[go: up one dir, main page]

CN117914601B - Multistage safety authentication and access control system of file robot - Google Patents

Multistage safety authentication and access control system of file robot Download PDF

Info

Publication number
CN117914601B
CN117914601B CN202410090424.5A CN202410090424A CN117914601B CN 117914601 B CN117914601 B CN 117914601B CN 202410090424 A CN202410090424 A CN 202410090424A CN 117914601 B CN117914601 B CN 117914601B
Authority
CN
China
Prior art keywords
authentication
security
access control
level
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410090424.5A
Other languages
Chinese (zh)
Other versions
CN117914601A (en
Inventor
李燕强
齐少华
马国伟
张泽宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Indoor Technology Co ltd
Original Assignee
Hebei Indoor Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei Indoor Technology Co ltd filed Critical Hebei Indoor Technology Co ltd
Priority to CN202410090424.5A priority Critical patent/CN117914601B/en
Publication of CN117914601A publication Critical patent/CN117914601A/en
Application granted granted Critical
Publication of CN117914601B publication Critical patent/CN117914601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

本发明属于档案数据处理技术领域,具体的说是档案机器人的多级安全认证及访问控制系统,包括安全认证系统和访问控制系统;所述安全认证系统包括身份认证、证书认证;所述身份认证包括密码、数字签名,以密码和数字签名结合完成身份认证;所述证书认证包括USB KEY,且所述USB KEY内存储有用户私钥和数字证书;身份认证及访问控制系统采用密码加USB KEY软硬件相结合配合一次一密的双因子认证模式;要使USB KEY能正常工作,需要用户输入正确的USB KEY密码;因此密码丢失,没有USB KEY无法通过认证;USB KEY丢失,没有密码也无法认证;实现多级认证方式,并且密码加USB KEY配合双因子认证,有效地提高身份认证系统的安全级别。

The invention belongs to the technical field of archive data processing, and specifically relates to a multi-level security authentication and access control system of an archive robot, comprising a security authentication system and an access control system; the security authentication system comprises identity authentication and certificate authentication; the identity authentication comprises a password and a digital signature, and the identity authentication is completed by combining the password and the digital signature; the certificate authentication comprises a USB KEY, and the USB KEY stores a user private key and a digital certificate; the identity authentication and access control system adopts a password plus USB KEY hardware and software combined with a one-time one-pass double-factor authentication mode; in order for the USB KEY to work normally, the user needs to input a correct USB KEY password; therefore, if the password is lost, the authentication cannot be passed without the USB KEY; if the USB KEY is lost, the authentication cannot be passed without the password; a multi-level authentication method is realized, and the password plus the USB KEY is combined with the double-factor authentication, so as to effectively improve the security level of the identity authentication system.

Description

档案机器人的多级安全认证及访问控制系统Multi-level security authentication and access control system for archive robots

技术领域Technical Field

本发明属于档案数据处理技术领域,具体的说是档案机器人的多级安全认证及访问控制系统。The invention belongs to the technical field of archive data processing, in particular to a multi-level security authentication and access control system for an archive robot.

背景技术Background Art

公司里面的很多文件都可以用档案管理机器人进行管理,比如说销售合同、采购订单、供应商协议、财务报表等重要档案;并且档案机器人以网络的形式对档案进行管理;公司人员在通过档案机器人对档案进行查询、提取等操作前需要提前进行网络认证;伴随着网络应用的普及,网络安全事故也时有发生,加强网络安全的工作刻不容缓。Many documents in the company can be managed by file management robots, such as sales contracts, purchase orders, supplier agreements, financial statements and other important files; and the file robots manage the files in the form of a network; company personnel need to perform network authentication in advance before querying, extracting and other operations on the files through the file robots; with the popularization of network applications, network security incidents also occur from time to time, and strengthening network security is urgent.

网络认证技术是网络安全技术的重要组成部分之一。认证指的是证实被认证对象是否属实和是否有效的一个过程。其基本思想是通过验证被认证对象的属性来达到确认被认证对象是否真实有效的目的。被认证对象的属性可以是口令、数字签名或者如指纹、声音、视网膜这样的生理特征。认证常常被用于通信双方相互确认身份,以保证通信的安全。Network authentication technology is an important part of network security technology. Authentication refers to the process of verifying whether the authenticated object is authentic and valid. The basic idea is to verify the attributes of the authenticated object to confirm whether the authenticated object is authentic and valid. The attributes of the authenticated object can be passwords, digital signatures, or physiological characteristics such as fingerprints, voices, and retina. Authentication is often used for both parties in communication to confirm each other's identities to ensure the security of communication.

访问控制也是网络安全技术中不可忽略的部分,访问控制使访问传输的数据具有加密性、完整性,防止数据被窃取和窜改。Access control is also an important part of network security technology. Access control ensures encryption and integrity of the data being transmitted, thus preventing the data from being stolen and tampered with.

然而传统的网络应用在认证及传输方面均存在着安全隐患,其原因为:However, traditional network applications have security risks in authentication and transmission. The reasons are as follows:

没有有效的身份认证机制。传统的身份认证均是采用用户名加密码的方式。这种方式存在着以下弱点:口令简单了容易被猜测,口令复杂了难于记忆,易于丢失;并且,应用或者访问的用户端越多,口令越多,越难于管理;There is no effective identity authentication mechanism. Traditional identity authentication uses username and password. This method has the following weaknesses: simple passwords are easy to guess, complex passwords are difficult to remember and easy to lose; and the more applications or access clients there are, the more passwords there are, and the more difficult it is to manage;

没有有效的访问传输安全机制:当前大部分的网络应用均是采用TCP协议,这种协议在网络传输中没有数据保护机制,容易造成访问过程中数据被窜改、窃取。No effective access transmission security mechanism: Most current network applications use the TCP protocol, which has no data protection mechanism during network transmission, making it easy for data to be tampered with or stolen during the access process.

发明内容Summary of the invention

为了弥补现有技术的不足,解决上述的技术问题;本发明提出了档案机器人的多级安全认证及访问控制系统。In order to make up for the deficiencies of the prior art and solve the above-mentioned technical problems, the present invention proposes a multi-level security authentication and access control system for an archive robot.

本发明解决其技术问题所采用的技术方案是:本发明提出了档案机器人的多级安全认证及访问控制系统,包括安全认证系统和访问控制系统;The technical solution adopted by the present invention to solve its technical problem is: the present invention proposes a multi-level security authentication and access control system for an archive robot, including a security authentication system and an access control system;

所述安全认证系统包括身份认证、证书认证;所述身份认证包括密码、数字签名,以密码和数字签名结合完成身份认证;所述证书认证包括USB KEY,且所述USB KEY内存储有用户私钥和数字证书;The security authentication system includes identity authentication and certificate authentication; the identity authentication includes password and digital signature, and the identity authentication is completed by combining password and digital signature; the certificate authentication includes USB KEY, and the USB KEY stores the user's private key and digital certificate;

所述安全认证系统还包括安全认证网关,所述安全认证网关用于对验证通过的用户颁发访问应用系统的令牌,并且对于用户的每一次访问请求代理服务都将基于Kerberos协议验证用户的访问令牌,以确定用户的合法身份;The security authentication system also includes a security authentication gateway, which is used to issue a token for accessing the application system to the user who has passed the verification, and for each access request of the user, the proxy service will verify the user's access token based on the Kerberos protocol to determine the user's legal identity;

所述访问控制系统包括以多级安全认证手段为基础的强制访问控制模块。The access control system includes a mandatory access control module based on multi-level security authentication means.

