CN103379108A - Flexible and safe concentrated identity authentication method - Google Patents

Flexible and safe concentrated identity authentication method Download PDF

Info

Publication number
CN103379108A
CN103379108A CN2012101286115A CN201210128611A CN103379108A CN 103379108 A CN103379108 A CN 103379108A CN 2012101286115 A CN2012101286115 A CN 2012101286115A CN 201210128611 A CN201210128611 A CN 201210128611A CN 103379108 A CN103379108 A CN 103379108A
Authority
CN
China
Prior art keywords
server
user
processing module
intelligent processing
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101286115A
Other languages
Chinese (zh)
Other versions
CN103379108B (en
Inventor
张帝
王艳君
李财林
刘玉成
章传强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Postal Savings Bank of China Ltd
Original Assignee
Postal Savings Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Postal Savings Bank of China Ltd filed Critical Postal Savings Bank of China Ltd
Priority to CN201210128611.5A priority Critical patent/CN103379108B/en
Publication of CN103379108A publication Critical patent/CN103379108A/en
Application granted granted Critical
Publication of CN103379108B publication Critical patent/CN103379108B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a flexible and safe concentrated identity authentication method. According to the flexible and safe concentrated identity authentication method, a temporary server operator can log in a server through temporary user authentication information (such as a password). An intelligent processing module is introduced to a concentrated authentication server terminal, so that a server operator does not need to send real authentication information of a user password and the like to the temporary server operator in the whole authentication process and the safety of the authentication process is improved. The intelligent processing module guarantees that the server login user password is only known by the server operator or the temporary server operator at any time so that the identity of a login person can be identified. Authentication information application and authorized operation tracks relative to login of a user is recorded by the intelligent processing module in the whole process and a server login user audit information blind zone is eliminated. The intelligent processing module is independent in function, simple in logic and capable of being deployed in a unified mode with various authentication methods of LDAP and the like and satisfying the flexible and diversified requirements of enterprises and public institutions.

