information corresponding to the terminal device, including:
    所述终端设备向所述安全设备发送第三报文,所述第三报文携带所述终端设备对应的CSB检测功能信息,所述安全设备用于存储所述终端设备对应的CSB检测功能信息。The terminal device sends a third message to the security device, the third message carries CSB detection function information corresponding to the terminal device, and the security device is used to store the CSB detection function information corresponding to the terminal device .
  14. 根据权利要求11所述的方法,其特征在于,所述终端设备向其他设备提供所述终端设备对应的内容安全业务CSB检测功能信息,包括:The method according to claim 11, wherein the terminal device provides other devices with content security service CSB detection function information corresponding to the terminal device, including:
    所述终端设备向所述外部网络的服务器发送第二报文,所述第二报文用于请求获取所述外部网络的服务器提供的资源,其中,所述第二报文携带所述终端设备对应的CSB检测功能信息。The terminal device sends a second message to the server of the external network, the second message is used to request to obtain resources provided by the server of the external network, wherein the second message carries the terminal device Corresponding CSB detection function information.
  15. 根据权利要求14所述的方法,其特征在于,所述第二报文为基于超文本传输安全协议HTTPS传输的报文,所述终端设备对应的CSB检测功能信息携带在所述第二报文的用户本地终端上的小数据Cookie,或统一资源定位器URL参数,或HTTPS首部字段,或HTTPS自定义字段中。The method according to claim 14, wherein the second message is a message transmitted based on the Hypertext Transfer Security Protocol (HTTPS), and the CSB detection function information corresponding to the terminal device is carried in the second message The small data cookie on the user's local terminal, or the URL parameter of the uniform resource locator, or the HTTPS header field, or the HTTPS custom field.
  16. 根据权利要求14所述的方法,其特征在于,所述第二报文为基于超文本传输协议HTTP传输的报文,所述终端设备对应的CSB检测功能信息携带在所述第二报文的小数据Cookie,或HTTP首部字段,或HTTP自定义字段中。The method according to claim 14, wherein the second message is a message transmitted based on Hypertext Transfer Protocol HTTP, and the CSB detection function information corresponding to the terminal device is carried in the second message Small data cookies, or HTTP header fields, or HTTP custom fields.
  17. 根据权利要求14所述的方法,其特征在于,所述第二报文为基于文件传输协议FTP传输的报文,所述终端设备对应的CSB检测功能信息携带在所述第二报文的FTP冗余字段或FTP自定义字段中。The method according to claim 14, wherein the second message is a message transmitted based on a file transfer protocol (FTP), and the CSB detection function information corresponding to the terminal device is carried in the FTP of the second message. Redundant fields or FTP custom fields.
  18. 根据权利要求12或13所述的方法,其特征在于,所述终端设备向其他设备提供所述终端设备对应的内容安全业务CSB检测功能信息之后,还包括:The method according to claim 12 or 13, characterized in that, after the terminal device provides other devices with the content security service CSB detection function information corresponding to the terminal device, it further includes:
    所述终端设备向所述外部网络的服务器发送第二报文,所述第二报文用于请求获取所述外部网络的服务器提供的资源,其中,所述第二报文包括所述终端设备的身份关键字,所述身份关键字用于获取所述终端设备具有的CSB检测功能。The terminal device sends a second message to the server of the external network, the second message is used to request to obtain resources provided by the server of the external network, wherein the second message includes the terminal device An identity key, where the identity key is used to obtain the CSB detection function of the terminal device.