优选的,安全认证系统还包括双因子认证模式,且双因子认证模式为一次一密。Preferably, the security authentication system also includes a two-factor authentication mode, and the two-factor authentication mode is a one-time one-password mode.

优选的,访问控制系统加入管理平台和中间件模块;Preferably, the access control system incorporates a management platform and a middleware module;

管理平台包括:对分布式信息系统中的用户和文件进行定级:采用公钥密码技术保证访问请求/应答的安全信息交互:记录用户的历史访问信息,供日后进行安全审计;The management platform includes: Classification of users and files in distributed information systems: Use of public key cryptography to ensure secure information exchange of access requests/responses: Recording of historical user access information for future security audits;

中间件模块:是分布式信息系统和管理平台之间的信息交互接口,通过信息加密和解密、身份认证和口令校验方式完成两者之间信息的安全交互。Middleware module: It is the information interaction interface between the distributed information system and the management platform, which completes the secure interaction of information between the two through information encryption and decryption, identity authentication and password verification.

优选的,所述访问控制系统以强制访问控制模块为基础,加入管理平台和中间件模块,组成多级安全策略模型;所述模型基本要素包括:Preferably, the access control system is based on the mandatory access control module, and adds a management platform and a middleware module to form a multi-level security policy model; the basic elements of the model include:

主体:指用户,以S表示,如式(1)所示;Subject: refers to the user, represented by S, as shown in formula (1);

S={s1, s2, ..., sn} (1);S={s 1 , s 2 , ..., s n } (1);

客体:指文件、数据、档案,以O表示,如式(2)所示;Object: refers to files, data, and archives, represented by O, as shown in formula (2);

O={o1,o2, ...,on} (2);O={o 1 , o 2 , ..., on } (2);

安全等级:是主体、客体的梯度安全标记,包括主体、客体密级和范畴集;主体、客体密级表示主体、客体保密性的敏感程度,以C表示,如式(3)所示;Security level: It is the gradient security mark of the subject and object, including the subject and object confidentiality level and category set; the subject and object confidentiality level indicates the sensitivity of the subject and object confidentiality, represented by C, as shown in formula (3);

C={c1, c2, ..., cn} (3);C={c 1 , c 2 , ..., c n } (3);

范畴集表示组织中部门或类别的集合,以K表示,如式(4)所示;The category set represents the set of departments or categories in the organization, denoted by K, as shown in formula (4);

K={k1,k2, ...,kn} (4);K={k 1 , k 2 , ..., k n } (4);

系统中所有主体和客体均分配了密级和范畴集,以F表示,如式(5)所示;All subjects and objects in the system are assigned confidentiality levels and category sets, represented by F, as shown in formula (5);

F={CS×CO×KS×KO} (5);F={C S ×C O ×K S ×K O } (5);

访问控制矩阵:用矩阵的形式描述任意时刻系统中自主授权状态,以M表示,如式(6)所示:Access control matrix: The autonomous authorization state in the system at any time is described in the form of a matrix, represented by M, as shown in formula (6):

访问属性集:描述主体访问客体的方式,以AS表示,如式(7)所示;其中执行为E(execute),只读为R(read),添加为A(append),读/写为W(write);Access attribute set: describes the way the subject accesses the object, expressed as AS, as shown in formula (7); where execution is E (execute), read-only is R (read), add is A (append), and read/write is W (write);

AS={E, R,A,W} (7);AS={E, R, A, W} (7);

系统状态:表示多级安全系统所有可能的系统状态,以V表示,如式(8)所示;System state: represents all possible system states of the multi-level safety system, represented by V, as shown in formula (8);

V={v1,v2,...,vn} (8);V={v 1 , v 2 ,..., v n } (8);

在系统状态下,主体S对客体O的访问属性权限,以b表示,如(9)式所示;In the system state, the access attribute permission of subject S to object O is represented by b, as shown in formula (9);

b∈S×O×AS (9);b∈S×O×AS (9);

多级安全特性:多级安全特性定义系统状态的安全性,体现多级安全策略,包括自主安全性、简单安全性和多级安全性;Multi-level security features: Multi-level security features define the security of the system state and reflect multi-level security strategies, including autonomous security, simple security, and multi-level security;

状态V=(b,M,F)满足自主安全性,以表示,如式(10)所示;State V = (b, M, F) satisfies autonomous safety, It is expressed as shown in formula (10);

状态V=(b,M,F)满足简单安全性,以x表示,如式(11)所示;The state V = (b, M, F) satisfies simple security and is represented by x, as shown in formula (11);

状态V=(b,M,F)满足多级安全性,以表示,如式(12)所示;State V = (b, M, F) satisfies multi-level security, It is expressed as shown in formula (12);

优选的,访问控制系统以单点登录的方式进行身份验证,且单点登录的方式中建立保护机制。Preferably, the access control system performs identity authentication in a single sign-on manner, and a protection mechanism is established in the single sign-on manner.

优选的,访问控制系统内还包括有KDC,且KDC具有生成加密的带时间戳的票据。Preferably, the access control system also includes a KDC, and the KDC has the function of generating encrypted tickets with timestamps.

本发明的有益效果如下:The beneficial effects of the present invention are as follows:

1.本发明的档案机器人的多级安全认证及访问控制系统,身份认证及访问控制系统采用密码加USB KEY软硬件相结合配合一次一密的双因子认证模式;要使USB KEY能正常工作,需要用户输入正确的USB KEY密码;因此密码丢失,没有USB KEY无法通过认证;USBKEY丢失,没有密码也无法认证;实现多级认证方式,并且密码加USB KEY配合双因子认证,有效地提高身份认证系统的安全级别。1. The multi-level security authentication and access control system of the archive robot of the present invention adopts a password plus USB KEY software and hardware combined with a one-time one-password two-factor authentication mode; in order for the USB KEY to work normally, the user needs to enter the correct USB KEY password; therefore, if the password is lost, the authentication cannot be passed without the USB KEY; if the USB KEY is lost, the authentication cannot be passed without the password; a multi-level authentication method is realized, and the password plus USB KEY is combined with two-factor authentication, which effectively improves the security level of the identity authentication system.