Description

A kind of flexible safe central authentication method
Technical field
The present invention relates to the central authentication implementation method that a kind of staging server director uses casual user's authorization information (such as password etc.) logon server.The method does not only need the server director to transmit the authorization informations such as real user cipher for interim director, and can realize that complete period authorization information special messenger is special-purpose, can realize the server log user content non-blind area of auditing.
Background technology
At present, central authentication at home and abroad a plurality of applications of enterprises and institutions be widely adopted.Pass through the direct logon server of control desk or pass through the mode telnet server application facet such as telnet, SSH similar user, central authentication also has multiple manifestation mode.No matter it adopts the forms of expression such as conventional cipher, safety certificate, or Adoption Network information system NIS (Network Information System), domain authentication, the technical implementation way such as lightweight directory authentication LDAP (Lightweight Directory Authentication Protocol), pluggable authentication module PAM (Pluggable Authentication Module), the structure composed of central authentication and realization principle are basic identical.
The central authentication system is comprised of the client and server end, the client of central authentication system namely is the server of user's sign-on access, the server end of central authentication system then responds the ID authentication request from different clients, and provides the client user to login the functions such as security audit.
Under the prerequisite of client and server end network interworking, the central authentication implementation procedure was divided into for four steps.The first step creates client identity authentication information file store at the central authentication server end, comprises the authorization information such as the user name on all clients and password in its compass of competency.Second step, the central authentication client proposes ID authentication request, after the user entered the authorization information such as server log interface input username and password, the server internal process waited for that with user name, password the information that nuclear is veritified is forwarded to the central authentication server end, the wait-for-response result.In the 3rd step, the central authentication server provides authentication response, and the information of Collective qualification server in the file store is strictly checked the information accuracy that newly receives as benchmark according to the algorithm of agreement, draws and send to whether let pass this user's conclusion of client.In the 4th step, the central authentication client allows or the refusing user's login according to the response of central authentication server.
But the demand that exists again the more general authorization information extensions such as user cipher to disseminate at internal institution, as because of need of work, the forced server highest weight that it is responsible of system manager limits the use of family (root or Administrator) login authentication information (such as password) and hands to other people use, this must cause many people to know the same user's of server authorization information, has increased the unsafe factor that system access is controlled.In addition, for the shared reality of authorization information that internal institution ubiquitous " machine is double " post setting pattern is introduced, the central authentication system can't carry out associative operation by concrete who logon server of explicit recognition.To sum up, existing central authentication can't solve that the authorization information special messenger such as user cipher is special-purpose to disseminate the contradiction of demand with its extension, and the server user logins the security audit function and has blind spot.
Summary of the invention
The present invention is a kind of improvement to common user logon server central authentication implementation method.The present invention is by additionally disposing intelligent processing module at the central authentication server end, can satisfy not only that the authorization information special messenger such as internal institution user cipher is special-purpose to disseminate two kinds of demands with its extension and coexist simultaneously, and related application, the Authorized operation vestige of the omnidistance recording user login of system, the comprehensive and confidence level of raising audit information.
The technical solution adopted for the present invention to solve the technical problems is: additionally dispose intelligent processing module at the central authentication server end, mainly finish " obtaining the interim password of user (210) ", " authorisation process (220) " and " regularly user cipher recovers (230) " three flow processs.When the staging server director will use user that a certain server director administers and authorization information logon server, the staging server director is at first by obtaining the interim password of user (210) flow process, initiate to obtain the request of the user cipher that other people administer temporarily, input identifying information (such as IP) and the employed user's name (310) of server to be visited, through intelligent processing module in the news file storehouse, inquire about examine after (320), generate the interim password of this server user (330), revise, confirm receive mode (340), and look user class and principle of delegation (350), backup, revise news file storehouse content (360), and the receive mode that the interim password of newly-generated user is determined by the front sends to the staging server director.For the interim password application of high level server user, need leading body at a higher level to authorize by " authorisation process (220) " flow process.After leading body at a higher level receives authorization notification message, login central authentication server end, enter Authorized operation (410), other people use (420) to ratify this user cipher, revise, confirm the up duration time limit (440), system revises news file storehouse related content (450) again, and by the receive mode of obtaining the interim password of user (210) flow process and setting, sends the interim password of user for the staging server director.In addition, whether intelligent processing module detects in real time the interim password of user and expires, after the interim password expiration of the server user who changed, the intelligent processing module very first time is carried out " regularly user cipher recovers (230) " flow process, according to backup information, recover user's original password, and the relevant information (510) such as the cleaning term of validity, the consistency of guarantee information file store.After the staging server director receives interim password, can use interim password login server in interim cryptographic validity, the login authentication flow process is identical with conventional central authentication process.Since the intelligent processing module detail record the various operation vestiges that occur in each flow process, therefore, take user cipher change time point as the boundary, the user that can clearly distinguish logon server is the server director on earth or new authorizes the staging server director who allows logon server, and then guarantees the authenticity of audit information and comprehensive.
In addition, in order to ensure the fail safe of intelligent processing module self, inside modules also has the safeguard after the functions such as general login user management, rights management and password take defeat, and is similar to common system, not in this discussion.
The invention has the beneficial effects as follows, by authorization informations such as interim generation server user ciphers, promote the convenience of staging server director logon server process, satisfy the at any time diversified demand of operations server of enterprises.Simultaneously, because this scheme can guarantee that any moment server user password only is kept in server director or personnel hand of staging server director, eliminate the blind spot that the user logins audit function.The present invention disposes framework and general central authentication framework is basic identical, and internal process is simple, is easy to dispose and realize.
Description of drawings
The present invention is described in more detail below in conjunction with drawings and embodiments.
Fig. 1 is the logon server overview flow chart.
Fig. 2 is inner three the main operating processes of intelligent processing module.
Fig. 3 obtains the interim password flow chart of server log user.
Fig. 4 is the Authorized operation flow chart.
Fig. 5 is that regularly user cipher recovers flow chart.
Embodiment
Specific implementation process comprises four partial interiors: the logon server overall procedure, use unauthorized level user login services device, use authority level user login services device and timing user cipher to recover flow process.
One, logon server overall procedure
Fig. 1 shows the logon server overview flow chart.(110) the staging server director logins Collective qualification server intelligent processing module, (120) according to use server user rank, (detailed description sees two to finish inner respective handling, use unauthorized level user login services device and three, use authority level user login services device), (130) finish the backup of news file related content and modification, (140) send the authorization information such as casual user's password to the staging server director, (150) staging server director or server director use server user's name and the authorization information logon server that institute knows or grasps, (160) after the inner associated process of server is finished the processing such as reception, information is transmitted to the common authentication module, (170) common authentication module check verify information accuracy, authentication result is fed back to the Collective qualification client, be user's server to be visited, (180) server to be visited allows according to response results or refusal staging server director or server director login.(190) restoration disposal is finished to expired casual user's password in intelligent processing module inside.
Two, use unauthorized level user login services device
When the staging server director will use the unauthorized level user login services device that the server director administers, at first by obtaining the interim password of user (210) flow process, initiate to obtain server user's password request temporarily, show such as Fig. 3.Success is logined the central authentication server end and is disposed intelligent processing module, input identifying information (such as IP) and the employed user's name (310) of server to be visited, through intelligent processing module in the news file storehouse, inquire about examine after (320), generate the interim password of user (330), revise, confirm receive mode (340), the direct echo of default mode also can be SMS notification or mail notification; For for mandate level user (350), internal system backup, modification news file storehouse content, and by the specific mode echo or send newly-generated password (360), internal system records whole operating process, and forms audit log (390).Staging server director whereby interim cryptographic acess treats logon server, inputs user name and corresponding interim password thereof, through the central authentication server examine, confirm errorless after, server to be visited allows login.
Three, use authority level user login services device
When the staging server director will use mandate level user (such as root or the administrator) logon server that the server director administers, equally will be first initiate the request that temporarily obtain server user's password by flow process shown in Figure 3.Login central authentication server end is disposed intelligent processing module, input identifying information (such as IP) and the employed user's name (310) of server to be visited, through intelligent processing module in the news file storehouse, inquire about examine after (320), generate the interim password of user (330), revise, confirm receive mode (340), the direct echo of default mode also can be SMS notification or mail notification;
For need mandate level user (350), after confirming authorized person and message informing mode (370), internal system backup, modification news file storehouse content (380) are preserved the information such as user notification mode, the original password of backup user, and be set to " waiting to authorize " state.Internal system records whole operating process, and forms audit log (390), and wait sends casual user's password after authorizing and finishing.
After leading body at a higher level receives authorization notification message, finish mandate by " authorisation process (220) " shown in Figure 4 flow process.Leading body at a higher level successfully logins central authentication server end (410), after the information such as affirmation applicant, the used user of application and service time, is confirmed whether this time application (420) of approval.If disapprove, internal system cleaning user cipher state, the backup information (430) that deletion is redundant.If interim cryptographic validity (440) is then revised, confirmed in approval, change password state extracts the password receive mode that application process is registered for authorizing, and interim password is sent (450).Last complete operation vestige record (460) is used for later stage secure log audit.After the staging server director receives interim password, namely carry out the logon server operation.
Four, regularly user cipher recovers flow process
All interim passwords all have the term of validity to limit.When interim password expiration, " regularly user cipher recovers (230) " flow process that the inner execution of intelligent processing module is shown in Figure 5.According to backup information, intelligent processing module recovers the user name original password, and the relevant information (510) such as the cleaning term of validity, and then gives back original subscriber's password director with the exclusive power of password.Intelligent processing module records whole operating process, and forms audit log (520).Take recovery time point as the boundary, the back has the behavior of this user login services device again, its operator must be the server director.