  19. 根据权利要求18所述的方法,其特征在于,响应于所述其他设备为能力管理设备,所述终端设备向其他设备提供所述终端设备对应的内容安全业务CSB检测功能信息之后,还包括:The method according to claim 18, wherein, in response to the other device being a capability management device, after the terminal device provides other devices with information about the content security service CSB detection function corresponding to the terminal device, further comprising:
    所述终端设备接收所述能力管理设备发送的所述终端设备的随机身份标识号ID,所述终端设备的随机ID用于作为所述终端设备的身份关键字;或The terminal device receives the random ID of the terminal device sent by the capability management device, and the random ID of the terminal device is used as an identity key of the terminal device; or
    响应于所述其他设备为所述安全设备,所述终端设备向其他设备提供所述终端设备对应的内容安全业务CSB检测功能信息之后,还包括:In response to the fact that the other device is the security device, after the terminal device provides the other device with information about the content security service CSB detection function corresponding to the terminal device, the method further includes:
    所述终端设备接收所述安全设备发送的所述终端设备的随机ID,所述终端设备的随机ID用于作为所述终端设备的身份关键字。The terminal device receives the random ID of the terminal device sent by the security device, and the random ID of the terminal device is used as an identity key of the terminal device.
  20. 根据权利要求18或19所述的方法,其特征在于,所述第三报文还包括所述终端设备的IP地址,所述终端设备的IP地址用于作为所述终端设备的身份关键字。The method according to claim 18 or 19, wherein the third message further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device.
  21. 根据权利要求18-20任一所述的方法,其特征在于,所述第三报文还包括所述终端设备的本地证书,所述终端设备的本地证书中的用户信息用于作为所述终端设备的身份关键字。The method according to any one of claims 18-20, wherein the third message further includes the local certificate of the terminal device, and the user information in the local certificate of the terminal device is used as the terminal The identity key of the device.
  22. 根据权利要求11-21任一所述的方法,其特征在于,所述终端设备具有的CSB检测功能包括入侵防御系统IPS检测功能、反病毒AV检测功能、URL检测功能、人工智能引擎AIE检测功能或业务感知SA检测功能中的至少一种。The method according to any one of claims 11-21, wherein the CSB detection function of the terminal device includes an intrusion prevention system IPS detection function, an anti-virus AV detection function, a URL detection function, and an artificial intelligence engine AIE detection function Or at least one of the service-aware SA detection functions.
  23. 根据权利要求11-22任一所述的方法,其特征在于,所述终端设备向其他设备提供所述终端设备对应的内容安全业务CSB检测功能信息之前,还包括:The method according to any one of claims 11-22, wherein, before the terminal device provides other devices with information about the content security service CSB detection function corresponding to the terminal device, it further includes:
    所述终端设备向所述安全设备发送登录请求,所述登录请求包括用户信息;The terminal device sends a login request to the security device, where the login request includes user information;
    接收所述安全设备基于所述用户信息发送的认证结果,所述认证结果用于指示所述终端设备是否成功登录;receiving an authentication result sent by the security device based on the user information, where the authentication result is used to indicate whether the terminal device successfully logs in;
    响应于所述终端设备成功登录,所述终端设备执行向其他设备提供所述终端设备对应的CSB检测功能信息的操作。In response to the successful login of the terminal device, the terminal device performs an operation of providing the CSB detection function information corresponding to the terminal device to other devices.
  24. 根据权利要求11-22任一所述的方法,其特征在于,所述终端设备向其他设备提供所述终端设备对应的内容安全业务CSB检测功能信息之前,还包括:The method according to any one of claims 11-22, wherein, before the terminal device provides other devices with information about the content security service CSB detection function corresponding to the terminal device, it further includes:
    所述终端设备向登录认证设备发送登录请求,所述登录请求包括用户信息;The terminal device sends a login request to the login authentication device, and the login request includes user information;
    接收所述登录认证设备基于所述用户信息发送的认证结果,所述认证结果用于指示所述终端设备是否成功登录;receiving an authentication result sent by the login authentication device based on the user information, where the authentication result is used to indicate whether the terminal device successfully logs in;
    响应于所述终端设备成功登录,所述终端设备执行向其他设备提供所述终端设备对应的CSB检测功能信息的操作。In response to the successful login of the terminal device, the terminal device performs an operation of providing the CSB detection function information corresponding to the terminal device to other devices.