2.本发明的档案机器人的多级安全认证及访问控制系统,强制访问控制系统根据主体和客体的敏感标记来决定访问模式;以“不上读不下写”的安全特性控制数据按照级别只能从低向高流动,确保敏感数据不泄露,可以安全有效地解决跨域分布式系统之间的信息互操作,保证合法用户对网络信息资源受控正确地使用,限制非法用户的入侵和蓄意破坏,进一步提高身份认证系统的安全级别。2. The multi-level security authentication and access control system of the archive robot of the present invention forces the access control system to determine the access mode according to the sensitive tags of the subject and the object; the security feature of "no reading up and no writing down" controls the data to flow only from low to high levels, ensuring that sensitive data is not leaked, and can safely and effectively solve the information interoperability between cross-domain distributed systems, ensure the controlled and correct use of network information resources by legitimate users, limit the intrusion and deliberate destruction of illegal users, and further improve the security level of the identity authentication system.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

下面结合附图对本发明作进一步说明。The present invention will be further described below in conjunction with the accompanying drawings.

图1是本发明中访问控制系统的安全策略详细步骤图;FIG1 is a detailed step diagram of the security strategy of the access control system in the present invention;

图2是本发明等级映射图;FIG2 is a level mapping diagram of the present invention;

具体实施方式DETAILED DESCRIPTION

下面将结合本发明实施例中附图所示,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.

实施例一:Embodiment 1:

公司里面的很多文件都可以用档案管理机器人进行管理,比如说销售合同、采购订单、供应商协议、财务报表等重要档案;并且档案机器人以网络的形式对档案进行管理;公司人员在通过档案机器人对档案进行查询、提取等操作前需要提前进行网络认证;伴随着网络应用的普及,网络安全事故也时有发生,加强网络安全的工作刻不容缓;Many documents in the company can be managed by the file management robot, such as sales contracts, purchase orders, supplier agreements, financial statements and other important files; and the file robot manages the files in the form of a network; company personnel need to perform network authentication in advance before querying and extracting files through the file robot; with the popularization of network applications, network security incidents also occur from time to time, and it is urgent to strengthen network security;

网络认证技术是网络安全技术的重要组成部分之一;认证指的是证实被认证对象是否属实和是否有效的一个过程;其基本思想是通过验证被认证对象的属性来达到确认被认证对象是否真实有效的目的;被认证对象的属性可以是口令、数字签名或者如指纹、声音、视网膜这样的生理特征;认证常常被用于通信双方相互确认身份,以保证通信的安全;Network authentication technology is an important part of network security technology. Authentication refers to the process of verifying whether the object being authenticated is real and valid. Its basic idea is to verify the attributes of the object being authenticated to confirm whether the object being authenticated is real and valid. The attributes of the object being authenticated can be passwords, digital signatures, or physiological characteristics such as fingerprints, voices, and retina. Authentication is often used by both parties in communication to confirm their identities to ensure the security of communication.

访问控制也是网络安全技术中不可忽略的部分,访问控制使访问传输的数据具有加密性、完整性,防止数据被窃取和窜改;Access control is also an important part of network security technology. Access control ensures the encryption and integrity of the data transmitted and prevents the data from being stolen and tampered with.

然而传统的网络应用在认证及传输方面均存在着安全隐患,其原因为:However, traditional network applications have security risks in authentication and transmission. The reasons are as follows:

没有有效的身份认证机制;传统的身份认证均是采用用户名加密码的方式;这种方式存在着以下弱点:口令简单了容易被猜测,口令复杂了难于记忆,易于丢失;并且,应用或者访问的用户端越多,口令越多,越难于管理;There is no effective identity authentication mechanism; traditional identity authentication adopts the method of username plus password; this method has the following weaknesses: simple passwords are easy to guess, complex passwords are difficult to remember and easy to lose; and the more applications or access clients there are, the more passwords there are, and the more difficult it is to manage;

没有有效的访问传输安全机制:当前大部分的网络应用均是采用TCP协议,这种协议在网络传输中没有数据保护机制,容易造成访问过程中数据被窜改、窃取;No effective access transmission security mechanism: Most current network applications use the TCP protocol, which has no data protection mechanism during network transmission, making it easy for data to be tampered with or stolen during access.

为了有效解决上述问题,档案机器人的多级安全认证及访问控制系统,包括安全认证系统和访问控制系统;In order to effectively solve the above problems, the multi-level security authentication and access control system of the archive robot includes a security authentication system and an access control system;

安全认证系统包括身份认证、证书认证;身份认证包括密码、数字签名,以密码和数字签名结合完成身份认证;证书认证包括USB KEY,且USB KEY内存储有用户私钥和数字证书;The security authentication system includes identity authentication and certificate authentication; identity authentication includes password and digital signature, and the password and digital signature are combined to complete the identity authentication; certificate authentication includes USB KEY, and the USB KEY stores the user's private key and digital certificate;

安全认证系统还包括安全认证网关,安全认证网关用于对验证通过的用户颁发访问应用系统的令牌,并且对于用户的每一次访问请求代理服务都将基于Kerberos协议验证用户的访问令牌,以确定用户的合法身份;The security authentication system also includes a security authentication gateway, which is used to issue tokens to users who have passed the authentication to access the application system. For each access request from the user, the proxy service will verify the user's access token based on the Kerberos protocol to determine the user's legal identity.

访问控制系统包括以多级安全认证手段为基础的强制访问控制模块;The access control system includes a mandatory access control module based on multi-level security authentication means;

安全认证系统还包括双因子认证模式,且双因子认证模式为一次一密;The security authentication system also includes a two-factor authentication mode, and the two-factor authentication mode is a one-time one-password;

具体的:Specific:

安全认证系统为每个用户配备USB KEY,USB KEY经CA系统签发后将存放为用户提供身份证明的唯一证书标识;运用证书认证技术,可以避免单一口令认证的脆弱性,可安全有效地实现客户端和服务端的相互身份认证;同时,采用一次一密的动态协商技术,保证认证传输信息的机密性和完整性;The security authentication system equips each user with a USB KEY. After being issued by the CA system, the USB KEY will store the unique certificate identification that provides identity proof for the user. The use of certificate authentication technology can avoid the vulnerability of single password authentication and can safely and effectively realize mutual identity authentication between the client and the server. At the same time, the one-time dynamic negotiation technology is adopted to ensure the confidentiality and integrity of the authentication transmission information.

用户使用时需通过身份认证客户端软件配合USB KEY,采用基于PKI的握手协议与安全认证网关进行双向身份认证,认证通过后安全认证网关将为用户颁发访问应用系统的令牌;身份认证客户端软件将截获用户的应用访问请求,并通过安全认证网关访问应用服务;对于用户的每一次访问请求代理服务都将基于Kerberos协议验证用户的访问令牌,以确定用户的合法身份;When using, users need to use the identity authentication client software with USB KEY, and use the PKI-based handshake protocol to perform two-way identity authentication with the security authentication gateway. After the authentication is passed, the security authentication gateway will issue a token for the user to access the application system; the identity authentication client software will intercept the user's application access request and access the application service through the security authentication gateway; for each access request of the user, the proxy service will verify the user's access token based on the Kerberos protocol to determine the user's legal identity;

代理服务从用户请求中取得用户访问的服务资源,从访问令牌中取得用户身份信息,并用这两个要素进行RBAC的访问裁决;通过裁决的请求,系统将代理用户访问网络资源;反之,系统将拒绝用户的访问请求;同时,系统可根据用户的要求对网络中传送的数据信息进行数据机密性和完整性保护;The proxy service obtains the service resources that the user accesses from the user request, obtains the user identity information from the access token, and uses these two elements to make RBAC access decisions; if the request passes the decision, the system will proxy the user to access the network resources; otherwise, the system will reject the user's access request; at the same time, the system can protect the confidentiality and integrity of the data information transmitted in the network according to the user's requirements;

安全认证网关从用户访问请求中提取必要信息,形成审计日志;The security authentication gateway extracts necessary information from user access requests and forms an audit log;

另外,传统的身份认证采用用户名加密码的方式;每个用户的密码是由用户自己设定,只有用户自己才知道;只要能够正确输入密码,计算机就认为操作者为合法用户;实际上,由于许多用户为了防止忘记密码,经常采用诸如生日、电话号码等容易被猜测的字符串作为密码,或者把密码抄在纸上放在一个自认为安全的地方,这样很容易造成密码泄漏。即使能保证用户密码不被泄漏,由于密码是静态的数据,在验证过程中需要在计算机内存中和网络中传输,而每次验证使用的验证信息都是相同的,很容易被驻留在计算机内存中的木马程序或网络中的监听设备截获;因此用户名加密码方式是一种极不安全的身份认证方式;In addition, traditional identity authentication uses a username plus password method; each user's password is set by the user himself and only the user knows it; as long as the password is entered correctly, the computer will consider the operator to be a legitimate user; in fact, many users often use easily guessed strings such as birthdays and phone numbers as passwords to prevent forgetting their passwords, or write their passwords on paper and put them in a place they think is safe, which can easily cause password leaks. Even if the user's password can be guaranteed not to be leaked, since the password is static data, it needs to be transmitted in the computer memory and on the network during the verification process, and the verification information used for each verification is the same, it is easy to be intercepted by Trojan programs residing in the computer memory or monitoring devices on the network; therefore, the username plus password method is an extremely unsafe identity authentication method;

身份认证及访问控制系统采用密码加USB KEY软硬件相结合配合一次一密的双因子认证模式;因为USB KEY是一种USB接口的硬件设备,它内置单片机或智能卡芯片,可以存储用户的密钥和数字证书,利用USB KEY内置的密码算法实现对用户身份的认证;要使USBKEY能正常工作,需要用户输入正确的USB KEY密码;因此密码丢失,没有USB KEY无法通过认证;USB KEY丢失,没有密码也无法认证;实现多级认证方式,并且密码加USB KEY配合双因子认证,有效地提高身份认证系统的安全级别;The identity authentication and access control system adopts a two-factor authentication mode that combines passwords and USB KEY software and hardware with a one-time password. Because USB KEY is a hardware device with a USB interface, it has a built-in single-chip microcomputer or smart card chip that can store the user's key and digital certificate, and use the built-in cryptographic algorithm of USB KEY to authenticate the user's identity. In order for USBKEY to work properly, the user needs to enter the correct USB KEY password. Therefore, if the password is lost, the authentication cannot be passed without the USB KEY. If the USB KEY is lost, the authentication cannot be passed without the password. Multi-level authentication is implemented, and the password plus USB KEY is combined with two-factor authentication to effectively improve the security level of the identity authentication system.

并且强制访问策略将每个主体与客体赋予一个访问级别,如最高秘密级,秘密级,机密级及无密级,定义其级别为T>S>C>U;用一个例子来说明强制访问控制规则的应用,如WEB服务以“秘密级”的安全级别运行;假如WEB服务器被攻击,攻击者在目标系统中以“秘密级”的安全级别进行操作,他将不能访问系统中安全级为“最高秘密级”的数据;And the mandatory access policy assigns each subject and object an access level, such as top secret level, secret level, confidential level and unclassified level, and defines the levels as T>S>C>U; an example is used to illustrate the application of mandatory access control rules, such as a WEB service running at the security level of "secret level"; if the WEB server is attacked, the attacker operates at the security level of "secret level" in the target system, and he will not be able to access the data in the system with the security level of "top secret level";

并且,强制访问控制系统根据主体和客体的敏感标记来决定访问模式,访问模式包括:向下读(rd,read down);主体安全级别高于客体信息资源的安全级别时允许的读操作向上读(ru,read up);主体安全级别低于客体信息资源的安全级别时允许的读操作;向下写(wd,write down);主体安全级别高于客体信息资源的安全级别时允许执行的写操作向上写(wu,write up);主体安全级别低于客体信息资源的安全级别时允许执行的写操作;以“不上读不下写”的安全特性控制数据按照级别只能从低向高流动,确保敏感数据不泄露,可以安全有效地解决跨域分布式系统之间的信息互操作,保证合法用户对网络信息资源受控正确地使用,限制非法用户的入侵和蓄意破坏,进一步提高身份认证系统的安全级别。In addition, the mandatory access control system determines the access mode according to the sensitive tags of the subject and the object, and the access modes include: read down (rd, read down); read operations allowed when the subject security level is higher than the security level of the object information resource; read up (ru, read up); read operations allowed when the subject security level is lower than the security level of the object information resource; write down (wd, write down); write operations allowed when the subject security level is higher than the security level of the object information resource; write up (wu, write up); write operations allowed when the subject security level is lower than the security level of the object information resource; the security feature of "no read up and no write down" is used to control data to flow only from low to high according to the level, ensuring that sensitive data is not leaked, and can safely and effectively solve the information interoperability between cross-domain distributed systems, ensure that legitimate users use network information resources in a controlled and correct manner, limit the intrusion and deliberate destruction of illegal users, and further improve the security level of the identity authentication system.

实施例二:Embodiment 2:

在实施例一的基础上,访问控制系统加入管理平台和中间件模块;Based on the first embodiment, the access control system adds a management platform and a middleware module;

管理平台包括:对分布式信息系统中的用户和文件进行定级:采用公钥密码技术保证访问请求/应答的安全信息交互:记录用户的历史访问信息,供日后进行安全审计;The management platform includes: Classification of users and files in distributed information systems: Use of public key cryptography to ensure secure information exchange of access requests/responses: Recording of historical user access information for future security audits;

中间件模块:是分布式信息系统和管理平台之间的信息交互接口,通过信息加密和解密、身份认证和口令校验方式完成两者之间信息的安全交互;Middleware module: It is the information interaction interface between the distributed information system and the management platform, and completes the secure interaction of information between the two through information encryption and decryption, identity authentication and password verification;

访问控制系统以强制访问控制模块为基础,加入管理平台和中间件模块,组成多级安全策略模型;模型基本要素包括:The access control system is based on the mandatory access control module, and adds the management platform and middleware modules to form a multi-level security policy model; the basic elements of the model include:

主体:指用户,以S表示,如式(1)所示;Subject: refers to the user, represented by S, as shown in formula (1);

S={s1, s2, ..., sn} (1);S={s 1 , s 2 , ..., s n } (1);

客体:指文件、数据、档案,以O表示,如式(2)所示;Object: refers to files, data, and archives, represented by O, as shown in formula (2);

O={o1,o2, ...,on} (2);O={o 1 , o 2 , ..., on } (2);

安全等级:是主体、客体的梯度安全标记,包括主体、客体密级和范畴集;主体、客体密级表示主体、客体保密性的敏感程度,以C表示,如式(3)所示;Security level: It is the gradient security mark of the subject and object, including the subject and object confidentiality level and category set; the subject and object confidentiality level indicates the sensitivity of the subject and object confidentiality, represented by C, as shown in formula (3);

C={c1, c2, ..., cn} (3);C={c 1 , c 2 , ..., c n } (3);

范畴集表示组织中部门或类别的集合,以K表示,如式(4)所示;The category set represents the set of departments or categories in the organization, denoted by K, as shown in formula (4);

K={k1,k2, ...,kn} (4);K={k 1 , k 2 , ..., k n } (4);

系统中所有主体和客体均分配了密级和范畴集,以F表示,如式(5)所示;All subjects and objects in the system are assigned confidentiality levels and category sets, represented by F, as shown in formula (5);

F={CS×CO×KS×KO} (5);F={C S ×C O ×K S ×K O } (5);

访问控制矩阵:用矩阵的形式描述任意时刻系统中自主授权状态,以M表示,如式(6)所示:Access control matrix: The autonomous authorization state in the system at any time is described in the form of a matrix, represented by M, as shown in formula (6):

访问属性集:描述主体访问客体的方式,以AS表示,如式(7)所示;其中执行为E(execute),只读为R(read),添加为A(append),读/写为W(write);Access attribute set: describes the way the subject accesses the object, expressed as AS, as shown in formula (7); where execution is E (execute), read-only is R (read), add is A (append), and read/write is W (write);

AS={E,R,A,W} (7);AS={E, R, A, W} (7);

系统状态:表示多级安全系统所有可能的系统状态,以V表示,如式(8)所示;System state: represents all possible system states of the multi-level safety system, represented by V, as shown in formula (8);

V={v1,v2,...,vn} (8);V={v 1 , v 2 ,..., v n } (8);

在系统状态下,主体S对客体O的访问属性权限,以b表示,如(9)式所示;In the system state, the access attribute permission of subject S to object O is represented by b, as shown in formula (9);

b∈S×O×AS (9);b∈S×O×AS (9);

多级安全特性:多级安全特性定义系统状态的安全性,体现多级安全策略,包括自主安全性、简单安全性和多级安全性;Multi-level security features: Multi-level security features define the security of the system state and reflect multi-level security strategies, including autonomous security, simple security, and multi-level security;

状态V=(b,M,F)满足自主安全性,以表示,如式(10)所示;State V = (b, M, F) satisfies autonomous safety, It is expressed as shown in formula (10);

状态V=(b,M,F)满足简单安全性,以x表示,如式(11)所示;The state V = (b, M, F) satisfies simple security and is represented by x, as shown in formula (11);

状态V=(b,M,F)满足多级安全性,以表示,如式(12)所示;State V = (b, M, F) satisfies multi-level security, It is expressed as shown in formula (12);

具体的:Specific:

为了摆脱传统多级安全集中式管理的约束,通过加入管理平台模块和中间件模块;管理平台:是独立、可信、可监管的第三方,负责协调各个跨域分布式系统的安全管理工作;主要功能包括:对分布式信息系统中的用户和文件进行定级;采用公钥密码技术保证访问请求/应答的安全信息交互;记录用户的历史访问信息,供日后进行安全审计;中间件模块:是分布式信息系统和管理平台之间的信息交互接口,通过信息加密和解密、身份认证和口令校验等方式完成两者之间信息的安全交互;通过两者之间的相互配合,提高多级安全的可扩展性和安全性,实现了系统之间信息安全交互和对信息系统的安全管理;In order to get rid of the constraints of traditional multi-level security centralized management, the management platform module and the middleware module are added; the management platform: is an independent, trusted, and supervised third party responsible for coordinating the security management of various cross-domain distributed systems; the main functions include: grading users and files in distributed information systems; using public key cryptography technology to ensure the secure information interaction of access requests/responses; recording users' historical access information for future security audits; the middleware module: is the information interaction interface between the distributed information system and the management platform, and completes the secure information interaction between the two through information encryption and decryption, identity authentication, and password verification; through the mutual cooperation between the two, the scalability and security of multi-level security are improved, and the information security interaction between systems and the security management of information systems are realized;

将多级安全策略中涉及的参与元素用数学符号表示,具体元素的中文含义、英文含义和符号表示如下表所示:The participating elements involved in the multi-level security strategy are represented by mathematical symbols. The Chinese meaning, English meaning and symbolic representation of the specific elements are shown in the following table:

安全策略元素表示Security policy element representation

以Distx域下Sys1系统的用户S3想要访问Disty域下Sys1系统的文件O8的实现为例安全策略详细步骤如说明书附图中的图1所示;Taking the implementation of user S 3 of Sys 1 system under Dist x domain wanting to access file O 8 of Sys 1 system under Dist y domain as an example, the detailed steps of the security policy are shown in FIG1 of the accompanying drawings of the specification;

Step1等级映射:管理平台通过综合评估对分布式系统用户,用S3表示用户、O8表示文件,S3文件O8进行重新定级但是并不改变用户和文件原有等级,而是将评定结果映射到管理平台的等级映射表,如说明书附图中的图2所示;Step 1: Level mapping: The management platform re-classifies the distributed system users through comprehensive evaluation, using S 3 to represent users, O 8 to represent files, and S 3 to file O 8 , but does not change the original levels of users and files. Instead, the evaluation results are mapped to the level mapping table of the management platform, as shown in Figure 2 of the accompanying drawings of the specification;

Step2主体访问请求:用户S3访文件O8发起访问请求s_req(s_distx,s_sys1,s3,s_selv,o_disty,o_sys1,o8,o_selv,op),依次将req中主体区域、系统、用户名、用户安全等级、文件名和访问方式等信息进行填充,o_selv暂不填充,因为此时S3并不知道O8的安全等级,然后通过中间件将请求信息分别用管理平台和系统的公钥加密发送;Step 2 Subject access request: User S 3 accesses file O 8 and initiates access request s_req (s_dist x , s_sys 1 , s 3 , s_selv, o_dist y , o_sys 1 , o 8 , o_selv, op), and fills in the subject area, system, user name, user security level, file name and access method in req in turn. o_selv is not filled in temporarily because S 3 does not know the security level of O 8 at this time. Then the request information is encrypted and sent by the middleware using the public keys of the management platform and the system respectively;