Claims (7)

1. the central authentication method of a flexible safety is comprised of the client and server end.It is characterized in that: the authorization informations such as client use casual user password are sent the identity authentication service request, and server end provides the authentication response, and disposes intelligent processing module.
2. central authentication method according to claim 1, it is characterized in that: server end is additionally disposed intelligent processing module, is used for the interim news file storehouse information that generates and revise, and the convenience of non-server director logon server is provided.
3. central authentication method according to claim 1, it is characterized in that: the extra intelligent processing module of disposing of server end can be guaranteed: at any time, the server log user cipher is only individual-specific by server director or staging server director one, and separation accurately can be looked into.
4. central authentication method according to claim 1 is characterized in that: the extra intelligent processing module of disposing of server end can provide authorization function selectively according to user class, improves the controling mechanism that password is propagated between different personnel.
5. central authentication method according to claim 1 is characterized in that: the extra intelligent processing module of disposing of server end can realize that interim password checked with the effect phase, and after exceeding the time limit, user cipher restores.
6. central authentication method according to claim 1 is characterized in that: the omnidistance record of the extra intelligent processing module of disposing of server end Operation Log, realize the server user login the audit information all standing, without blind spot.
7. central authentication method according to claim 1, it is characterized in that: the extra intelligent processing module of disposing of server end can application and NIS, domain authentication, the multiple implementation server ends such as LDAP, PAM, and can realize flexibly the authentication function expansion according to each Scheme Characteristics.
CN201210128611.5A 2012-04-28 2012-04-28 A kind of flexible safe central authentication method Expired - Fee Related CN103379108B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210128611.5A CN103379108B (en) 2012-04-28 2012-04-28 A kind of flexible safe central authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210128611.5A CN103379108B (en) 2012-04-28 2012-04-28 A kind of flexible safe central authentication method

Publications (2)

Publication Number Publication Date
CN103379108A true CN103379108A (en) 2013-10-30
CN103379108B CN103379108B (en) 2016-06-08

Family

ID=49463671

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210128611.5A Expired - Fee Related CN103379108B (en) 2012-04-28 2012-04-28 A kind of flexible safe central authentication method

Country Status (1)

Country Link
CN (1) CN103379108B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105159701A (en) * 2015-07-30 2015-12-16 广东欧珀移动通信有限公司 System resetting method and terminal
CN107124390A (en) * 2016-02-25 2017-09-01 阿里巴巴集团控股有限公司 Prevention-Security, implementation method, the apparatus and system of computing device
CN109450859A (en) * 2018-10-15 2019-03-08 成都安恒信息技术有限公司 A kind of cipher code protection method applied to plaintext agency by agreement in O&M auditing system
CN110430048A (en) * 2019-07-23 2019-11-08 上海易点时空网络有限公司 Account right management method and device
CN110795745A (en) * 2019-10-14 2020-02-14 山东药品食品职业学院 Information storage and transmission system based on server and method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101369893A (en) * 2008-10-06 2009-02-18 ***通信集团设计院有限公司 Method for local area network access authentication of casual user
CN101483525A (en) * 2009-01-22 2009-07-15 中兴通讯股份有限公司 Implementing method for authentication center
CN101656963A (en) * 2008-08-21 2010-02-24 财团法人工业技术研究院 Method and system for managing network identities
CN101674575A (en) * 2009-09-17 2010-03-17 中兴通讯股份有限公司 Method for protecting security of mobile communication terminal data and device thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656963A (en) * 2008-08-21 2010-02-24 财团法人工业技术研究院 Method and system for managing network identities
CN101369893A (en) * 2008-10-06 2009-02-18 ***通信集团设计院有限公司 Method for local area network access authentication of casual user
CN101483525A (en) * 2009-01-22 2009-07-15 中兴通讯股份有限公司 Implementing method for authentication center
EP2391083A1 (en) * 2009-01-22 2011-11-30 ZTE Corporation Method for realizing authentication center and authentication system
CN101674575A (en) * 2009-09-17 2010-03-17 中兴通讯股份有限公司 Method for protecting security of mobile communication terminal data and device thereof

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105159701A (en) * 2015-07-30 2015-12-16 广东欧珀移动通信有限公司 System resetting method and terminal
CN107124390A (en) * 2016-02-25 2017-09-01 阿里巴巴集团控股有限公司 Prevention-Security, implementation method, the apparatus and system of computing device
CN107124390B (en) * 2016-02-25 2021-05-04 阿里巴巴集团控股有限公司 Security defense and implementation method, device and system of computing equipment
CN109450859A (en) * 2018-10-15 2019-03-08 成都安恒信息技术有限公司 A kind of cipher code protection method applied to plaintext agency by agreement in O&M auditing system
CN110430048A (en) * 2019-07-23 2019-11-08 上海易点时空网络有限公司 Account right management method and device
CN110795745A (en) * 2019-10-14 2020-02-14 山东药品食品职业学院 Information storage and transmission system based on server and method thereof

Also Published As

Publication number Publication date
CN103379108B (en) 2016-06-08

Similar Documents

Publication Publication Date Title
US8955076B1 (en) Controlling access to a protected resource using multiple user devices
US7707626B2 (en) Authentication management platform for managed security service providers
US6275941B1 (en) Security management method for network system
US8209749B2 (en) Uninterrupted virtual private network (VPN) connection service with dynamic policy enforcement
US7644434B2 (en) Computer security system
US20160307165A1 (en) Authorizing Participant Access To A Meeting Resource
US20230055282A1 (en) Multi-Factor Authentication with Increased Security
CN103986584A (en) Double-factor identity verification method based on intelligent equipment
CN107251035A (en) Account recovers agreement
WO2018219056A1 (en) Authentication method, device, system and storage medium
CA2945774A1 (en) Device registration, authentication, and authorization system and method
CN106230594B (en) A method of user authentication is carried out based on dynamic password
CN104253812A (en) Delegating authentication for a web service
CN103379108A (en) Flexible and safe concentrated identity authentication method
CN100365974C (en) Device and method for controlling computer access
US11716312B1 (en) Platform for optimizing secure communications
CN102571874B (en) On-line audit method and device in distributed system
JP4862551B2 (en) Authentication control program and authentication device
Shevchuk et al. Designing Secured Services for Authentication, Authorization, and Accounting of Users
KR101510290B1 (en) Apparatus for implementing two-factor authentication into vpn and method for operating the same
CN104753854A (en) Method for setting uniform Web interface for various authentication/authorization servers
CN114422182B (en) Unified identity management platform
CN112767576B (en) Lockset authorization management method and lockset authorization management system
WO2021106381A1 (en) Information processing device, information processing method, authentication device, authentication method, authentication system, authentication method in authentication system, and computer program
CN100474825C (en) Method and system for unified process of domain authentication and user network authority control

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160608