  25. 根据权利要求11-22任一所述的方法,其特征在于,所述终端设备向其他设备提供所述终端设备对应的内容安全业务CSB检测功能信息之前,还包括:The method according to any one of claims 11-22, wherein, before the terminal device provides other devices with information about the content security service CSB detection function corresponding to the terminal device, it further includes:
    所述终端设备向登录认证设备发送登录请求,所述登录请求包括所述终端设备的本地证书;The terminal device sends a login request to the login authentication device, where the login request includes the local certificate of the terminal device;
    接收所述登录认证设备基于所述终端设备的本地证书发送的认证结果,所述认证结果用于指示所述终端设备是否成功登录;receiving an authentication result sent by the login authentication device based on the local certificate of the terminal device, where the authentication result is used to indicate whether the terminal device has successfully logged in;
    响应于所述终端设备成功登录,所述终端设备执行向其他设备提供所述终端设备对应的CSB检测功能信息的操作。In response to the successful login of the terminal device, the terminal device performs an operation of providing the CSB detection function information corresponding to the terminal device to other devices.
  26. 一种报文处理装置,其特征在于,所述装置应用于安全设备,所述安全设备部署于外部网络和内部网络的边界,所述装置包括:A message processing device, characterized in that the device is applied to a security device, and the security device is deployed on the boundary between an external network and an internal network, and the device includes:
    获取模块,用于截获所述外部网络向所述内部网络发送的第一报文,所述第一报文用于承载所述外部网络的服务器根据所述内部网络的终端设备的请求提供的资源;An acquisition module, configured to intercept a first message sent from the external network to the internal network, where the first message is used to carry the resource provided by the server of the external network according to the request of the terminal device of the internal network ;
    确定模块,用于确定所述第一报文对应的待执行的内容安全业务CSB检测功能;A determining module, configured to determine the content security service CSB detection function to be executed corresponding to the first message;
    处理模块,用于响应于所述终端设备具有第一CSB检测功能,向所述终端设备转发所述第一报文之前,省略对所述第一报文执行所述第一CSB检测功能,其中,所述第一CSB检测功能是所述第一报文对应的待执行的CSB检测功能中的全部功能或部分功能。A processing module, configured to, in response to the terminal device having a first CSB detection function, omit performing the first CSB detection function on the first message before forwarding the first message to the terminal device, wherein , the first CSB detection function is all or part of the CSB detection functions to be executed corresponding to the first message.
  27. 根据权利要求26所述的装置,其特征在于,所述第一CSB检测功能是所述第一报文对应的待执行的CSB检测功能中的部分功能,所述处理模块,还用于对所述第一报文执行第二CSB检测功能,所述第二CSB检测功能是所述第一报文对应的待执行的CSB检测功能中除所述第一CSB检测功能之外的功能。The device according to claim 26, wherein the first CSB detection function is a part of the CSB detection function to be executed corresponding to the first message, and the processing module is further configured to The first message performs a second CSB detection function, and the second CSB detection function is a function other than the first CSB detection function among the CSB detection functions to be performed corresponding to the first message.
  28. 根据权利要求26或27所述的装置,其特征在于,所述获取模块,还用于截获所述终端设备发送的第二报文,所述第二报文用于请求获取所述外部网络的服务器提供的所述资源;基于所述第二报文,获取所述终端设备具有的CSB检测功能;所述确定模块,还用于根据所述终端设备具有的CSB检测功能以及所述第一报文对应的待执行的CSB检测功能,确定所述终端设备具有第一CSB检测功能。The device according to claim 26 or 27, wherein the obtaining module is further configured to intercept the second message sent by the terminal device, and the second message is used to request to obtain the external network The resource provided by the server; based on the second message, acquire the CSB detection function of the terminal device; the determining module is further configured to obtain the CSB detection function of the terminal device and the first report It is determined that the terminal device has the first CSB detection function corresponding to the to-be-executed CSB detection function.
