[go: up one dir, main page]

CN105871778A - Security access authentication method for electricity bill payment system for interactive television system - Google Patents

Security access authentication method for electricity bill payment system for interactive television system Download PDF

Info

Publication number
CN105871778A
CN105871778A CN201510028569.3A CN201510028569A CN105871778A CN 105871778 A CN105871778 A CN 105871778A CN 201510028569 A CN201510028569 A CN 201510028569A CN 105871778 A CN105871778 A CN 105871778A
Authority
CN
China
Prior art keywords
information
interactive television
access
interface server
firewall
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510028569.3A
Other languages
Chinese (zh)
Inventor
邢碧云
周洪亮
陈丽芳
茹剑文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Jincheng Power Supply Co of State Grid Shanxi Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Jincheng Power Supply Co of State Grid Shanxi Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Jincheng Power Supply Co of State Grid Shanxi Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201510028569.3A priority Critical patent/CN105871778A/en
Publication of CN105871778A publication Critical patent/CN105871778A/en
Pending legal-status Critical Current

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

本发明公开了一种互动电视系统的交纳电费系统的安全访问认证方法,包括步骤一,第一防火墙读取机顶盒的请求信息,请求信息包括账户代码、校验码、访问协议、设备编码;步骤二,第一防火墙验证请求信息之后,抽取请求信息中的访问协议、设备编码和请求内容,生成任务信息,并发送至接口服务器;步骤三,接口服务器接收任务信息,根据任务信息的设备编码和请求内容从外部读取对应的外部信息并反馈至第一防火墙;步骤四,第一防火墙根据设备编码将外部信息发送至对应的机顶盒。本发明的互动电视系统的交纳电费系统的安全访问认证方法正对互动电视缴费的系统进行了针对性的网络结构设计,并且通过设定针对性的数据结构和内容来实现更好的安全性能。

The invention discloses a security access authentication method for an electricity fee payment system of an interactive television system, which includes step 1, the first firewall reads the request information of the set-top box, and the request information includes account code, verification code, access protocol, and equipment code; the steps 2. After the first firewall verifies the request information, it extracts the access protocol, device code and request content in the request information, generates task information, and sends it to the interface server; step 3, the interface server receives the task information, and according to the device code and request content of the task information The request content reads the corresponding external information from the outside and feeds it back to the first firewall; step 4, the first firewall sends the external information to the corresponding set-top box according to the device code. The security access authentication method of the electric bill payment system of the interactive TV system of the present invention is carrying out targeted network structure design for the interactive TV bill payment system, and achieves better security performance by setting targeted data structures and contents.

Description

互动电视系统的交纳电费系统的安全访问认证方法Security access authentication method of electric bill payment system of interactive television system

技术领域technical field

本发明涉及网络访问的安全认证,更具体地说,涉及互动电视系统的交纳电费系统的安全访问认证方法。The present invention relates to the security authentication of network access, more specifically, to the security access authentication method of the electricity fee payment system of the interactive television system.

背景技术Background technique

目前国内数字电视的发展进入了高潮期,各地传统的模拟有线电视都在改造建设为数字电视。数字电视采用了双向数据传输技术,改变了传统电视“我播你看”的模式,给电视增加了交互能力,使人们可以通过电视开展很多新式的服务,比如视频点播、网上购物、远程教学等,使得电视机成为名副其实的信息家电。At present, the development of domestic digital TV has entered a climax period, and the traditional analog cable TV in various places is being transformed into digital TV. Digital TV adopts two-way data transmission technology, which changes the traditional TV mode of "I broadcast and you watch", adds interactive capabilities to TV, and enables people to carry out many new services through TV, such as video on demand, online shopping, distance learning, etc. , making the TV a veritable information appliance.

互动电视自助交纳电费系统连通的各业务系统都是涉及到关键行业的关键系统,因此安全机制是系统建设过程中的重中之重,尤其涉及到网络安全。The business systems connected by the interactive TV self-service electricity bill payment system are all key systems related to key industries, so the security mechanism is the top priority in the system construction process, especially when it comes to network security.

网络安全是指网络系统的硬件、软件及其系统中的数据受到保护,不因偶然的或者恶意的原因而遭受到破坏、更改、泄露,系统连续可靠正常地运行,网络服务不中断。网络安全包含网络设备安全、网络信息安全、网络软件安全。从广义来说,凡是涉及到网络上信息的保密性、完整性、可用性、真实性和可控性的相关技术和理论都是网络安全的研究领域。网络安全是一门涉及计算机科学、网络技术、通信技术、密码技术、信息安全技术、应用数学、数论、信息论等多种学科的综合性学科。Network security means that the hardware and software of the network system and the data in the system are protected from being damaged, changed, or leaked due to accidental or malicious reasons, the system runs continuously and reliably, and the network service is not interrupted. Network security includes network equipment security, network information security, and network software security. In a broad sense, all related technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network are the research fields of network security. Network security is a comprehensive subject involving computer science, network technology, communication technology, cryptography technology, information security technology, applied mathematics, number theory, information theory and other disciplines.

国际标准化组织(ISO)在开放系统互联参考模型(OSI/RM)的基础上,于1989年制定了在OSI环境下解决网络安全的规则:安全体系结构。它扩充了基本参考模型,加入了安全问题的各个方面,为开放系统的安全通信提供了一种概念性、功能性及一致性的途径。OSI安全体系包含七个层次:物理层、数据链路层、网络层、传输层、会话层、表示层和应用层。在各层次间进行的安全机制有:Based on the Open Systems Interconnection Reference Model (OSI/RM), the International Organization for Standardization (ISO) formulated the rules for addressing network security in the OSI environment in 1989: Security Architecture. It extends the basic reference model to include various aspects of security issues, providing a conceptual, functional and consistent approach to secure communication in open systems. The OSI security system consists of seven layers: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. The security mechanisms carried out between the various levels are:

1.加密机制:衡量一个加密技术的可靠性,主要取决于解密过程的难度,而这取决于密钥的长度和算法。1. Encryption mechanism: Measuring the reliability of an encryption technology mainly depends on the difficulty of the decryption process, which depends on the length and algorithm of the key.

2.安全认证机制:安全认证是维持电子商务活动正常进行的保证,它涉及到安全管理、加密处理、PKI及认证管理等重要问题。目前已经有一套完整的技术解决方案可以应用。采用国际通用的PKI技术、X.509证书标准和X.500信息发布标准等技术标准可以安全发放证书,进行安全认证。2. Security authentication mechanism: Security authentication is the guarantee for maintaining the normal operation of e-commerce activities, and it involves important issues such as security management, encryption processing, PKI and authentication management. There is already a complete set of technical solutions that can be applied. Adopting international common PKI technology, X.509 certificate standard and X.500 information release standard and other technical standards can safely issue certificates and carry out security certification.

3.访问控制策略:访问控制是网络安全防范和保护的主要策略,它的主要任务是保证网络资源不被非法使用和非常访问。它也是维护网络系统安全、保护网络资源的重要手段。各种安全策略必须相互配合才能真正起到保护作用。3. Access control strategy: Access control is the main strategy for network security prevention and protection, and its main task is to ensure that network resources are not illegally used or accessed abnormally. It is also an important means to maintain network system security and protect network resources. Various security policies must cooperate with each other to truly play a protective role.

然而,正对互动电视自主缴纳电费这一创新的业务模式,目前没有对应的网络安全技术来对这一模式进行针对性的安全设计,因此存在一定的安全隐患。However, for the innovative business model of interactive TV paying electricity bills independently, there is currently no corresponding network security technology to carry out targeted security design for this model, so there are certain security risks.

发明内容Contents of the invention

针对现有技术中存在的互动电视自主缴纳电费模式没有针对性的安全设计,本发明的目的是提供互动电视系统的交纳电费系统的安全访问认证方法。In view of the fact that there is no targeted security design in the interactive TV autonomous electricity payment mode existing in the prior art, the purpose of the present invention is to provide a secure access authentication method for the electricity fee payment system of the interactive TV system.

为实现上述目的,本发明采用如下技术方案:To achieve the above object, the present invention adopts the following technical solutions:

一种互动电视系统的交纳电费系统的安全访问认证方法,包括步骤一,第一防火墙读取机顶盒的请求信息,请求信息包括账户代码、校验码、访问协议、设备编码;步骤二,第一防火墙验证请求信息之后,抽取请求信息中的访问协议、设备编码和请求内容,生成任务信息,并发送至接口服务器;步骤三,接口服务器接收任务信息,根据任务信息的设备编码和请求内容从外部读取对应的外部信息并反馈至第一防火墙;步骤四,第一防火墙根据设备编码将外部信息发送至对应的机顶盒。A security access authentication method for an electricity bill payment system of an interactive television system, comprising step 1, the first firewall reads the request information of the set-top box, and the request information includes account code, verification code, access protocol, and device code; step 2, the first After the firewall verifies the request information, it extracts the access protocol, device code, and request content in the request information, generates task information, and sends it to the interface server; step 3, the interface server receives the task information, and receives the task information from the outside according to the device code and request content of the task information. Read the corresponding external information and feed it back to the first firewall; step 4, the first firewall sends the external information to the corresponding set-top box according to the equipment code.

根据本发明的一实施例,外部信息包括电力专网的电力信息。According to an embodiment of the present invention, the external information includes electric power information of a private electric power network.

根据本发明的一实施例,电力专网和接口服务器之间设有第二防火墙,第二防火墙根据设备编码和请求内容将对应的电力信息发送至接口服务器。According to an embodiment of the present invention, a second firewall is provided between the private power network and the interface server, and the second firewall sends corresponding power information to the interface server according to the equipment code and request content.

根据本发明的一实施例,外部信息包括银联专网的支付信息。According to an embodiment of the present invention, the external information includes payment information of UnionPay private network.

根据本发明的一实施例,银联专网和接口服务器之间设有第三防火墙,第三防火墙根据设备编码和请求内容将对应的支付信息发送至接口服务器。According to an embodiment of the present invention, a third firewall is installed between the UnionPay private network and the interface server, and the third firewall sends corresponding payment information to the interface server according to the equipment code and request content.

根据本发明的一实施例,第一防火墙包还包括调度协议,调度协议将所有的机顶盒分组,并通过分组限制组内机顶盒的访问参数。According to an embodiment of the present invention, the first firewall package further includes a scheduling protocol, which groups all set-top boxes and restricts access parameters of the set-top boxes in the group through the grouping.

根据本发明的一实施例,访问参数包括访问时间、访问频率、请求信息。According to an embodiment of the present invention, the access parameters include access time, access frequency, and request information.

在上述技术方案中,本发明的互动电视系统的交纳电费系统的安全访问认证方法正对互动电视缴费的系统进行了针对性的网络结构设计,并且通过设定针对性的数据结构和内容来实现更好的安全性能。In the above technical solution, the secure access authentication method of the electricity bill payment system of the interactive TV system of the present invention is carrying out a targeted network structure design for the interactive TV bill payment system, and realizes it by setting targeted data structures and contents Better safety performance.

附图说明Description of drawings

图1是本发明互动电视系统的交纳电费系统的安全访问认证的网络架构;Fig. 1 is the network architecture of the secure access authentication of the electricity bill payment system of the interactive television system of the present invention;

图2是本发明互动电视系统的交纳电费系统的安全访问认证方法的流程图。Fig. 2 is a flow chart of the security access authentication method of the electricity fee payment system of the interactive television system of the present invention.

具体实施方式detailed description

下面结合附图和实施例进一步说明本发明的技术方案。The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

参照图1,为了实现针对特定用途系统的安全,本发明的方法首先适用于特定结构的系统中,其主要包括并行连接的多个机顶盒,所有的机顶盒均连直接第一防火墙,第一防火墙连接至接口服务器。接口服务器分别连接第二防火墙和第三方火墙,第二防火墙连接电力专网,第三防火墙连接银联专网。对于接口服务器而言,第二防火墙、第三方火墙及其外部的电力专网、银联专网均是外部信息。With reference to Fig. 1, in order to realize the security for specific-purpose system, method of the present invention is first applicable to in the system of specific structure, and it mainly comprises a plurality of set-top boxes of parallel connection, and all set-top boxes all connect direct first firewall, and the first firewall connects to the interface server. The interface server is respectively connected to the second firewall and the third-party firewall, the second firewall is connected to the electric power private network, and the third firewall is connected to the UnionPay private network. For the interface server, the second firewall, the third-party firewall, and the external power private network and UnionPay private network are all external information.

参照图2,本发明的互动电视系统的交纳电费系统的安全访问认证方法主要包括以下的4个步骤:With reference to Fig. 2, the secure access authentication method of the electricity bill payment system of the interactive television system of the present invention mainly comprises the following 4 steps:

步骤S1:第一防火墙读取机顶盒的请求信息,请求信息包括账户代码、校验码、访问协议、设备编码。Step S1: The first firewall reads the request information of the set-top box, and the request information includes account code, verification code, access protocol, and device code.

步骤S2:第一防火墙验证请求信息之后,抽取请求信息中的访问协议、设备编码和请求内容,生成任务信息,并发送至接口服务器。Step S2: After verifying the request information, the first firewall extracts the access protocol, device code and request content in the request information, generates task information, and sends it to the interface server.

步骤S3:接口服务器接收任务信息,根据任务信息的设备编码和请求内容从外部读取对应的外部信息并反馈至第一防火墙。在本发明中,外部信息包括电力专网的电力信息和银联专网的支付信息。Step S3: The interface server receives the task information, reads the corresponding external information from the outside according to the device code and request content of the task information, and feeds it back to the first firewall. In the present invention, the external information includes the electric power information of the electric power private network and the payment information of the UnionPay private network.

此外,电力专网和接口服务器之间设有第二防火墙,第二防火墙根据设备编码和请求内容将对应的电力信息发送至接口服务器。银联专网和接口服务器之间设有第三防火墙,第三防火墙根据设备编码和请求内容将对应的支付信息发送至接口服务器。In addition, a second firewall is set between the private power network and the interface server, and the second firewall sends corresponding power information to the interface server according to the equipment code and request content. A third firewall is set between the UnionPay private network and the interface server, and the third firewall sends the corresponding payment information to the interface server according to the equipment code and request content.

步骤S4:第一防火墙根据设备编码将外部信息发送至对应的机顶盒。Step S4: The first firewall sends the external information to the corresponding set-top box according to the device code.

另一方面,第一防火墙包还包括调度协议,调度协议将所有的机顶盒分组,并通过分组限制组内机顶盒的访问参数,访问参数包括访问时间、访问频率、请求信息。On the other hand, the first firewall package also includes a scheduling protocol. The scheduling protocol groups all the set-top boxes and restricts the access parameters of the set-top boxes in the group through the grouping. The access parameters include access time, access frequency, and request information.

图2所示的上述4个主要步骤具有以下的特点:The above four main steps shown in Figure 2 have the following characteristics:

1.在电力专网与有线广播电视专网、银联网络与有线广播电视专网之间采用光纤专线进行数据传输,确保了数据访问的独立性。1. Fiber-optic dedicated lines are used for data transmission between the power private network and the cable radio and television network, and between the UnionPay network and the cable broadcast and TV network, ensuring the independence of data access.

2.在各单位网络接口处都安装了硬件防火墙,并且在防火墙上进行了安全策略设置:限定IP:指定设备的IP才能通过防火墙访问内部网络。2. A hardware firewall is installed at the network interface of each unit, and security policy settings are made on the firewall: limited IP: only the IP of the specified device can access the internal network through the firewall.

3.限定端口:根据业务系统的端口访问需要在防火墙上开通指定端口,并对访问协议进行限制。3. Restricted ports: According to the port access requirements of the business system, open designated ports on the firewall and restrict access protocols.

4.对硬件防火墙日志进行跟踪分析,检查网络访问是否正常。4. Track and analyze the hardware firewall logs to check whether the network access is normal.

5.涉及银行业务的通信内容均加密传输,通过非法手段无法截取解析任何有效信息。5. The communication content related to banking business is encrypted and transmitted, and any valid information cannot be intercepted and analyzed through illegal means.

6.互动平台内部网络单独划分子网,不和其他网络互联互通,只接受机顶盒终端上行数据;需要接人互动平台内部网络的部门,均进行安全认证。6. The internal network of the interactive platform is divided into separate subnets, not interconnected with other networks, and only accepts the uplink data of the set-top box terminal; departments that need to connect to the internal network of the interactive platform must undergo security certification.

本发明在操作系统层面上,从系统安全的角度出发,采用了更为安全可靠的Linux操作系统。一般而言,安全操作系统应支持标识与鉴别、自主访问控制、强制访问控制、最小特权管理、可信通路、隐蔽通道分析处理及安全审计等多种安全机制。在晋城互动电视自助交纳电费系统的应用服务器上,采取了如下方法保证系统安全性:On the operating system level, the present invention adopts a more secure and reliable Linux operating system from the perspective of system security. Generally speaking, a secure operating system should support multiple security mechanisms such as identification and authentication, autonomous access control, mandatory access control, least privilege management, trusted channels, covert channel analysis and processing, and security auditing. On the application server of the Jincheng interactive TV self-service electricity bill payment system, the following methods are adopted to ensure system security:

1.在Linux操作系统安装时,只安装需要的软件包,而不是采取默认配置,安装了大量无用的软件包。1. When installing the Linux operating system, only install the required software packages, instead of adopting the default configuration and installing a large number of useless software packages.

2.开启Linux防火墙,关闭不需要的任何端口,关闭系统SSH远程访问。2. Open the Linux firewall, close any unnecessary ports, and close the system SSH remote access.

3.严格管理系统账户,删除多余操作系统账号,并针对不同应用分配不同用户,严格控制访问权限。3. Strictly manage system accounts, delete redundant operating system accounts, assign different users to different applications, and strictly control access rights.

4.在应用系统层面,对应用软件进行了防SQL注入测试,保证数据库访问安全性。4. At the application system level, the application software has been tested against SQL injection to ensure the security of database access.

综上,本发明通过在网络安全及系统安全上的种种措施,晋城互动电视自助交纳电费系统提高了系统的安全性,保障了用户信息安全,也保障了电力、有线、银联系统的安全性。To sum up, the present invention improves the security of the system through various measures in network security and system security, Jincheng interactive TV self-service electricity bill payment system, guarantees the security of user information, and also guarantees the security of electric power, cable, and UnionPay systems.

本技术领域中的普通技术人员应当认识到,以上的实施例仅是用来说明本发明,而并非用作为对本发明的限定,只要在本发明的实质精神范围内,对以上所述实施例的变化、变型都将落在本发明的权利要求书范围内。Those of ordinary skill in the art should recognize that the above embodiments are only used to illustrate the present invention, rather than as a limitation to the present invention, as long as within the scope of the spirit of the present invention, the above-described embodiments Changes and modifications will fall within the scope of the claims of the present invention.

Claims (7)

1. a secure access authentication method for the electricity charge system of paying of interactive television system, its feature exists In, including:
Step one, the solicited message of the first fire wall reading machine top box, described solicited message includes account Code, check code, access protocal, device coding;
Step 2, after described solicited message verified by the first fire wall, extracts in described solicited message Access protocal, device coding and request content, generate mission bit stream, and send to interface server;
Step 3, described interface server receives described mission bit stream, according to setting of described mission bit stream Standby coding from outside external information corresponding to reading and feeds back to described first fire wall with request content;
Step 4, described external information is sent to right by described first fire wall according to described device coding The Set Top Box answered.
2. the secure access certification of the electricity charge system of paying of interactive television system as claimed in claim 1 Method, it is characterised in that described external information includes the power information of power private network.
3. the secure access certification of the electricity charge system of paying of interactive television system as claimed in claim 2 Method, it is characterised in that be provided with the second fire wall between described power private network and described interface server, Corresponding power information is sent to institute by described second fire wall according to described device coding and request content State interface server.
4. the secure access certification of the electricity charge system of paying of interactive television system as claimed in claim 3 Method, it is characterised in that described external information includes the payment information of Unionpay's private network.
5. the secure access certification of the electricity charge system of paying of interactive television system as claimed in claim 4 Method, it is characterised in that be provided with the 3rd fire wall between described Unionpay private network and described interface server, Corresponding payment information is sent to institute by described 3rd fire wall according to described device coding and request content State interface server.
6. the secure access certification of the electricity charge system of paying of interactive television system as claimed in claim 5 Method, it is characterised in that described first fire wall bag also includes scheduling protocol, described scheduling protocol will All of Set Top Box is grouped, and by the access parameter of Set Top Box in packet restriction group.
7. the secure access certification of the electricity charge system of paying of interactive television system as claimed in claim 6 Method, it is characterised in that described access parameter includes access time, access frequency, solicited message.
CN201510028569.3A 2015-01-20 2015-01-20 Security access authentication method for electricity bill payment system for interactive television system Pending CN105871778A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510028569.3A CN105871778A (en) 2015-01-20 2015-01-20 Security access authentication method for electricity bill payment system for interactive television system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510028569.3A CN105871778A (en) 2015-01-20 2015-01-20 Security access authentication method for electricity bill payment system for interactive television system

Publications (1)

Publication Number Publication Date
CN105871778A true CN105871778A (en) 2016-08-17

Family

ID=56623165

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510028569.3A Pending CN105871778A (en) 2015-01-20 2015-01-20 Security access authentication method for electricity bill payment system for interactive television system

Country Status (1)

Country Link
CN (1) CN105871778A (en)

Similar Documents

Publication Publication Date Title
US9450934B2 (en) Managed access to content and services
JP6349347B2 (en) Physically secure authorization for utility applications
US8799981B2 (en) Privacy protection system
Metere et al. Securing the electric vehicle charging infrastructure
US20110173443A1 (en) Secure extranet server
EP1913728B1 (en) Total exchange session security
CN201194396Y (en) Safe gateway platform based on transparent proxy gateway
WO2014196966A1 (en) Technologies for hardening the security of digital information on client platforms
CN105577639B (en) Trusted Device Control Message
CN114500111B (en) Multi-platform-based automatic project audit data processing method and system
KR100850506B1 (en) System and method for secure web service using double enforcement of user authentication
CN108322488A (en) The system that trust data is shared and distributes is realized in multiple car networkings
KR102055888B1 (en) Encryption and decryption method for protecting information
Bameyi et al. End-to-end security in communication networks: a review
Lekidis et al. Open V2X management platform cyber-resilience and data privacy mechanisms
CN105871778A (en) Security access authentication method for electricity bill payment system for interactive television system
Burmester et al. Towards a secure electricity grid
CN107342999A (en) A kind of system and method based on agent protection certificate is strengthened
CN102412962B (en) The distribution method and device of group secure connection joint ciphering key AK
Keerthi et al. Code Certificate a verification technique for secure data transmission
Limbasiya et al. Attacks on authentication and authorization models in smart grid
KR20200106118A (en) Multi-security system and method for IoT device
Sabbari et al. A security model and its strategies for web services
KR102160453B1 (en) Protection system and method of electric power systems
Ghafari et al. SFAMSS: a secure framework for atm machines via secret sharing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160817

WD01 Invention patent application deemed withdrawn after publication