Step3客体本地查询:Disty区域Sys1系统的中间件收到Distx区域Sysi系统的用户S3的访问请求后,对请求信息解密认证,然后根据O8文件名去本地文件系统数据库查找O8相关信息,得到O8的安全等级;Step 3 Object local query: After receiving the access request from user S 3 of Sys i system in Dist x area, the middleware of Sys 1 system in Dist y area decrypts and authenticates the request information, and then searches the local file system database for relevant information of O 8 according to the file name of O 8 to obtain the security level of O 8 ;

Step4客体访问请求:文件系统Middleware生成一个一次性口令,并对req进行反馈形成o_res(s_Distx,s_sys1,S3,s_selv,o_disty,o_sys1,08,o_selv,op,pass),将文件O8的o_selv和刚生成的pass进行填充,最后将o_res用管理平台公钥加密发送;Step 4 Object access request: The file system Middleware generates a one-time password and responds to req to form o_res (s_Dist x , s_sys 1 , S 3 , s_selv, o_dist y , o_sys 1 , 0 8 , o_selv, op, pass), fills in o_selv of file O 8 and the newly generated pass, and finally encrypts o_res with the management platform public key and sends it;

Step5管理平台授权认证:管理平台首先将收到step2和step4信息进行解密,然后进行匹配(为了确保是同一条请求信息),匹配成功后等级映射表LML根据主s_req和o_res中主体、客体信息查找对应的安全等级,并根据多级安全模型进行授权判定,得到permission;Step 5 Management platform authorization and authentication: The management platform first decrypts the information received in step 2 and step 4, and then matches them (to ensure that they are the same request information). After the match is successful, the level mapping table LML searches for the corresponding security level according to the subject and object information in the main s_req and o_res, and makes an authorization decision based on the multi-level security model to obtain permission;

Step6平台授权客体:管理平台将授权判定结果用分布式文件系统公钥加密返回,文件系统对p_res(s_distx,s_sys1,s3,s_selv,o_disty,o_sys1,o8,o_selv,op,pass,per)进行解密,如果per为同意访问,文件系统将文件08的password认证接口打开,并设置用户访问时限倒计时5min(超时窗口关闭);否则,Middleware关闭本次访问请求;无论成功与否,都将该次访问行为进行记录,供日后安全审计使用;Step 6 Platform authorization object: The management platform encrypts the authorization decision result with the distributed file system public key and returns it. The file system decrypts p_res (s_dist x , s_sys 1 , s 3 , s_selv, o_dist y , o_sys 1 , o 8 , o_selv, op, pass, per). If per agrees to access, the file system opens the password authentication interface of file 0 8 and sets a 5-minute countdown for the user access time limit (the timeout window is closed). Otherwise, the Middleware closes this access request. Regardless of success or failure, the access behavior will be recorded for future security audits.

Step7平台授权主体:管理平台将认定结果通过用户公钥加密返回,p_res(s_distx,s_sys1,s3,s_selv,o_disty,o_sys1,o8,o_selv,op,pass,per),如果per为同意访问,用户S可以用password访问文件O8:否则,Middleware关闭本次访问请求,同样将该次访问行为进行记录,供日后安全审计使用;Step 7 Platform authorization subject: The management platform returns the identification result through user public key encryption, p_res(s_dist x , s_sys 1 , s 3 , s_selv, o_dist y , o_sys 1 , o 8 , o_selv, op, pass, per). If per agrees to access, user S can access file O 8 with password: Otherwise, Middleware closes this access request and also records the access behavior for future security audits.

Step8记录访问行为:同样地,管理平台也会将每次访问行为都记录在案,以独立的可信第三方身份保证每一次主体访问客体行为的真实抗抵赖性,供日后安全审计使用;Step 8 Record access behavior: Similarly, the management platform will also record each access behavior, and use an independent trusted third party to ensure the authenticity and non-repudiation of each subject's access to the object for future security audits;

Step9安全审计:审计作为独立的第三方,监督管理平台、文件系统和用户历史记录,负责安全审计,供相关单位进行安全检查;Step 9 Security Audit: As an independent third party, the audit supervises the management platform, file system and user history records, and is responsible for security audits for relevant units to conduct security checks;

以此保证系统信息跨域互操作的安全性和灵活性,对用户访问行为进行约束,访问控制系统以强制访问控制模块为基础,加入管理平台和中间件模块,组成多级安全策略,保证主体对客体试试访问控制时,必须遵循安全访问控制系统内的规则,进一步确保系统的安全性。In this way, the security and flexibility of cross-domain interoperability of system information are guaranteed, and user access behavior is constrained. The access control system is based on the mandatory access control module, and joins the management platform and middleware modules to form a multi-level security strategy to ensure that when the subject tries to control access to the object, it must follow the rules within the security access control system, thereby further ensuring the security of the system.

实施例三:Embodiment three:

在实施例二的基础上,访问控制系统以单点登录的方式进行身份验证,且单点登录的方式中建立保护机制;On the basis of the second embodiment, the access control system performs identity authentication in a single sign-on manner, and a protection mechanism is established in the single sign-on manner;

访问控制系统内还包括有KDC,且KDC具有生成加密的带时间戳的票据;The access control system also includes a KDC, and the KDC has the function of generating encrypted tickets with timestamps;

具体的:单点登录是现有技术中方便用户访问网络的技术;无论多么复杂的网络结构,用户只需在登录时进行一次认证,即可获得访问系统和应用软件的授权,以后便可以在网络中自由穿梭;本申请中身份认证及访问控制系统通过口令代理的方式,实现了“0开发”的web页面单点登录,用户仅需在启动客户端软件时输入USB KEY的口令通过身份认证系统认证,此后无需再输入应用系统口令即可访问应用系统:同时可通过“登录跳转”设置,使用户打开应用首页后自动跳转到用户登录后页面,简化用户操作;Specifically: Single sign-on is a technology in the prior art that facilitates users to access the network; no matter how complex the network structure is, users only need to authenticate once when logging in to obtain authorization to access the system and application software, and can freely shuttle in the network in the future; the identity authentication and access control system in this application realizes "0 development" web page single sign-on through password proxy. Users only need to enter the password of the USB KEY when starting the client software to pass the identity authentication system authentication, and then they can access the application system without entering the application system password: At the same time, through the "login jump" setting, the user can automatically jump to the user login page after opening the application homepage, simplifying user operations;

并且,内部写入有保护机制,其中机制内包括:In addition, there is an internal write protection mechanism, which includes:

密钥分发中心(KDC):是提供身份验证服务的可信第三方;Key Distribution Center (KDC): is a trusted third party that provides identity authentication services;

Kerberos身份验证服务器:身份验证服务器托管KDC的功能;Kerberos Authentication Server: The authentication server hosts the functionality of the KDC;

票据授予票据:票据授予票据(TGT)提供证据证明主体已通过KDC进行身份验证;Ticket Granting Ticket: A Ticket Granting Ticket (TGT) provides evidence that the subject has been authenticated by the KDC;

票据:是一种加密消息,提供主体有权访问客体的证据;Ticket: is an encrypted message that provides evidence that a subject has the right to access an object;

kerberos需要一个账户数据库,该数据库通常包含在目录服务中;它使用客户端、网络服务器和KDC之间的票据交换来证明身份并提供身份验证;Kerberos requires an account database, which is usually contained in a directory service; it uses ticket exchanges between clients, network servers, and the KDC to prove identity and provide authentication;

登录过程的工作方式如下:The login process works like this:

1.用户在客户端输入用户名和密码;1. The user enters the username and password on the client;

2.客户端使用AES加密用户名以传输到KDC;2. The client encrypts the username using AES for transmission to the KDC;

3.KDC根据已知凭据的数据库验证用户名;3. The KDC verifies the username against a database of known credentials.

4.KDC生成由客户端和kerberos服务器使用的对称密钥,并使用用户名密码散穿插的方式对此进行加密;并且KDC还生成加密的带时间戳的TGT;4. The KDC generates a symmetric key used by the client and the Kerberos server and encrypts it using a hash of the username and password; the KDC also generates an encrypted, timestamped TGT;

5.然后KDC将加密的对称密钥和加密的带时间戳的TGT发送到客户端;5. The KDC then sends the encrypted symmetric key and the encrypted timestamped TGT to the client;

6.客户端安装TGT以供使用,直到它过期;6. The client installs the TGT for use until it expires;

客户端还使用用户名密码的散列来解密对称密钥:The client also uses the hash of the username and password to decrypt the symmetric key:

预防访问控制:预防性控制试图阻止不必要或未经授权的活动发生;例如:栅栏、锁、照明、警报系统、安全策略、安全意识培训、CCTV、防火墙、反病毒软件、入侵预防系统等;检测访问控制:Preventive access controls: Preventive controls attempt to prevent unnecessary or unauthorized activity from occurring; for example: fences, locks, lighting, alarm systems, security policies, security awareness training, CCTV, firewalls, anti-virus software, intrusion prevention systems, etc. Detective access controls:

检测性控制尝试发现或检测不需要的或未经授权的活动;例如:运送探测器、岗位轮换、强制性休假策略、审计踪迹、用户监督和审查以及事故调查;Detective controls attempt to discover or detect unwanted or unauthorized activities; for example: shipping probes, job rotations, mandatory vacation policies, audit trails, user monitoring and review, and incident investigations;

纠正访问控制:纠正控制修改环境、以便在发生意外或未授权的活动后将系统恢复正常;例如:备份和恢复计划。Corrective access controls: Corrective controls modify the environment to restore systems to normal after unexpected or unauthorized activity; for example, backup and recovery plans.

以上显示和描述了本发明的基本原理、主要特征和优点。本行业的技术人员应该了解,本发明不受上述实施例的限制,上述实施例和说明书中描述的只是说明本发明的原理,在不脱离本发明精神和范围的前提下,本发明还会有各种变化和改进,这些变化和改进都落入要求保护的本发明范围内。本发明要求保护范围由所附的权利要求书及其等效物界定。The above shows and describes the basic principles, main features and advantages of the present invention. It should be understood by those skilled in the art that the present invention is not limited to the above embodiments. The above embodiments and descriptions are only for explaining the principles of the present invention. Without departing from the spirit and scope of the present invention, the present invention may have various changes and improvements, which fall within the scope of the present invention. The scope of protection of the present invention is defined by the attached claims and their equivalents.

Claims (4)

1.档案机器人的多级安全认证及访问控制系统,包括安全认证系统和访问控制系统;其特征在于:1. A multi-level security authentication and access control system for an archive robot, including a security authentication system and an access control system; the characteristics are: 所述安全认证系统包括身份认证、证书认证;所述身份认证包括密码、数字签名,以密码和数字签名结合完成身份认证;所述证书认证包括USB KEY,且所述USB KEY内存储有用户私钥和数字证书;The security authentication system includes identity authentication and certificate authentication; the identity authentication includes password and digital signature, and the identity authentication is completed by combining password and digital signature; the certificate authentication includes USB KEY, and the USB KEY stores the user's private key and digital certificate; 所述安全认证系统还包括安全认证网关,所述安全认证网关用于对验证通过的用户颁发访问应用系统的令牌,并且对于用户的每一次访问请求代理服务都将基于Kerberos协议验证用户的访问令牌,以确定用户的合法身份;The security authentication system also includes a security authentication gateway, which is used to issue a token for accessing the application system to the user who has passed the verification, and for each access request of the user, the proxy service will verify the user's access token based on the Kerberos protocol to determine the user's legal identity; 所述访问控制系统包括以多级安全认证手段为基础的强制访问控制模块;The access control system includes a mandatory access control module based on multi-level security authentication means; 所述访问控制系统加入管理平台和中间件模块;The access control system adds a management platform and a middleware module; 所述管理平台包括:对分布式信息系统中的用户和文件进行定级:采用公钥密码技术保证访问请求/应答的安全信息交互:记录用户的历史访问信息,供日后进行安全审计;The management platform includes: grading users and files in the distributed information system: using public key cryptography to ensure secure information exchange of access requests/responses: recording historical access information of users for future security audits; 所述中间件模块:是分布式信息系统和管理平台之间的信息交互接口,通过信息加密和解密、身份认证和口令校验方式完成两者之间信息的安全交互;The middleware module is an information interaction interface between the distributed information system and the management platform, which completes the secure interaction of information between the two through information encryption and decryption, identity authentication and password verification; 所述访问控制系统以强制访问控制模块为基础,加入管理平台和中间件模块,组成多级安全策略模型;所述模型基本要素包括:The access control system is based on the mandatory access control module, and adds a management platform and middleware module to form a multi-level security policy model; the basic elements of the model include: 主体:指用户,以S表示,如式(1)所示;Subject: refers to the user, represented by S, as shown in formula (1); S={s1,s2,...,sn} (1);S={s 1 , s 2 ,..., s n } (1); 客体:指文件、数据、档案,以O表示,如式(2)所示;Object: refers to files, data, and archives, represented by O, as shown in formula (2); O={o1,o2,...,on} (2);O={o 1 , o 2 ,..., o n } (2); 安全等级:是主体、客体的梯度安全标记,包括主体、客体密级和范畴集;主体、客体密级表示主体、客体保密性的敏感程度,以C表示,如式(3)所示;Security level: It is the gradient security mark of the subject and object, including the subject and object confidentiality level and category set; the subject and object confidentiality level indicates the sensitivity of the subject and object confidentiality, represented by C, as shown in formula (3); C={c1,c2,...,cn} (3);C={c 1 , c 2 ,..., c n } (3); 范畴集表示组织中部门或类别的集合,以K表示,如式(4)所示;The category set represents the set of departments or categories in the organization, denoted by K, as shown in formula (4); K={k1,k2,...,kn} (4);K={k 1 , k 2 ,..., k n } (4); 系统中所有主体和客体均分配了密级和范畴集,以F表示,如式(5)所示;All subjects and objects in the system are assigned confidentiality levels and category sets, represented by F, as shown in formula (5); F={CS×CO×KS×KO} (5);F={C S ×C O ×K S ×K O } (5); 访问控制矩阵:用矩阵的形式描述任意时刻系统中自主授权状态,以M表示,如式(6)所示:Access control matrix: The autonomous authorization state in the system at any time is described in the form of a matrix, represented by M, as shown in formula (6): (6); (6); 访问属性集:描述主体访问客体的方式,以AS表示,如式(7)所示;其中执行为E(execute),只读为R(read),添加为A(append),读/写为W(write);Access attribute set: describes the way the subject accesses the object, expressed as AS, as shown in formula (7); where execution is E (execute), read-only is R (read), add is A (append), and read/write is W (write); AS={E,R,A,W} (7);AS={E, R, A, W} (7); 系统状态:表示多级安全系统所有可能的系统状态,以V表示,如式(8)所示;System state: represents all possible system states of the multi-level safety system, represented by V, as shown in formula (8); V={v1,v2,...,vn} (8);V={v 1 , v 2 ,..., v n } (8); 在系统状态下,主体S对客体O的访问属性权限,以b表示,如(9)式所示;In the system state, the access attribute permission of subject S to object O is represented by b, as shown in formula (9); b∈S×O×AS (9);b∈S×O×AS (9); 多级安全特性:多级安全特性定义系统状态的安全性,体现多级安全策略,包括自主安全性、简单安全性和多级安全性;Multi-level security features: Multi-level security features define the security of the system state and reflect multi-level security strategies, including autonomous security, simple security, and multi-level security; 状态vi=(b,M,F)满足自主安全性,以∀表示,如式(10)所示;The state v i =(b, M, F) satisfies autonomous safety and is represented by ∀, as shown in formula (10); ∀(S,O,AS)∈V,V∈M(10);∀(S, O, AS)∈V, V∈M(10); 状态vi=(b,M,F)满足简单安全性,以x表示,如式(11)所示;The state v i =(b, M, F) satisfies simple security and is represented by x, as shown in formula (11); x=E,x=A or (x=R or x=W)and(F(S)≥F(O),F(S)⊇F(O)) (11);x=E, x=A or (x=R or x=W)and(F(S)≥F(O), F(S)⊇F(O)) (11); 状态vi=(b,M,F)满足多级安全性,以∀S表示,如式(12)所示;The state v i =(b, M, F) satisfies multi-level security, represented by ∀ S , as shown in formula (12); S∈S,O∈b(S:W,A),O∈b(S:R,W) (12)。S ∈S, O∈b(S:W,A), O∈b(S:R,W) (12). 2.根据权利要求1所述的档案机器人的多级安全认证及访问控制系统,其特征在于:所述安全认证系统还包括双因子认证模式,且双因子认证模式为一次一密。2. The multi-level security authentication and access control system of the archive robot according to claim 1, characterized in that: the security authentication system also includes a two-factor authentication mode, and the two-factor authentication mode is a one-time one-password. 3.根据权利要求1所述的档案机器人的多级安全认证及访问控制系统,其特征在于:所述访问控制系统以单点登录的方式进行身份验证,且单点登录的方式中建立保护机制。3. The multi-level security authentication and access control system of the archive robot according to claim 1 is characterized in that: the access control system performs identity authentication in a single sign-on manner, and a protection mechanism is established in the single sign-on manner. 4.根据权利要求1所述的档案机器人的多级安全认证及访问控制系统,其特征在于:所述访问控制系统内还包括有KDC,且KDC具有生成加密的带时间戳的票据。4. The multi-level security authentication and access control system of the archive robot according to claim 1, characterized in that: the access control system also includes a KDC, and the KDC has the ability to generate encrypted tickets with timestamps.
CN202410090424.5A 2024-01-22 2024-01-22 Multistage safety authentication and access control system of file robot Active CN117914601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410090424.5A CN117914601B (en) 2024-01-22 2024-01-22 Multistage safety authentication and access control system of file robot

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410090424.5A CN117914601B (en) 2024-01-22 2024-01-22 Multistage safety authentication and access control system of file robot

Publications (2)

Publication Number Publication Date
CN117914601A CN117914601A (en) 2024-04-19
CN117914601B true CN117914601B (en) 2024-09-13

Family

ID=90681625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410090424.5A Active CN117914601B (en) 2024-01-22 2024-01-22 Multistage safety authentication and access control system of file robot

Country Status (1)

Country Link
CN (1) CN117914601B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108243166A (en) * 2016-12-27 2018-07-03 航天信息股份有限公司 A kind of identity identifying method and system based on USBKey
CN113242230A (en) * 2021-05-07 2021-08-10 中国科学技术大学 Multi-level authentication and access control system and method based on intelligent contracts

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181762B2 (en) * 2001-01-17 2007-02-20 Arcot Systems, Inc. Apparatus for pre-authentication of users using one-time passwords
KR20050003587A (en) * 2003-06-27 2005-01-12 주식회사 케이티 Secure system and method for controlling access thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108243166A (en) * 2016-12-27 2018-07-03 航天信息股份有限公司 A kind of identity identifying method and system based on USBKey
CN113242230A (en) * 2021-05-07 2021-08-10 中国科学技术大学 Multi-level authentication and access control system and method based on intelligent contracts

Also Published As

Publication number Publication date
CN117914601A (en) 2024-04-19

Similar Documents

Publication Publication Date Title
US8984601B2 (en) Enterprise security system
US9338161B2 (en) System and method for biometric protocol standards
US7305701B2 (en) Methods and arrangements for controlling access to resources based on authentication method
US8806602B2 (en) Apparatus and method for performing end-to-end encryption
US8572690B2 (en) Apparatus and method for performing session validation to access confidential resources
US8572724B2 (en) Method and apparatus for network session validation
US20240430096A1 (en) Distribution of one-time passwords for multi-factor authentication via blockchain
CN105978855A (en) System and method for protecting personal information security in real-name system
Akbarfam et al. Dlacb: Deep learning based access control using blockchain
Rountree Security for Microsoft Windows system administrators: introduction to key information security concepts
CN117914601B (en) Multistage safety authentication and access control system of file robot
US8726340B2 (en) Apparatus and method for expert decisioning
US8584201B2 (en) Method and apparatus for session validation to access from uncontrolled devices
Sagar et al. Information security: safeguarding resources and building trust
US8572687B2 (en) Apparatus and method for performing session validation
KR20050003587A (en) Secure system and method for controlling access thereof
Rao et al. Access controls
Schaffer Ontology for authentication
Herzig Identity and Access Management
Samarati et al. Data security
US8601541B2 (en) Method and apparatus for session validation to access mainframe resources
CISSP Number: CISSP Passing Score: 800 Time Limit: 120 min File Version: 20.5
Mariappan et al. IoT access control and authentication schemes
Samuel David et al. DATA ENCRYPTION AND AUTHENTICATION AS FRAUD PREVENTION MECHANISMS IN COMMERCIAL BANKS IN SOUTH-SOUTH, NIGERIA
CN117892354A (en) Electronic receipt management method, device, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant