CN101291220B - System, device and method for identity security authentication - Google Patents
System, device and method for identity security authentication Download PDFInfo
- Publication number
- CN101291220B CN101291220B CN2007101004921A CN200710100492A CN101291220B CN 101291220 B CN101291220 B CN 101291220B CN 2007101004921 A CN2007101004921 A CN 2007101004921A CN 200710100492 A CN200710100492 A CN 200710100492A CN 101291220 B CN101291220 B CN 101291220B
- Authority
- CN
- China
- Prior art keywords
- user
- identity authentication
- identity
- authentication center
- user identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本发明涉及在网络中进行身份认证技术,特别涉及一种身份安全认证的系统、装置及方法。The invention relates to identity authentication technology in the network, in particular to a system, device and method for identity security authentication.
背景技术Background technique
随着电信网络和互联网络应用的普及,越来越多的用户开始通过网络接受服务。在通过网络接受服务时,需要进行身份认证,目前提供服务的网络大多采用用户名和口令的方式来识别用户身份,这就需要用户经常性地输入自己的用户名和口令。这种身份认证方式存在着弊端:一方面,随着用户接受不同网络提供不同服务的增多,用户在进行不同网络认证时,需要输入不同的口令,这给用户造成不必要的烦琐过程和记忆上的困难;另一方面,用户经常性地在网络中输入用户名和口令,这会相应增加口令被恶意破解的机率,即增加用户的隐私信息泄漏的机率。With the popularization of telecommunication networks and Internet applications, more and more users begin to receive services through the Internet. When receiving services through the network, identity authentication is required. Most of the networks that provide services currently use user names and passwords to identify user identities, which requires users to frequently input their own user names and passwords. There are disadvantages in this identity authentication method: on the one hand, as users accept more and more different services provided by different networks, users need to input different passwords when performing different network authentications, which causes unnecessary cumbersome processes and memory problems for users. On the other hand, users frequently input user names and passwords in the network, which will correspondingly increase the probability of passwords being maliciously cracked, that is, increase the probability of leakage of users' private information.
为了克服上述缺陷,在网络中提出了对用户身份进行管理的技术。身份管理就是对身份、对为用户提供服务实体的认证处理和一定范围内对该实体认证相关信息所进行的安全管理。为用户提供服务的实体可以是任何在网络中被唯一识别的事物、人、动物、设备、对象、组、组织和信息对象等。为用户提供服务的实体在不同的应用范围内可能具有多个身份。认证过程的范围可以是在网络中设定的一个组织内,也可以是跨越网络中设定的多个组织。In order to overcome the above defects, a technology for managing user identities is proposed in the network. Identity management is the security management of identities, authentication processing of entities providing services to users, and information related to authentication of entities within a certain range. Entities that provide services to users can be any things, people, animals, equipment, objects, groups, organizations, and information objects that are uniquely identified in the network. An entity that provides services to users may have multiple identities in different application scopes. The scope of the authentication process can be within one organization set in the network, or it can span multiple organizations set up in the network.
由于与身份相关的信息是在网络认证过程中随时间发生变化的,因此,必须对身份相关的信息进行管理。为用户提供服务实体的有些信息为非正式的且变化比较频繁,有些为正式的且具体,比如说用户,基于政治的组织角色以及财务账户通常是稳定的。身份的属性通常会安全地存储于网络中的令牌、目录、访问设备或者是网络中的数据库管理系统中。Since the identity-related information changes with time during the network authentication process, the identity-related information must be managed. Some information about entities providing services to users is informal and changes frequently, and some information is formal and specific, such as users, politically based organizational roles, and financial accounts are usually stable. Identity attributes are usually securely stored in tokens, directories, access devices on the network, or database management systems on the network.
身份认证管理技术包含的任务是在安全和信息域里巩固、管理和交换为用户提供服务的实体信息。在网络中建立身份认证管理构架可以使业务提供者(SP,Service Provider)在网络中通过使用授权、认证、接入控制机制和策略管理机制为用户提供可靠、可信和安全的业务。Identity management technology includes the task of consolidating, managing and exchanging information about entities providing services to users in the security and information domains. Establishing an identity authentication management framework in the network can enable service providers (SP, Service Provider) to provide reliable, credible and secure services to users by using authorization, authentication, access control mechanisms and policy management mechanisms in the network.
目前,在网络中建立的用户身份认证管理架构如图1所示,包括:开放标识服务器(OpenID Server)、统一资源定位格式(URL,Uniform ResourceLocator)站点、用户代理(User Agent)和用户(Consumer)认证管理模块。其中,User Agent位于网络中的用户侧,OpenID Server、URL站点和Consumer认证管理模块位于网络中的网络侧。在OpenID Server中,存储用户对应的URL,可以采用加密的方式存储用户对应的URL。整个身份认证过程就是确认一个用户具有一个URL的过程。具体流程为:At present, the user identity authentication management framework established in the network is shown in Figure 1, including: Open ID Server (OpenID Server), Uniform Resource Locator (URL, Uniform ResourceLocator) site, User Agent (User Agent) and User (Consumer ) authentication management module. Wherein, the User Agent is located on the user side of the network, and the OpenID Server, URL site and Consumer authentication management module are located on the network side of the network. In the OpenID Server, the URL corresponding to the user is stored, and the URL corresponding to the user can be stored in an encrypted manner. The entire identity authentication process is the process of confirming that a user has a URL. The specific process is:
第一步骤,User Agent向URL站点标识自身的认证(Identity)URL,即User Agent在URL站点所设定的网页中加入OpenID Server的地址信息。In the first step, the User Agent identifies its own authentication (Identity) URL to the URL site, that is, the User Agent adds the address information of the OpenID Server to the webpage set by the URL site.
第二步骤,User Agent向认证管理模块Consumer提交声明的Identity(Claimed Identity),携带有Identity URL和声明Identity服务器,在进行身份认证之前称为声明的Identity,这是因为可能是User Agent声明的假身份。In the second step, the User Agent submits the claimed Identity (Claimed Identity) to the authentication management module Consumer, which carries the Identity URL and the claimed Identity server, which is called the claimed Identity before identity authentication, because it may be a false statement of the User Agent identity.
第三步骤,Consumer认证管理模块为了验证User Agent提交声明的Identity,到该声明的Identity携带的声明Identity服务器,即URL站点获取到User Agent的Identity URL。In the third step, in order to verify the Identity submitted by the User Agent, the Consumer Authentication Management Module obtains the Identity URL of the User Agent from the Statement Identity server carried by the Identity of the statement, that is, the URL site.
第四步骤,Consumer认证管理模块比较得到所获取到的Identity URL和该声明的Identity携带的dentity URL相同后,与OpenID Server建立联系,获得共享密钥(建立联系的这个步骤可选),交换用户的Identity URL和用户的URL,在交换时,由于用户的URL可能加密存储在OpenID Server中,所以可以用密钥解密得到用户的URL。In the fourth step, the Consumer authentication management module compares the obtained Identity URL with the identity URL carried by the declared Identity, establishes a connection with the OpenID Server, obtains a shared key (this step of establishing a connection is optional), and exchanges users When exchanging the Identity URL and the user's URL, since the user's URL may be encrypted and stored in the OpenID Server, the user's URL can be decrypted with the key.
第五步骤,Consumer认证管理模块向User Agent确认身份,携带UserAgent要重定向到的OpenID Server以及用户的URL。In the fifth step, the Consumer authentication management module confirms the identity to the User Agent, carrying the OpenID Server to be redirected to by the UserAgent and the URL of the user.
第六步骤,User Agent通过cookie或其他认证机制登录到OpenIDServer,登录时输入用户的URL。In the sixth step, User Agent logs in to OpenIDServer through cookie or other authentication mechanisms, and enters the user's URL when logging in.
第七步骤,OpenID Server对User Agent进行认证后,发送响应信息给User Agent,携带重定向回Consumer认证管理模块的信息。In the seventh step, after the OpenID Server authenticates the User Agent, it sends a response message to the User Agent, carrying information redirected back to the Consumer authentication management module.
OpenID Server对User Agent进行认证时,比较自己存储的用户的URL(如果是加密存储,可以解密后得到用户的URL)和User Agent登录时输入的URL相比较,如果相同,认证通过。When the OpenID Server authenticates the User Agent, it compares the URL of the user stored by itself (if encrypted, it can be decrypted to obtain the URL of the user) and the URL entered by the User Agent when logging in. If they are the same, the authentication is passed.
第八步骤,User Agent将响应消息发送给Consumer认证管理模块。In the eighth step, the User Agent sends a response message to the Consumer authentication management module.
这样,就完成了对User Agent的身份认证,User Agent可以在网络中进行相关业务的请求,网络侧可以对用户请求的业务进行处理。在图1所示的架构中,OpenID Server和URL站点在同一个服务器上或完全分离。In this way, the identity authentication of the User Agent is completed, the User Agent can request related services in the network, and the network side can process the services requested by the user. In the architecture shown in Figure 1, OpenID Server and URL site are on the same server or completely separated.
图1所示的架构是采用URL对用户的身份进行认证的,所以只适用于互联网,不适用于移动网。另外,对用户身份认证的手段单一,只能采用URL对用户身份认证。The architecture shown in Figure 1 uses the URL to authenticate the identity of the user, so it is only applicable to the Internet, not to the mobile network. In addition, the means for user identity authentication is single, and only URL can be used for user identity authentication.
图1所示的架构在认证用户身份时,无法满足对用户身份隐私性保护的需求。网络侧对所存储用户身份信息的隐私保护,是通过加密用户身份信息方式来实现,但是这种方式带来效率低下和复杂密钥管理等问题,且保护用户身份信息隐私的安全性不高。另外,在认证用户身份时,还是采用用户真实的URL认证,这会降低用户身份认证的安全性。The architecture shown in FIG. 1 cannot meet the requirement for privacy protection of user identities when authenticating user identities. The privacy protection of stored user identity information on the network side is realized by encrypting user identity information, but this method brings problems such as low efficiency and complex key management, and the security of protecting user identity information privacy is not high. In addition, when authenticating the user's identity, the real URL of the user is still used for authentication, which will reduce the security of the user's identity authentication.
发明内容Contents of the invention
本发明实施例提供一种身份安全认证的系统,该系统不仅能够提高用户身份认证的安全性,而且有效地保护用户身份信息的隐私。An embodiment of the present invention provides an identity security authentication system, which can not only improve the security of user identity authentication, but also effectively protect the privacy of user identity information.
本发明实施例还提供一种身份安全认证的装置,该装置不仅能够提高用户身份认证的安全性,而且有效地保护用户身份信息的隐私。The embodiment of the present invention also provides an identity security authentication device, which can not only improve the security of user identity authentication, but also effectively protect the privacy of user identity information.
本发明实施例提供一种身份安全认证的方法,该方法不仅能够提高身份认证的安全性,而且有效地保护用户身份信息的隐私。An embodiment of the present invention provides a method for identity security authentication, which can not only improve the security of identity authentication, but also effectively protect the privacy of user identity information.
根据上述目的,本发明实施例的技术方案是这样实现的:According to above-mentioned purpose, the technical scheme of the embodiment of the present invention is realized like this:
一种身份安全认证的系统,包括身份认证中心、用户身份认证中心和业务处理单元,其中,A system for identity security authentication, including an identity authentication center, a user identity authentication center and a business processing unit, wherein,
所述身份认证中心,用于为用户身份认证中心分配用户身份认证中心标识,为业务处理单元分配标识;所述用户身份认证中心,用于对用户注册,分配唯一标识用户的用户虚拟身份标识,发送该用户虚拟身份标识和所述用户身份认证中心标识给所述用户;The identity authentication center is used to assign user identity authentication center identifiers to the user identity authentication center, and assign identifiers to business processing units; the user identity authentication center is used to register users and assign user virtual identity identifiers that uniquely identify users, Sending the user's virtual identity and the identity of the user authentication center to the user;
所述业务处理单元,用于接收业务请求,根据该请求携带的虚拟身份标识和用户身份认证中心标识对用户认证,处理该请求。The service processing unit is configured to receive a service request, authenticate the user according to the virtual ID carried in the request and the ID of the user identity authentication center, and process the request.
一种身份安全认证的方法,身份认证中心为用户身份认证中心分配用户身份认证中心标识,为业务处理单元分配标识;该方法还包括:用户身份认证中心对用户注册,为用户分配唯一标识用户的用户虚拟身份标识后,发送该用户虚拟身份标识和所述用户身份认证中心标识给所述用户;业务处理单元接收用户发送的业务请求,根据该请求携带的用户身份认证中心标识和该用户虚拟身份标识处理该请求。A method for identity security authentication, the identity authentication center assigns the user identity authentication center identifier to the user identity authentication center, and assigns the identifier to the business processing unit; After the user's virtual identity is identified, send the user's virtual identity and the user identity authentication center identifier to the user; the service processing unit receives the service request sent by the user, and according to the user identity authentication center identifier and the user virtual identity carried by the request Identifies the request to be processed.
一种控制用户身份认证的装置,包括用户身份认证中心单元、业务处理控制单元和身份认证管理单元,其中,A device for controlling user identity authentication, including a user identity authentication center unit, a service processing control unit, and an identity authentication management unit, wherein,
用户身份认证中心单元,用于为用户身份认证中心分配标识,管理和认证用户身份认证中心,设置用户身份认证中心的交互策略;The user identity authentication center unit is used to assign identifiers to the user identity authentication center, manage and authenticate the user identity authentication center, and set the interaction strategy of the user identity authentication center;
业务处理控制单元,用于为提供业务处理的实体分配标识,管理和认证提供业务处理的实体,设置提供业务处理的实体的交互策略;The business processing control unit is used to assign identifiers to entities providing business processing, manage and authenticate entities providing business processing, and set interaction strategies for entities providing business processing;
所述身份认证管理单元,用于控制用户身份认证中心单元和业务处理控制单元之间的交互。The identity authentication management unit is used to control the interaction between the user identity authentication center unit and the service processing control unit.
从上述方案可以看出,本发明实施例在网络中设置对用户的不同业务类型认证的用户身份认证中心,且通过身份认证中心控制管理用户身份认证中心和处理不同类型业务的业务处理单元,不同类型业务的业务请求采用对应的用户身份信息认证。因此,本发明实施例由于可以按照业务类型分别存储用户身份信息,所以有效地保护用户身份信息的隐私。另外,在用户注册后,用户身份认证中心为用户分配唯一标识用户的虚拟身份标识(UVID,UserVirtual Identity),用户直接采用该UVID向业务处理单元发送业务请求,业务处理单元根据该UVID认证后,处理该业务请求。因此,本发明实施例由于在发起不同类型业务的业务请求时,携带的为UVID,所以不仅提高用户身份认证的安全性,而且不会给用户造成不必要的烦琐过程和记忆上的困难。It can be seen from the above scheme that in the embodiment of the present invention, a user identity authentication center for authenticating different business types of users is set in the network, and the identity authentication center controls and manages the user identity authentication center and business processing units that process different types of services. The service request of this type of service adopts the corresponding user identity information authentication. Therefore, the embodiment of the present invention can effectively protect the privacy of the user identity information because the user identity information can be stored separately according to the service type. In addition, after the user registers, the user identity authentication center assigns the user a virtual identity (UVID, UserVirtual Identity) that uniquely identifies the user, and the user directly uses the UVID to send a service request to the business processing unit. After the business processing unit authenticates according to the UVID, Process the business request. Therefore, since the embodiment of the present invention carries UVID when initiating service requests of different types of services, it not only improves the security of user identity authentication, but also does not cause unnecessary cumbersome procedures and memory difficulties to users.
附图说明Description of drawings
图1为现有技术在网络中建立的用户身份认证管理架构示意图;FIG. 1 is a schematic diagram of a user identity authentication management architecture established in a network in the prior art;
图2为本发明实施例在网络中建立的用户身份认证管理架构示意图;Fig. 2 is a schematic diagram of the user identity authentication management framework established in the network according to the embodiment of the present invention;
图3为本发明实施例在网络中进行用户身份认证的方法流程图;3 is a flowchart of a method for user identity authentication in a network according to an embodiment of the present invention;
图4为本发明实施例SP处理业务请求的方法流程图;FIG. 4 is a flow chart of a method for SP processing a service request according to an embodiment of the present invention;
图5为本发明实施例的控制用户身份认证的装置示意图。FIG. 5 is a schematic diagram of an apparatus for controlling user identity authentication according to an embodiment of the present invention.
具体实施方式Detailed ways
为使本发明的目的、技术方案和优点更加清楚,下面结合附图对本发明实施例作进一步的详细描述。In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.
本发明实施例在网络中建立用户身份认证管理架构,该架构可以按照业务类型分别管理一个用户的不同用户身份信息,有效地保护用户身份信息的隐私;在进行业务处理前的认证时,采用分配的用户虚拟身份UVID认证,提高用户身份认证的效率和安全性。The embodiment of the present invention establishes a user identity authentication management framework in the network, which can manage different user identity information of a user according to the business type, effectively protecting the privacy of the user identity information; User virtual identity UVID authentication improves the efficiency and security of user identity authentication.
图2为本发明实施例在网络中建立的用户身份认证管理架构示意图,包括:用户身份认证中心(UIAC,User Identity Authentication Center)、身份认证中心(IDAC,Identity Authentication Center)和业务处理单元,其中,Fig. 2 is a schematic diagram of the user identity authentication management architecture set up in the network according to the embodiment of the present invention, including: a user identity authentication center (UIAC, User Identity Authentication Center), an identity authentication center (IDAC, Identity Authentication Center) and a business processing unit, wherein ,
UIAC,用于对用户注册,分配唯一标识用户的UVID,发送UVID和所述UIAC标识给所述用户;UIAC, for registering the user, assigning a UVID that uniquely identifies the user, and sending the UVID and the UIAC identifier to the user;
业务处理单元,用于接收业务处理请求,根据该请求携带的UVID和UIAC标识对用户认证,处理该业务请求;The service processing unit is configured to receive a service processing request, authenticate the user according to the UVID and UIAC identifier carried in the request, and process the service request;
IDAC,用于管理UIAC,分配UIAC标识,管理业务处理单元,分配业务处理单元标识。The IDAC is used to manage the UIAC, assign UIAC IDs, manage service processing units, and assign service processing unit IDs.
在本发明实施例中,该管理架构还包括用户,用于向UIAC注册,接收UIAC发送的UVID和UIAC标识;向业务处理单元发送携带UVID和UIAC标识的业务请求。In the embodiment of the present invention, the management framework further includes a user, configured to register with the UIAC, receive the UVID and the UIAC identifier sent by the UIAC, and send a service request carrying the UVID and the UIAC identifier to the service processing unit.
在本实施例中,UIAC可以具有多个,分别存储用户的不同类型业务的用户身份信息,分别针对用户不同类型业务的用户身份信息,对用户认证。In this embodiment, there may be multiple UIACs, which respectively store the user identity information of different types of services of the user, and respectively authenticate the user according to the user identity information of different types of services of the user.
多个UIAC之间直接进行交互,在一个UIAC第一次对用户注册时给用户分配UVID后,其他UIAC再对用户针对其他类型业务的身份信息注册时,不给用户分配UVID,其他UIAC进行交互获知已经给用户分配了UVID,且将该UVID和存储的相类型业务的用户身份信息相关联。Multiple UIACs interact directly. After one UIAC assigns a UVID to the user when registering the user for the first time, when other UIACs register the user's identity information for other types of services, no UVID is assigned to the user, and other UIACs interact. It is known that a UVID has been allocated to the user, and the UVID is associated with the stored user identity information of the corresponding type of service.
在本实施例中,业务处理单元为SP,当然,也可以包括网络和/或网络中的设备。In this embodiment, the service processing unit is an SP, of course, it may also include a network and/or devices in the network.
在本实施例中,业务处理单元的身份信息以及权限级别可以存储在IDAC中,用于直接对业务处理单元进行认证,或提供给相应的UIAC。In this embodiment, the identity information and authority level of the service processing unit may be stored in the IDAC, and used for directly authenticating the service processing unit, or provided to a corresponding UIAC.
在IDAC中,具体包括:用户身份认证中心单元(UIACU,User IdentityAuthentication Center Unit),用于对至少一个UIAC进行控制管理;网络身份管理单元(NIDU,Network Identity Unit),用于对网络身份信息进行控制管理;设备身份管理单元(DIDU,Device Identity Unit),用于对网络中的设备身份信息进行管理控制;业务提供者身份管理单元(SPIDU,ServiceProvider Identity Unit),用于对业务提供者身份信息进行管理控制;身份认证管理单元(IDAMU,Identity Authentication Manage Unit),用于控制实现UIACU、NIDU、DIDU、SPIDU分别和IDAMU之间的信息交互。In IDAC, it specifically includes: User Identity Authentication Center Unit (UIACU, User Identity Authentication Center Unit), which is used to control and manage at least one UIAC; Network Identity Management Unit (NIDU, Network Identity Unit), which is used for network identity information. Control management; device identity management unit (DIDU, Device Identity Unit), used to manage and control device identity information in the network; service provider identity management unit (SPIDU, ServiceProvider Identity Unit), used to control service provider identity information Perform management control; Identity Authentication Management Unit (IDAMU, Identity Authentication Manage Unit) is used to control and realize the information exchange between UIACU, NIDU, DIDU, SPIDU and IDAMU respectively.
在本实施例中,UIACU可以具有多个,分别对应控制管理不同的UIAC。相应地,NIDU也可以具有多个,DIDU也可以具有多个,分别管理控制存储不同设备身份信息的不同设备;SPIDU也可以具有多个,分别管理控制存储不同SP身份信息的SP。In this embodiment, there may be multiple UIACUs, corresponding to control and manage different UIACs. Correspondingly, there may be multiple NIDUs, and multiple DIDUs, respectively managing and controlling different devices that store different device identity information; there may also be multiple SPIDUs, respectively managing and controlling SPs that store different SP identity information.
在本实施例中,IDAC也可以只包括SPIDU。In this embodiment, the IDAC may only include SPIDUs.
在本实施例中,NIDU、DIDU和SPIDU可以统称为业务处理控制单元,当IDAC只包括SPIDU时,该业务处理控制单元可以只包括SPIDU。In this embodiment, NIDU, DIDU and SPIDU may be collectively referred to as a service processing control unit. When the IDAC only includes SPIDU, the service processing control unit may only include SPIDU.
以下对图2中的各个功能模块进行详细叙述。Each functional module in FIG. 2 will be described in detail below.
IDAC是网络中最高权威认证管理单元,直接管理控制各个业务处理单元以及各个UIAC,用户通过UIAC可以与IDAC进行交互。IDAC is the most authoritative authentication management unit in the network. It directly manages and controls each service processing unit and each UIAC. Users can interact with IDAC through UIAC.
IDAC提供的功能为:可以认证SP身份、网络身份、设备身份以及UIAC身份;能够存储并管理SP身份信息、网络身份信息、设备身份信息以及UIAC身份信息,存储时可以集中存储或分别存储在不同的相应单元中,存储的形式可以是身份信息列表,也可以直接存储到不同的相应单元中;能够实现不同身份信息的交互,如将管理的SP列表发送给UIAC,实现业务处理单元和UIAC之间的信息交互。The functions provided by IDAC are: it can authenticate SP identity, network identity, device identity and UIAC identity; it can store and manage SP identity information, network identity information, device identity information and UIAC identity information, which can be stored centrally or separately in different In the corresponding unit of the corresponding unit, the storage form can be a list of identity information, and can also be directly stored in different corresponding units; it can realize the interaction of different identity information, such as sending the managed SP list to the UIAC, and realize the communication between the business processing unit and the UIAC. exchange of information between them.
UIAC,一般可以按照业务类型划分,这使得用户身份信息可以按照业务类型分别存储在不同的UIAC中,对应的唯一标识用户的UVID也可以存储在不同的UIAC中。也就是说,每个UIAC中存储的为用户部分身份信息,因此可以很好保护用户身份信息的隐私。每个UIAC都有一个标识,由IDAC中的UIACU对UIAC认证并分配。UIAC中存储有能够提供该业务类型的业务处理单元列表,如SP列表,该列表可以从IDAC中获得或直接与SP交互,从SP获取到。UIAC可以和用户之间按照设定的认证方法对用户的注册进行认证,如可以采用AKA,PKI等认证方法,也可以根据用户业务类型要求的安全级别来确定认证方法,进行认证。当认证通过后,UIAC给该用户分配一个唯一的UVID以及有效期,且与存储的SP列表相关联,该有效期一般按照业务类型的安全等级来设定,业务类型的安全等级越高,UVID的有效期越短。为用户提供其他类型业务服务的UIAC可以与为用户认证过的UIAC中获取到该UIAC为该用户分配的UVID。当用户下次再到另一个UIAC中注册时,注册成功后存储对应业务类型的用户身份信息到该UIAC中,该UIAC不用再次为用户分配UVID。当UVID的有效期满时或者用户身份信息变更时,用户可以向当前UIAC申请更新UVID或者更新自己的身份信息。当用户在注册后,需要申请业务时,可以向处理该类型业务的业务处理单元发送携带UVID和UIAC标识的业务请求,由业务处理单元处理该业务请求。UIACs can generally be divided according to service types, which enables user identity information to be stored in different UIACs according to service types, and the corresponding UVIDs that uniquely identify users can also be stored in different UIACs. That is to say, each UIAC stores part of the user's identity information, so the privacy of the user's identity information can be well protected. Each UIAC has an identity, which is authenticated and assigned to the UIAC by the UIACU in the IDAC. The UIAC stores a list of service processing units capable of providing this service type, such as a list of SPs, which can be obtained from the IDAC or directly interact with the SP, and can be obtained from the SP. UIAC can authenticate user registration with the user according to the set authentication method, for example, AKA, PKI and other authentication methods can be used, or the authentication method can be determined according to the security level required by the user's business type for authentication. After the authentication is passed, UIAC assigns a unique UVID and validity period to the user, which is associated with the stored SP list. The validity period is generally set according to the security level of the business type. The higher the security level of the business type, the longer the validity period of the UVID. shorter. The UIAC that provides other types of business services for the user can obtain the UVID assigned to the user by the UIAC from the UIAC that has authenticated the user. When the user registers in another UIAC next time, after successful registration, the user identity information corresponding to the service type is stored in the UIAC, and the UIAC does not need to allocate a UVID for the user again. When the validity of the UVID expires or the user's identity information changes, the user can apply to the current UIAC to update the UVID or update his own identity information. When the user needs to apply for a service after registration, he can send a service request carrying UVID and UIAC identification to the service processing unit that handles this type of service, and the service processing unit will process the service request.
在本实施例中,UIAC可以获取用户身份信息模块和发送用户身份信息模块,其中,所述获取用户身份信息模块;用于获取用户身份信息,所述发送用户身份信息模块,用于将用户身份信息发送给对应的业务处理单元。In this embodiment, the UIAC can acquire the user identity information module and send the user identity information module, wherein the acquiring user identity information module is used to acquire the user identity information, and the sending user identity information module is used to send the user identity information The information is sent to the corresponding business processing unit.
SP,用SP标识进行识别,即SPID由IDAC中的SPIDU分配,SP可以存储SP身份信息以及SP列表,并且按照SP可以提供的业务类型将SP身份分类且与UVID和UIAC标识相关联,将SP列表在发送给对应的UIAC。接收到业务请求的SP可以对该业务请求携带的UVID和UIAC标识进行认证,查询并获取需要申请业务的用户身份信息。如果该SP具备本地数据库,且具有下载用户身份信息的权限级别,该权限级别可以由IDAC中的SPIDU根据SP的级别进行分配,能够直接从UIAC中获取用户身份信息并加密保存到本地,还可以对用户身份信息进行定期更新。另外,UIAC也可以直接和对应的SP进行关联,保证SP中的用户身份信息为用户的最新身份信息。SP, identified by SP ID, that is, SPID is allocated by SPIDU in IDAC, SP can store SP identity information and SP list, and classify SP identity and associate with UVID and UIAC ID according to the service type that SP can provide, and SP The list is being sent to the corresponding UIAC. The SP that receives the service request can authenticate the UVID and UIAC identifier carried in the service request, query and obtain the identity information of the user who needs to apply for the service. If the SP has a local database and a permission level for downloading user identity information, the permission level can be assigned by the SPIDU in IDAC according to the SP level, and the user identity information can be directly obtained from UIAC and encrypted and stored locally. Regularly update user identity information. In addition, the UIAC can also be directly associated with the corresponding SP to ensure that the user identity information in the SP is the latest identity information of the user.
UIACU,用于处理与UIAC相关的业务,如对UIAC进行认证和分配UIAC标识,向UIAC发送业务处理单元列表等,位于IDAC中,是IDAC管理和控制UIAC的一个逻辑模块。UIACU is used to process UIAC-related services, such as authenticating UIAC and assigning UIAC identification, sending a list of service processing units to UIAC, etc. It is located in IDAC and is a logical module for IDAC to manage and control UIAC.
NIDU,用于处理与网络相关的业务,如认证网络身份、存储并管理网络身份信息等,是IDAC管理和控制网络的一个逻辑模块。NIDU is used to process network-related services, such as authenticating network identities, storing and managing network identity information, etc. It is a logical module for IDAC to manage and control the network.
DIDU,用于处理与网络中设备相关的业务,如认证设备身份、存储并管理设备身份信息等,是IDAC管理和控制网络中设备的一个逻辑模块。DIDU is used to process services related to devices in the network, such as authenticating device identities, storing and managing device identity information, etc. It is a logical module for IDAC to manage and control devices in the network.
SPIDU,用于处理与业务提供者单元相关的业务,如认证SP身份、存储并管理SP身份信息等,是IDAC管理和控制业务提供者单元的一个逻辑模块。SPIDU is used to process services related to service provider units, such as authenticating SP identity, storing and managing SP identity information, etc. It is a logic module of IDAC management and control service provider unit.
IDAMU,用于对UIACU、NIDU、DIDU和SPIDU之间的信息交互进行控制,是IDAC统一管理UIACU、NIDU、DIDU和SPIDU的一个逻辑模块。IDAMU is used to control the information interaction between UIACU, NIDU, DIDU and SPIDU, and is a logical module for IDAC to uniformly manage UIACU, NIDU, DIDU and SPIDU.
本发明实施例还提供一种在网络中进行用户身份认证的方法,如图3所示,其具体步骤为:The embodiment of the present invention also provides a method for user identity authentication in the network, as shown in Figure 3, the specific steps are:
步骤300、UIAC接收到用户注册,对用户进行认证。
认证方法可以采用现有的AKA和PKI,或者获取用户注册的业务类型,根据设定的业务类型安全级别对应的认证方法进行认证。The authentication method can adopt the existing AKA and PKI, or obtain the service type registered by the user, and perform authentication according to the authentication method corresponding to the security level of the set service type.
在本步骤中,用户发起业务注册时,到处理该业务类型的UIAC进行认证,也就是该UIAC存储有对应该业务类型的用户身份信息,这不是用户全部的身份信息,便于保护用户身份信息的隐私。In this step, when the user initiates service registration, the UIAC that handles the service type is authenticated, that is, the UIAC stores the user identity information corresponding to the service type, which is not all the identity information of the user, and is convenient for protecting the user identity information privacy.
步骤301、用户通过认证后,UIAC判断该用户是否已经分配了UVID,如果是,执行步骤302;如果否,执行步骤303。
在本实施例中,有几种方式可以判断该用户是否已经被分配了UVID。In this embodiment, there are several ways to determine whether the user has been assigned a UVID.
第一种方式,UIAC可以访问为用户分配了UVID的UIAC,确定该用户的用户身份信息是否关联有UVID,如果是,则确定该用户已经分配了UVID;In the first way, the UIAC can access the UIAC that has assigned a UVID to the user, and determine whether the user identity information of the user is associated with a UVID, and if so, determine that the user has been assigned a UVID;
第二种方式,在该用户被分配了UVID时,由为该用户分配UVID的UIAC通过IDAC确定对该用户的其他部分用户身份信息进行管理的UIAC,直接将该UVID发送给对该用户的其他部分用户身份信息进行管理的UIAC,对该用户的其他部分用户身份信息进行管理的UIAC将接收到的UVID与所存储的该用户部分的身份信息进行关联,从而可以确定出该用户是否分配了UVID。In the second way, when the user is assigned a UVID, the UIAC that assigns the UVID to the user determines the UIAC that manages other part of the user identity information of the user through the IDAC, and directly sends the UVID to other users of the user. The UIAC that manages part of the user's identity information, and the UIAC that manages other parts of the user's identity information of the user associate the received UVID with the stored part of the user's identity information, so as to determine whether the user is assigned a UVID .
步骤302、UIAC向该用户返回注册通过消息,携带已经为用户分配的UVID和UIAC标识,转入步骤304。In
步骤303、UIAC给该用户分配UVID后,向该用户返回注册通过消息,携带UVID和UIAC标识,转入步骤304。In
在给该用户分配UVID后,可以将该UVID直接将该UVID发送给管理用户其他部分身份信息的UIAC。After the UVID is allocated to the user, the UVID can be directly sent to the UIAC that manages other parts of the user's identity information.
步骤304、用户接收到注册通过消息后,向业务处理单元发送携带UIAC标识和UVID的业务请求,业务处理单元接收到该业务请求后,处理该业务请求。Step 304: After receiving the registration pass message, the user sends a service request carrying the UIAC identifier and UVID to the service processing unit, and the service processing unit processes the service request after receiving the service request.
在本实施例中,为用户分配的UVID还可以具有有效期限,在步骤301中,还可以进一步判断为用户分配的UVID的有效期限是否到达,如果是,则直接执行303,否则,执行步骤302。In this embodiment, the UVID assigned to the user may also have an expiration date. In
以下以业务处理单元是SP为例详细介绍业务处理单元接收到业务请求时,如何进行处理的过程。Taking the service processing unit as an SP as an example, the following describes in detail how the service processing unit processes the service request when it receives it.
图4为本发明实施例SP处理业务请求的方法流程图,其具体步骤为:Fig. 4 is the flow chart of the method for SP processing business request of the embodiment of the present invention, and its specific steps are:
步骤401、SP接收到用户发送的业务请求,该请求包含用户的UVID和UIAC标识。
步骤402、SP对该业务请求进行认证,认证通过后,执行步骤403。In
进行认证的过程有两种方式:There are two ways to go through the authentication process:
一种方式,SP拥有本地数据库且下载用户身份信息的权限级别,这时,SP存储有UVID和UIAC标识对应的所服务用户的身份信息(该身份信息从UIAC获取),直接进行认证,认证采用的方法可以为现有技术。In one way, the SP has a local database and the permission level for downloading user identity information. At this time, the SP stores the identity information of the served user corresponding to the UVID and UIAC identifier (the identity information is obtained from the UIAC), and directly performs authentication. The authentication adopts The method can be prior art.
第二种方式,SP没有存储UVID和UIAC标识对应的用户身份信息,则向具有该业务请求携带UIAC标识的UIAC发送携带包含SP标识和UVID的用户身份信息查询请求,UIAC判断所存储的业务处理单元列表中是否有该SP标识对应的SP且该SP是否有权限获得用户的身份信息,如果是,则发送用户的身份信息给SP(在发送时,可以采用加密手段保护用户身份信息的安全传送),SP根据获得的用户身份信息进行认证;否则,则给SP返回认证失败消息,此次认证失败。In the second way, if the SP does not store the user identity information corresponding to the UVID and the UIAC identifier, it sends a user identity information query request including the SP identifier and UVID to the UIAC that has the service request carrying the UIAC identifier, and the UIAC judges the stored service processing Whether there is the SP corresponding to the SP logo in the unit list and whether the SP has the authority to obtain the user's identity information, if so, then send the user's identity information to the SP (when sending, encryption means can be used to protect the safe transmission of the user's identity information ), the SP performs authentication according to the obtained user identity information; otherwise, an authentication failure message is returned to the SP, and the authentication fails this time.
采用这两种方式的情况不同,当SP接收到用户发送的业务请求后,会判断是否存储有该UVID和该UIAC对应的用户身份信息,如果是,采用第一种方式进行;如果否,则有三种可能,第一种可能是SP第一次处理该用户的业务请求,另一种是SP没有本地数据库且有下载用户身份信息的权限,再一种是SP没有下载用户身份信息的权限级别,这时都可以采用第二种方式进行。The situation of using these two methods is different. When the SP receives the service request sent by the user, it will judge whether the user identity information corresponding to the UVID and the UIAC is stored. If yes, use the first method; if not, then There are three possibilities. The first possibility is that the SP is processing the user's business request for the first time. The other is that the SP does not have a local database and has the authority to download user identity information. The third possibility is that the SP does not have the authority level to download user identity information. , the second method can be adopted at this time.
步骤403、SP向用户发送用户认证成功信息,执行该业务请求。
在本发明实施例中,用户还可以对存储在UIAC中的用户身份信息进行更新,即发送携带用户更新后身份信息的更新身份信息请求给UIAC,UIAC更新存储的用户身份信息,且对应于用户UVID将更新的身份信息发送给IDAC,以便IDAC中相应的UIACU管理,或直接提供给业务处理单元在处理业务请求时进行认证。In the embodiment of the present invention, the user can also update the user identity information stored in the UIAC, that is, send an update identity information request carrying the user's updated identity information to the UIAC, and the UIAC updates the stored user identity information, and corresponds to the user UVID sends the updated identity information to IDAC so that it can be managed by the corresponding UIACU in IDAC, or directly provided to the service processing unit for authentication when processing service requests.
本发明实施例还提供一种控制用户身份认证的装置,如图5所示,该装置包括:UIACU、业务处理控制单元和IDAMU,其中,The embodiment of the present invention also provides a device for controlling user identity authentication. As shown in FIG. 5, the device includes: UIACU, service processing control unit and IDAMU, wherein,
所述UIACU,用于为UIACU分配标识,管理和认证UIACU,设置UIACU的交互策略;The UIACU is used to assign an ID to the UIACU, manage and authenticate the UIACU, and set an interaction strategy of the UIACU;
所述业务处理控制单元,用于为提供业务处理的实体分配标识,管理和认证提供业务处理的实体,对提供业务处理的实体进行认证,设置提供业务处理的实体的交互策略;The business processing control unit is used to assign identifiers to entities providing business processing, manage and authenticate entities providing business processing, authenticate entities providing business processing, and set interaction strategies for entities providing business processing;
所述IDAMU,用于控制用户身份认证中心单元和业务处理控制单元之间的交互。The IDAMU is used to control the interaction between the user identity authentication center unit and the service processing control unit.
在本实施例中,提供业务处理的实体可以为SP,也可以为提供业务服务的网络或设备。当然,提供业务处理的实体最好为SP。In this embodiment, the entity that provides service processing may be an SP, or may be a network or device that provides service. Of course, the entity that provides business processing is preferably SP.
在本实施例中,业务处理控制单元可以只包括SPIDU,也可以包括SPIDU、NIDU或/和DIDU,其中,In this embodiment, the service processing control unit may only include SPIDU, or may include SPIDU, NIDU or/and DIDU, wherein,
NIDU,用于对网络身份信息进行控制和管理,为网络分配标识,为网络设置信息交互策略;NIDU is used to control and manage network identity information, assign identifiers to the network, and set information exchange policies for the network;
DIDU,Device Identity Unit,用于对网络中的设备身份信息进行管理控制,为设备分配标识,为设备设置信息交互策略;DIDU, Device Identity Unit, is used to manage and control device identity information in the network, assign identities to devices, and set information interaction policies for devices;
SPIDU,Service ProviderIdentity Unit,用于对SP身份信息进行管理和控制,为SP分配标识,为SP设置信息交互策略;SPIDU, Service ProviderIdentity Unit, is used to manage and control SP identity information, assign identifiers to SP, and set information interaction policies for SP;
IDAMU,Identity Authentication Center Unit,用于控制实现UIACU、NIDU、DIDU、SPIDU分别和IDAMU之间的信息交互。IDAMU, Identity Authentication Center Unit, is used to control the information exchange between UIACU, NIDU, DIDU, SPIDU and IDAMU respectively.
在本实施例中,NIDU、DIDU和SPIDU可以称为业务处理控制单元,分别对不同的业务处理单元进行处理。当然,当业务处理单元仅仅包括SP时,业务处理控制单元也包括SPIDU。In this embodiment, the NIDU, DIDU and SPIDU may be referred to as service processing control units, which respectively process different service processing units. Of course, when the service processing unit only includes SP, the service processing control unit also includes SPIDU.
在本实施例中,网络实际上可以为提供业务服务的网络,如英特网络或下一代网络,还可以为局域网等。In this embodiment, the network may actually be a network that provides business services, such as the Internet or a next-generation network, or a local area network.
从上述方案可以看出,本发明实施例提供的系统、方法及装置可以带来如下的技术效果:It can be seen from the above solutions that the system, method and device provided by the embodiments of the present invention can bring the following technical effects:
UIAC和用户之间的认证方法可以协商,所以图2所示的系统可以适用于各种网络环境,即对各种网络环境下的用户身份信息进行安全管理和保护;The authentication method between the UIAC and the user can be negotiated, so the system shown in Figure 2 can be applied to various network environments, that is, to safely manage and protect user identity information in various network environments;
UIAC为用户分配唯一标识用户的UVID,用户不需要再记忆多个接入不同业务处理单元的口令,不会给用户造成不必要的烦琐过程和记忆上的困难;UIAC assigns the user a UVID that uniquely identifies the user, and the user does not need to memorize multiple passwords for accessing different business processing units, which will not cause unnecessary cumbersome processes and memory difficulties to the user;
用户的身份信息按照业务类型在不同的UIAC中存储,即分布式存储用户的身份信息,更有效地保证了用户身份信息的隐私;The user's identity information is stored in different UIACs according to the business type, that is, the user's identity information is stored in a distributed manner, which more effectively guarantees the privacy of the user's identity information;
用户能够方便地管理自己的身份信息,例如信息的更新,为自己的信息设定访问权限等。Users can easily manage their own identity information, such as updating information, setting access permissions for their own information, etc.
以上是对本发明具体实施例的说明,在具体的实施过程中可对本发明的方法进行适当的改进,以适应具体情况的具体需要。因此可以理解,根据本发明的具体实施方式只是起示范作用,并不用以限制本发明的保护范围。The above is the description of the specific embodiments of the present invention, and the method of the present invention can be appropriately improved during the specific implementation process to meet the specific needs of specific situations. Therefore, it can be understood that the specific implementation manners according to the present invention are only exemplary, and are not intended to limit the protection scope of the present invention.
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101004921A CN101291220B (en) | 2007-04-16 | 2007-04-16 | System, device and method for identity security authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101004921A CN101291220B (en) | 2007-04-16 | 2007-04-16 | System, device and method for identity security authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101291220A CN101291220A (en) | 2008-10-22 |
CN101291220B true CN101291220B (en) | 2010-08-18 |
Family
ID=40035321
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007101004921A Expired - Fee Related CN101291220B (en) | 2007-04-16 | 2007-04-16 | System, device and method for identity security authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101291220B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333092B (en) * | 2011-09-30 | 2014-05-28 | 北京亿赞普网络技术有限公司 | Network user identification method and application server |
CN103281680B (en) * | 2013-05-07 | 2015-11-18 | 杭州东信北邮信息技术有限公司 | Realize accurate marketing as required and protect unified communications and the method for privacy of user |
CN104980428B (en) * | 2015-04-28 | 2018-09-04 | 腾讯科技(深圳)有限公司 | A kind of network communication method, device and system |
CN107294721B (en) * | 2016-03-30 | 2019-06-18 | 阿里巴巴集团控股有限公司 | Method and apparatus for identity registration and authentication based on biometrics |
CN108604990A (en) * | 2016-12-02 | 2018-09-28 | 华为技术有限公司 | The application method and device of local authorized certificate in terminal |
CN112491836B (en) * | 2020-11-16 | 2022-04-22 | 新华三技术有限公司合肥分公司 | Communication system, method, device and electronic equipment |
CN112100682B (en) * | 2020-11-23 | 2021-02-19 | 北京软通智慧城市科技有限公司 | Identity information protection system and method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1656773A (en) * | 2002-05-24 | 2005-08-17 | 艾利森电话股份有限公司 | Method for authenticating a user to a service of a service provider |
CN1917711A (en) * | 2006-08-29 | 2007-02-21 | 中国移动通信集团公司 | Method for processing information of user's ID |
-
2007
- 2007-04-16 CN CN2007101004921A patent/CN101291220B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1656773A (en) * | 2002-05-24 | 2005-08-17 | 艾利森电话股份有限公司 | Method for authenticating a user to a service of a service provider |
CN1917711A (en) * | 2006-08-29 | 2007-02-21 | 中国移动通信集团公司 | Method for processing information of user's ID |
Also Published As
Publication number | Publication date |
---|---|
CN101291220A (en) | 2008-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111131242B (en) | Authority control method, device and system | |
US10652226B2 (en) | Securing communication over a network using dynamically assigned proxy servers | |
CN101120569B (en) | Remote access system and method for user to remotely access terminal equipment from subscriber terminal | |
JP4579546B2 (en) | Method and apparatus for handling user identifier in single sign-on service | |
JP4742903B2 (en) | Distributed authentication system and distributed authentication method | |
CN101582769B (en) | Authority setting method of user access network and equipment | |
US9699167B1 (en) | Distributed authentication | |
CN102739664B (en) | Improve the method and apparatus of safety of network ID authentication | |
US8402511B2 (en) | LDAPI communication across OS instances | |
US20080141333A1 (en) | Method and system for object-based multi-level security in a service oriented architecture | |
CN105518689B (en) | Method and system relating to user authentication for accessing a data network | |
CN101291220B (en) | System, device and method for identity security authentication | |
CN102006299A (en) | Trustworthy internet-oriented entity ID (Identity)-based ID authentication method and system | |
CN101986598B (en) | Authentication method, server and system | |
CN101540757A (en) | Method and system for identifying network and identification equipment | |
CN101291221B (en) | A method, communication system, and device for user identity privacy protection | |
WO2017210914A1 (en) | Method and apparatus for transmitting information | |
CN118890518A (en) | A security authentication method for smart set-top box | |
US9232078B1 (en) | Method and system for data usage accounting across multiple communication networks | |
KR101471880B1 (en) | System for authenticating clients | |
CN114024755B (en) | Service access control method, device, equipment and computer readable storage medium | |
WO2005046119A1 (en) | A method of setting up the association between the session transaction identification and the network application entity | |
Nandhakumar et al. | Non repudiation for internet access by using browser based user authentication mechanism | |
Venezuela et al. | Liberty ID-WSF Security and Privacy Overview | |
KR20050055852A (en) | Service control system and method using sub-identifier |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100818 |