  29. 根据权利要求28所述的装置,其特征在于,所述第二报文包括所述终端设备的身份关键字,所述获取模块,用于通过解析所述第二报文获取所述第二报文包括的所述终端设备的身份关键字;根据所述终端设备的身份关键字,获取所述终端设备具有的CSB检测功能。The device according to claim 28, wherein the second message includes an identity keyword of the terminal device, and the obtaining module is configured to obtain the second message by parsing the second message The identity keyword of the terminal device included in the document; according to the identity keyword of the terminal device, acquire the CSB detection function of the terminal device.
  30. 根据权利要求29所述的装置,其特征在于,所述获取模块,用于向能力管理设备发送查询请求,所述能力管理设备存储有所述终端设备对应的CSB检测功能信息,其中,所述查询请求中携带所述终端设备的身份关键字,所述终端设备对应的CSB检测功能信息用于指示所述终端设备具有的CSB检测功能;接收所述能力管理设备响应于所述查询请求发送的所述终端设备对应的CSB检测功能信息;根据所述CSB检测功能信息,确定所述终端设备具有的CSB检测功能。The device according to claim 29, wherein the obtaining module is configured to send a query request to a capability management device, and the capability management device stores CSB detection function information corresponding to the terminal device, wherein the The query request carries the identity keyword of the terminal device, and the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function of the terminal device; receiving the information sent by the capability management device in response to the query request CSB detection function information corresponding to the terminal device; determining the CSB detection function of the terminal device according to the CSB detection function information.
  31. 根据权利要求30所述的装置,其特征在于,所述获取模块,用于基于超文本传输协议HTTP、超文本传输安全协议HTTPS或应用程序编程接口API,向所述能力管理设备发送查询请求。The apparatus according to claim 30, wherein the acquisition module is configured to send a query request to the capability management device based on Hypertext Transfer Protocol HTTP, Hypertext Transfer Security Protocol HTTPS or Application Programming Interface API.
  32. 根据权利要求29所述的装置,其特征在于,所述获取模块,用于根据所述终端设备的身份关键字,查询所述安全设备存储的身份关键字和CSB检测功能的对应关系,获取所述终端设备的身份关键字对应的CSB检测功能。The device according to claim 29, wherein the obtaining module is configured to, according to the identity keyword of the terminal device, query the corresponding relationship between the identity keyword stored in the security device and the CSB detection function, and obtain the The CSB detection function corresponding to the identity keyword of the terminal device is described.
  33. 根据权利要求29-32任一所述的装置,其特征在于,所述身份关键字包括随机身份标识号ID、网际协议IP地址或本地证书中的用户信息中的至少一种。The device according to any one of claims 29-32, wherein the identity key includes at least one of a random ID, an Internet Protocol IP address, or user information in a local certificate.
  34. 根据权利要求28所述的装置,其特征在于,所述第二报文携带所述终端设备对应的CSB检测功能信息,所述获取模块,用于通过解析所述第二报文获取所述第二报文携带的所述终端设备对应的CSB检测功能信息;根据所述第二报文携带的所述终端设备对应的CSB检测功能信息,确定所述终端设备具有的CSB检测功能。The device according to claim 28, wherein the second message carries CSB detection function information corresponding to the terminal equipment, and the acquiring module is configured to acquire the second message by parsing the second message The CSB detection function information corresponding to the terminal device carried in the second message; determine the CSB detection function of the terminal device according to the CSB detection function information corresponding to the terminal device carried in the second message.
  35. 根据权利要求26-34任一所述的装置,其特征在于,所述待执行的内容安全业务CSB检测功能包括入侵防御系统IPS检测功能、反病毒AV检测功能、统一资源定位器URL检测功能、人工智能引擎AIE检测功能或业务感知SA检测功能中的至少一种。The device according to any one of claims 26-34, wherein the content security service CSB detection function to be executed includes an intrusion prevention system IPS detection function, an anti-virus AV detection function, a uniform resource locator URL detection function, At least one of the artificial intelligence engine AIE detection function or the service perception SA detection function.
  36. 一种报文处理装置,其特征在于,所述装置应用于终端设备,所述终端设备部署于内部网络中,所述装置包括:A message processing device, characterized in that the device is applied to a terminal device, and the terminal device is deployed in an internal network, and the device includes:
    供给模块,用于向其他设备提供所述终端设备对应的内容安全业务CSB检测功能信息,所述终端设备对应的CSB检测功能信息用于指示所述终端设备具有的CSB检测功能;A supply module, configured to provide other devices with content security service CSB detection function information corresponding to the terminal device, where the CSB detection function information corresponding to the terminal device is used to indicate the CSB detection function that the terminal device has;
    接收模块,用于接收安全设备发送的第一报文,其中,所述安全设备部署于外部网络和所述内部网络的边界,所述第一报文用于承载所述外部网络的服务器根据所述终端设备的请求提供的资源,所述第一报文为所述安全设备未执行第一CSB检测功能的报文,所述终端设备具有的CSB检测功能中包括所述第一CSB检测功能;A receiving module, configured to receive a first message sent by a security device, where the security device is deployed on the boundary between the external network and the internal network, and the first message is used to carry the server of the external network according to the The resource provided by the request of the terminal device, the first message is a message that the security device does not perform the first CSB detection function, and the CSB detection function of the terminal device includes the first CSB detection function;
    处理模块,用于对所述第一报文执行所述第一CSB检测功能。A processing module, configured to perform the first CSB detection function on the first packet.
  37. 根据权利要求36所述的装置,其特征在于,所述供给模块,用于向能力管理设备发送第三报文,所述第三报文携带所述终端设备对应的CSB检测功能信息,所述能力管理设备用于存储所述终端设备对应的CSB检测功能信息。The device according to claim 36, wherein the supply module is configured to send a third message to the capability management device, the third message carries the CSB detection function information corresponding to the terminal device, and the The capability management device is configured to store the CSB detection function information corresponding to the terminal device.
  38. 根据权利要求36所述的装置,其特征在于,所述供给模块,用于向所述安全设备发送第三报文,所述第三报文携带所述终端设备对应的CSB检测功能信息,所述安全设备用于存储所述终端设备对应的CSB检测功能信息。The device according to claim 36, wherein the supply module is configured to send a third message to the security device, the third message carries CSB detection function information corresponding to the terminal device, and the The security device is used to store the CSB detection function information corresponding to the terminal device.
  39. 根据权利要求36所述的装置,其特征在于,所述供给模块,用于向所述外部网络的服务器发送第二报文,所述第二报文用于请求获取所述外部网络的服务器提供的资源,其中,所述第二报文携带所述终端设备对应的CSB检测功能信息。The device according to claim 36, wherein the supply module is configured to send a second message to the server of the external network, and the second message is used to request to obtain the information provided by the server of the external network. resources, wherein the second packet carries CSB detection function information corresponding to the terminal device.
  40. 根据权利要求39所述的装置,其特征在于,所述第二报文为基于超文本传输安全协议HTTPS传输的报文,所述终端设备对应的CSB检测功能信息携带在所述第二报文的用户本地终端上的小数据Cookie,或统一资源定位器URL参数,或HTTPS首部字段,或HTTPS自定义字段中。The device according to claim 39, wherein the second message is a message transmitted based on the hypertext transfer security protocol HTTPS, and the CSB detection function information corresponding to the terminal device is carried in the second message The small data cookie on the user's local terminal, or the URL parameter of the uniform resource locator, or the HTTPS header field, or the HTTPS custom field.
  41. 根据权利要求39所述的装置,其特征在于,所述第二报文为基于超文本传输协议HTTP传输的报文,所述终端设备对应的CSB检测功能信息携带在所述第二报文的小数据Cookie,或HTTP首部字段,或HTTP自定义字段中。The device according to claim 39, wherein the second message is a message transmitted based on Hypertext Transfer Protocol HTTP, and the CSB detection function information corresponding to the terminal device is carried in the second message Small data cookies, or HTTP header fields, or HTTP custom fields.
  42. 根据权利要求39所述的装置,其特征在于,所述第二报文为基于文件传输协议FTP传输的报文,所述终端设备对应的CSB检测功能信息携带在所述第二报文的FTP冗余字段或FTP自定义字段中。The device according to claim 39, wherein the second message is a message transmitted based on the file transfer protocol FTP, and the CSB detection function information corresponding to the terminal device is carried in the FTP of the second message Redundant fields or FTP custom fields.
  43. 根据权利要求37或38所述的装置,其特征在于,所述装置还包括:发送模块,用于向所述外部网络的服务器发送第二报文,所述第二报文用于请求获取所述外部网络的服务器提供的资源,其中,所述第二报文包括所述终端设备的身份关键字,所述身份关键字用于获取所述终端设备具有的CSB检测功能。The device according to claim 37 or 38, further comprising: a sending module, configured to send a second message to the server of the external network, and the second message is used to request to obtain the The resource provided by the server of the external network, wherein the second message includes the identity key of the terminal device, and the identity key is used to obtain the CSB detection function of the terminal device.
  44. 根据权利要求43所述的装置,其特征在于,响应于所述其他设备为能力管理设备,所述接收模块,还用于接收所述能力管理设备发送的所述终端设备的随机身份标识号ID,所述终端设备的随机ID用于作为所述终端设备的身份关键字;或The device according to claim 43, wherein, in response to the other device being a capability management device, the receiving module is further configured to receive the random ID of the terminal device sent by the capability management device , the random ID of the terminal device is used as the identity key of the terminal device; or
    响应于所述其他设备为所述安全设备,所述接收模块,还用于接收所述安全设备发送的所述终端设备的随机ID,所述终端设备的随机ID用于作为所述终端设备的身份关键字。In response to the fact that the other device is the security device, the receiving module is further configured to receive the random ID of the terminal device sent by the security device, and the random ID of the terminal device is used as the ID of the terminal device. identity key.
  45. 根据权利要求43或44所述的装置,其特征在于,所述第三报文还包括所述终端设备的IP地址,所述终端设备的IP地址用于作为所述终端设备的身份关键字。The apparatus according to claim 43 or 44, wherein the third message further includes the IP address of the terminal device, and the IP address of the terminal device is used as an identity key of the terminal device.
  46. 根据权利要求43-45任一所述的装置,其特征在于,所述第三报文还包括所述终端设备的本地证书,所述终端设备的本地证书中的用户信息用于作为所述终端设备的身份关键字。The device according to any one of claims 43-45, wherein the third message further includes the local certificate of the terminal device, and the user information in the local certificate of the terminal device is used as the The identity key of the device.
  47. 根据权利要求36-46任一所述的装置,其特征在于,所述终端设备具有的CSB检测功能包括入侵防御系统IPS检测功能、反病毒AV检测功能、URL检测功能、人工智能引擎AIE检测功能或业务感知SA检测功能中的至少一种。The device according to any one of claims 36-46, wherein the CSB detection function of the terminal device includes an intrusion prevention system IPS detection function, an anti-virus AV detection function, a URL detection function, and an artificial intelligence engine AIE detection function Or at least one of the service-aware SA detection functions.
  48. 根据权利要求36-47任一所述的装置,其特征在于,所述装置还包括:请求模块,用于向所述安全设备发送登录请求,所述登录请求包括用户信息;接收所述安全设备基于所述用户信息发送的认证结果,所述认证结果用于指示所述终端设备是否成功登录;响应于所述终端设备成功登录,所述供给模块执行向其他设备提供所述终端设备对应的CSB检测功能信息的操作。The device according to any one of claims 36-47, characterized in that the device further comprises: a request module, configured to send a login request to the security device, the login request including user information; receiving the security device Based on the authentication result sent by the user information, the authentication result is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the supply module executes providing the CSB corresponding to the terminal device to other devices Actions to detect feature information.
  49. 根据权利要求36-47任一所述的装置,其特征在于,所述装置还包括:请求模块,用于向登录认证设备发送登录请求,所述登录请求包括用户信息;接收所述登录认证设备基于所述用户信息发送的认证结果,所述认证结果用于指示所述终端设备是否成功登录;响应于所 述终端设备成功登录,所述供给模块执行向其他设备提供所述终端设备对应的CSB检测功能信息的操作。The device according to any one of claims 36-47, characterized in that the device further comprises: a request module, configured to send a login request to a login authentication device, the login request including user information; receiving the login authentication device Based on the authentication result sent by the user information, the authentication result is used to indicate whether the terminal device has successfully logged in; in response to the successful login of the terminal device, the supply module executes providing the CSB corresponding to the terminal device to other devices Actions to detect feature information.
  50. 根据权利要求36-47任一所述的装置,其特征在于,所述装置还包括:请求模块,用于向登录认证设备发送登录请求,所述登录请求包括所述终端设备的本地证书;接收所述登录认证设备基于所述终端设备的本地证书发送的认证结果,所述认证结果用于指示所述终端设备是否成功登录;响应于所述终端设备成功登录,所述供给模块执行向其他设备提供所述终端设备对应的CSB检测功能信息的操作。The device according to any one of claims 36-47, characterized in that the device further comprises: a request module, configured to send a login request to the login authentication device, the login request including the local certificate of the terminal device; receiving The authentication result sent by the login authentication device based on the local certificate of the terminal device, the authentication result is used to indicate whether the terminal device has successfully logged in; An operation of providing CSB detection function information corresponding to the terminal device.
  51. 一种报文处理设备,其特征在于,所述报文处理设备包括:处理器,所述处理器与存储器耦合,所述存储器中存储有至少一条程序指令或代码,所述至少一条程序指令或代码由所述处理器加载并执行,以使所述报文处理设备实现权利要求1-25任一所述的报文处理方法。A message processing device, characterized in that the message processing device includes: a processor, the processor is coupled with a memory, at least one program instruction or code is stored in the memory, and the at least one program instruction or The code is loaded and executed by the processor, so that the message processing device implements the message processing method described in any one of claims 1-25.
  52. 一种报文处理系统,其特征在于,所述报文处理系统包括安全设备和终端设备,所述安全设备用于执行如权利要求1-10任一所述的报文处理方法,所述终端设备用于执行如权利要求11-25任一所述的报文处理方法。A message processing system, characterized in that the message processing system includes a security device and a terminal device, the security device is used to execute the message processing method according to any one of claims 1-10, and the terminal The device is configured to execute the packet processing method according to any one of claims 11-25.
  53. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有至少一条程序指令或代码,所述程序指令或代码由处理器加载并执行,以使计算机实现如权利要求1-25中任一所述的报文处理方法。A computer-readable storage medium, characterized in that at least one program instruction or code is stored in the computer-readable storage medium, and the program instruction or code is loaded and executed by a processor, so that the computer implements claim 1. - The message processing method described in any one of 25.
  54. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序,所述计算机程序被计算机执行,以使所述计算机实现如权利要求1-25中任一所述的报文处理方法。A computer program product, characterized in that the computer program product includes a computer program, and the computer program is executed by a computer, so that the computer implements the message processing method according to any one of claims 1-25.
PCT/CN2022/080721 2021-06-26 2022-03-14 Packet processing method and apparatus, device, system, and readable storage medium WO2022267564A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202110714768 2021-06-26
CN202110714768.5 2021-06-26
CN202111069732.2 2021-09-13
CN202111069732.2A CN115529148A (en) 2021-06-26 2021-09-13 Message processing method, device, equipment, system and readable storage medium

Publications (1)

Publication Number Publication Date
WO2022267564A1 true WO2022267564A1 (en) 2022-12-29

Family

ID=84544094

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/080721 WO2022267564A1 (en) 2021-06-26 2022-03-14 Packet processing method and apparatus, device, system, and readable storage medium

Country Status (1)

Country Link
WO (1) WO2022267564A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102438026A (en) * 2012-01-12 2012-05-02 冶金自动化研究设计院 Industrial control network security protection method and system
US20140189808A1 (en) * 2012-12-28 2014-07-03 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
CN108259416A (en) * 2016-12-28 2018-07-06 华为技术有限公司 Detect the method and relevant device of malicious web pages
CN110505189A (en) * 2018-05-18 2019-11-26 深信服科技股份有限公司 Recognition methods, identification equipment and the storage medium that terminal security agency breaks through
CN110798459A (en) * 2019-10-23 2020-02-14 国网江苏省电力有限公司信息通信分公司 Multi-safety-node linkage defense method based on safety function virtualization

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102438026A (en) * 2012-01-12 2012-05-02 冶金自动化研究设计院 Industrial control network security protection method and system
US20140189808A1 (en) * 2012-12-28 2014-07-03 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
CN108259416A (en) * 2016-12-28 2018-07-06 华为技术有限公司 Detect the method and relevant device of malicious web pages
CN110505189A (en) * 2018-05-18 2019-11-26 深信服科技股份有限公司 Recognition methods, identification equipment and the storage medium that terminal security agency breaks through
CN110798459A (en) * 2019-10-23 2020-02-14 国网江苏省电力有限公司信息通信分公司 Multi-safety-node linkage defense method based on safety function virtualization

Similar Documents

Publication Publication Date Title
US11632392B1 (en) Distributed malware detection system and submission workflow thereof
US11178188B1 (en) Synthetic request injection to generate metadata for cloud policy enforcement
US11190550B1 (en) Synthetic request injection to improve object security posture for cloud security enforcement
US20220345463A1 (en) Inline proxy with synthetic request injection logic for cloud policy enforcement
US11876833B2 (en) Software defined networking moving target defense honeypot
US11184403B1 (en) Synthetic request injection to generate metadata at points of presence for cloud security enforcement
US10027556B2 (en) Delegated network management services
US8464335B1 (en) Distributed, multi-tenant virtual private network cloud systems and methods for mobile security and policy enforcement
US10498736B2 (en) Third party program integrity and integration control in web based applications
US20220345495A1 (en) Application-specific data flow for synthetic request injection
WO2020057163A1 (en) Mec platform deployment method and device
US11271973B1 (en) Synthetic request injection to retrieve object metadata for cloud policy enforcement
US11159576B1 (en) Unified policy enforcement management in the cloud
US11336698B1 (en) Synthetic request injection for cloud policy enforcement
US20220345490A1 (en) Synthetic Request Injection to Retrieve Expired Metadata for Cloud Policy Enforcement
US11848949B2 (en) Dynamic distribution of unified policies in a cloud-based policy enforcement system
WO2023065969A1 (en) Access control method, apparatus, and system
CN115315926A (en) Reverse proxy server for implementing application layer based and transport layer based security rules
JP2020517132A (en) Method, apparatus and system for implementing policy control
WO2022100020A1 (en) Vulnerability testing method and apparatus
US11637702B2 (en) Verifiable computation for cross-domain information sharing
CN112491776B (en) Security authentication method and related equipment
US11777993B2 (en) Unified system for detecting policy enforcement issues in a cloud-based environment
US20220247761A1 (en) Dynamic routing of access request streams in a unified policy enforcement system
US11736531B1 (en) Managing and monitoring endpoint activity in secured networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22827069

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE