WO2009129753A1 - 提高网络身份认证安全性的方法和装置 - Google Patents

提高网络身份认证安全性的方法和装置 Download PDF

Info

Publication number
WO2009129753A1
WO2009129753A1 PCT/CN2009/071463 CN2009071463W WO2009129753A1 WO 2009129753 A1 WO2009129753 A1 WO 2009129753A1 CN 2009071463 W CN2009071463 W CN 2009071463W WO 2009129753 A1 WO2009129753 A1 WO 2009129753A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal user
identity authentication
network identity
authentication
information
Prior art date
Application number
PCT/CN2009/071463
Other languages
English (en)
French (fr)
Inventor
陈国乔
杨健
王雷
张惠萍
董挺
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2009129753A1 publication Critical patent/WO2009129753A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method and apparatus for improving network identity authentication security.
  • a Web Service is an interface that describes operations that can be accessed over the network using a standardized XML (extensible markup language) messaging mechanism.
  • a Web Service can be used to implement complex functions or business transactions, either alone or in conjunction with other Web services.
  • a terminal may use multiple web services, but not all services are located within the trust domain of its network operator.
  • the prior art provides an identity association method, that is, a network identity, which is used to describe that the status or data provided to the terminal is consistent among various network services.
  • SP Service Provider
  • IDP Identity Provider
  • DS Discovery Service
  • P AP Attribute Provider
  • SP Service Provider
  • IDP Identity Provider
  • DS Discovery Service
  • P AP Attribute Provider
  • SP Service Provider
  • IDP Identity Provider
  • DS Discovery Service
  • P AP Attribute Provider
  • the SP is an entity that provides services and/or goods to the main user.
  • IDP is used to generate, maintain, and manage identity information for the subject user and to provide authentication assertions for other service providers in an authentication domain (or even a circle of trust).
  • DS allows different entities (such as service providers) to dynamically discover a registered service for a principal.
  • the DS when the DS determines the type of service required and meets the rights set by the user, indicating that the information on the entity is allowed to be provided to the relevant entity, the DS will reply the relevant entity with a service description, including the required entity service.
  • WSDL Web Service Description Language
  • the DS can also be used as a secure token service to send the security token to the requester, which the requestor needs to present when requesting service from DS.
  • the AP is used to provide the attributes of a subject user.
  • the identity authentication by the IDP and the attributes provided by the attribute provider to the SP are required to complete the service.
  • other entities in the trust circle can use the IDP to authenticate the user information, identify the user identity through NI (Network Identity), and perform the Attibute information on the user. Acquire, and based on this, carry out related business applications.
  • the main user request service and the NI authentication process are as follows:
  • the SP after receiving the request initiated by the main user, the SP sends a request to the IDP to verify the authentication status of the main user;
  • the IDP After receiving the request sent by the SP, the IDP returns a reply request to the SP, where the reply request includes an authentication assertion describing the user authentication status, and may also include bootstrap information (optional) required to access the discovery service entity of the subject user; If there is no valid SSO (Single Sign-On) content for the principal user at the SP, the principal user needs to be authenticated by IDP in order to establish a valid SSO session;
  • SSO Single Sign-On
  • the SP uses the bootstrap information from the IDP to query the subject user's discovery service entity for a particular attribute provider;
  • the discovery service entity returns an authentication assertion to the SP, including the address information of the attribute provider of the subject user;
  • the SP accesses the attribute provider using the address information in the authentication assertion, requesting the query attribute or the operation related to the attribute from the attribute provider (for example, deleting or modifying the attribute);
  • the attribute provider returns a reply message to the SP
  • the SP After receiving the reply message from the attribute provider, the SP allows or denies the request of the subject user.
  • IDP authentication to the main user needs to call an external authentication server, such as LDAP (Light Directory Access Protocol) or relational database and access control protocol attached to the relational database.
  • LDAP Light Directory Access Protocol
  • relational database relational database and access control protocol attached to the relational database.
  • the embodiment of the present invention provides a method for improving the security of the network identity authentication, which is applied to the web service, and the method includes:
  • an embodiment of the present invention further provides an identity provider device, which is applied to a web service, where the device includes:
  • An authentication module configured to perform network identity authentication on the SP and the end user
  • a sending module configured to return an authentication result obtained by the authentication module to the SP, where the authentication result includes a network identity authentication result of the terminal user and a network identity authentication result of the SP.
  • the embodiment of the present invention further provides a service provider device, which is applied to a web service, and the device includes:
  • An authentication module configured to perform network identity authentication on the SP and the end user
  • a sending module configured to return an authentication result obtained by the authentication module to the SP, where the authentication result includes a network identity authentication result of the terminal user and a network identity authentication result of the SP.
  • the embodiment of the present invention provides a method for seamlessly switching the single sign-on process, which is applied to a web service, and the method includes:
  • the SP After the SP requests the network identity authentication from the IDP specified by the terminal user, and the result that the IDP does not support the authentication, the IDP of the SP belongs to the network identity authentication request sent by the terminal user;
  • the authentication result is returned to the terminal user.
  • the embodiment of the present invention further provides a method for seamlessly switching the single sign-on process, which is applied to a web service, and the method includes:
  • the terminal user is authenticated, and the authentication result is returned to the terminal user.
  • the embodiment of the present invention further provides an identity provider device, which is applied to a web service, where the identity provider is an identity provider to which the SP belongs, and the device includes:
  • a receiving module configured to receive a network identity authentication request sent by the terminal user
  • an authentication module configured to: after the receiving module receives the network identity authentication request, perform network identity authentication on the terminal user, and return an authentication result to the terminal user.
  • an embodiment of the present invention further provides a service provider device, where the device includes:
  • a receiving module configured to receive a service request sent by the terminal user, and configured to receive, by the terminal user, an IDP that returns a result that does not support the authentication, where the result indicates that the IDP specified by the terminal user is not the SP
  • the sending module configured to: after the receiving module receives the service request, initiate a network identity authentication request to the IDP specified by the terminal user, and after the receiving module receives the result, responding to the response Giving the end user the response The IDP information to which the SP belongs is carried.
  • the embodiment of the present invention provides a method for improving the security of the network identity authentication, which is applied to the web service, and the method includes:
  • the embodiment of the present invention further provides a service provider device, which is applied to a web service, where the service provider does not have an IDP, and the device includes:
  • a receiving module configured to receive a service authentication request sent by the terminal user
  • the service authentication module is configured to: after receiving the service authentication request, the receiving module authenticates the terminal user, and returns an authentication result to the terminal user.
  • an embodiment of the present invention further provides an identity provider device, which is applied to a web service, where the device includes:
  • a receiving module configured to receive, by the SP, a request for performing network identity authentication on the terminal user, where the request includes access permission information of the service provider;
  • a control module configured to: after the receiving module receives the request, perform network identity authentication on the terminal user according to the access permission information, and return an authentication result to the SP.
  • the embodiment of the present invention improves the security between the terminal user and the SP by performing network identity authentication on both the end user and the SP in the single sign-on process.
  • the ID of the SP belongs to the end user for network identity authentication or SP.
  • the method of performing service authentication request for the terminal user realizes seamless handover in the single sign-on process and improves the terminal user experience; controlling the network identity of the terminal user by using the access authority information of the SP, and controlling the SP to the terminal user The acquisition of attribute information, so that the SP provides different services to the end user.
  • FIG. 1 is a schematic flowchart of a method for improving network identity authentication security according to an embodiment of the present invention
  • FIG. 2 is a first schematic flowchart of a method for seamlessly switching between single sign-on processes according to an embodiment of the present invention
  • FIG. 3 is a second schematic flowchart of a method for seamlessly switching a single sign-on process according to an embodiment of the present invention
  • FIG. 4 is a third schematic flowchart of a method for seamlessly switching a single sign-on process according to an embodiment of the present invention
  • FIG. 5 is a schematic flowchart of a method for improving network identity authentication security according to an embodiment of the present invention
  • FIG. 6 is a schematic diagram of a first structure of an identity provider device according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of a second structure of an identity provider device according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of a first structure of a service provider apparatus according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of a third structure of an identity provider device according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of a second structure of a service provider apparatus according to an embodiment of the present invention.
  • FIG. 11 is a schematic diagram of a third structure of a service provider device according to an embodiment of the present invention.
  • FIG. 12 is a fourth schematic structural diagram of a service provider apparatus according to an embodiment of the present invention.
  • FIG. 13 is a fifth structural diagram of a service provider apparatus according to an embodiment of the present invention.
  • FIG. 14 is a fourth structural diagram of an identity provider device according to an embodiment of the present invention.
  • FIG. 15 is a fifth structural diagram of an identity provider device according to an embodiment of the present invention.
  • FIG. 16 is a schematic diagram of a first structure of a system for improving network identity authentication security according to an embodiment of the present invention
  • FIG. 17 is a schematic structural diagram of a system for seamlessly switching a single sign-on process according to an embodiment of the present invention
  • a second schematic structural diagram of a system for improving network identity authentication security provided by an embodiment of the present invention.
  • the embodiment of the present invention improves the security between the terminal user and the SP by performing network identity authentication on both the end user and the SP in the single sign-on process.
  • the ID of the SP belongs to the end user for network identity authentication or SP.
  • the method of performing service authentication request for the terminal user realizes seamless handover in the single sign-on process and improves the terminal user experience; controlling the network identity of the terminal user by using the access authority information of the SP, and controlling the SP to the terminal user The acquisition of attribute information, so that the SP provides different services to the end user.
  • An embodiment of the present invention provides a method for improving network identity authentication security, including: IDP performs network identity authentication on an SP and an end user, and returns an authentication result to the SP, where the authentication result includes the network identity authentication result of the SP and the use Network authentication results.
  • IDP performs network identity authentication on an SP and an end user, and returns an authentication result to the SP, where the authentication result includes the network identity authentication result of the SP and the use Network authentication results.
  • the physical devices shown in FIG. 1 are all located in a circle of trust, and the method specifically includes: 101: The terminal user initiates an authentication request to the SP, where the request carries the authentication information of the terminal user and the IDP specified by the terminal user. Identification information, and identification information of the network identity authentication result that requires the SP to return to the SP.
  • the SP After receiving the authentication request, the SP requests the corresponding IDP to perform network identity authentication on the terminal user according to the IDP identification information, and the SP may further carry the identity authentication information of the SP in the request, requesting the IDP to perform the SP Network identity authentication.
  • the SP may also complete the process of performing network identity authentication to the IDP before 102 or before 101.
  • the SP initiates a network identity authentication request initiated by the SP.
  • the identity authentication information of the SP may not be carried.
  • the SP simultaneously requests the IDP to perform network identity authentication on the terminal user and the SP.
  • the IDP After receiving the request sent by the SP, the IDP performs network identity authentication on the terminal user and the SP according to the saved terminal user information and the SP information, and returns an authentication result, where the authentication result includes a description of the terminal user authentication status. Authentication assertions, and the results of IDP's network authentication for the SP.
  • the authentication result returned by the IDP may further include: bootstrap information required for the SP to access the DS of the terminal user.
  • the SP After receiving the authentication result returned by the IDP, the SP returns the authentication result to the terminal user, which includes the authentication result for the terminal user and the authentication result for the SP.
  • the terminal user sends a message to the IDP, and checks the authentication status of the SP with the IDP, where the message includes the authentication result of the SP.
  • the IDP After receiving the message, the IDP returns a response, which includes an authentication assertion describing the SP authentication status. In this embodiment, the response returned by the IDP indicates that the result of the collation is that the SP is a valid SP.
  • the terminal user may further request the service from the SP, that is, the foregoing method further includes:
  • the terminal user initiates a service request to the SP, where the service request includes related operations that the terminal user needs to perform in the SP, for example, the terminal user purchases in the online mall provided by the SP.
  • the SP queries the corresponding DS for the attribute provider AP corresponding to the terminal user according to the guiding information returned by the IDP in 103.
  • the DS returns an authentication assertion to the SP, where the corresponding AP information, such as the address information of an AP, is included.
  • the SP After receiving the authentication assertion, the SP accesses the corresponding AP according to the AP information, and requests the genus of the terminal user. Sexual information.
  • the AP returns the end user's attribute information to the SP, such as the end user's name, gender, age, address, and phone number.
  • the SP After receiving the attribute information of the terminal user, the SP provides the service to the terminal user according to the attribute information.
  • the IDP may also control the network identity authentication of the terminal user according to the SP access authority information sent by the SP, such as determining whether the SP is allowed to request authentication, and if so, performing network identity on the SP and the terminal user. Authentication; otherwise, the network identity request sent by the SP is rejected.
  • the SP access permission information is usually an SP access control list sent by the terminal user, including the SP trusted by the terminal user and the SP that the terminal user does not trust, and different SPs have different access rights and the like. For example, SP1 can access the end user's name, age, and address, SP2 can access the end user's name and phone number, and more.
  • the IDP can control the SP to obtain the attribute information of the terminal user, thereby providing different services to the terminal user.
  • the IDP can also obtain the one-time information of the SP in advance. For example, in the 102, the SP sends the request initiation time as a one-time information to the IDP in the network identity authentication request, and correspondingly, in the 103 The IDP can also use the obtained one-time information of the SP to encrypt the authentication result obtained by performing network identity authentication on the terminal user, and return the encrypted information to the SP. After receiving the encrypted information, the SP can perform the authentication by decoding. result.
  • the network identity authentication (two-way authentication) is performed on the terminal user and the SP, and the security of the network identity authentication is improved.
  • the fake SP is prevented from exposing the user identity information to the user. , solved the security hole between the end user and the SP.
  • the SP can control the acquisition of the attribute information of the terminal user, thereby providing different services to the terminal user.
  • IDP can avoid replay attacks and further improve the security of network identity authentication.
  • the embodiment of the present invention further provides a method for seamlessly switching the single sign-on process, which is applied to a web service, including: after the SP requests the network identity authentication from the IDP specified by the terminal user, and obtains the result that the IDP does not support the authentication, The IDP to which the SP belongs receives the network identity authentication request sent by the terminal user; after the IDP of the SP belongs to the terminal user for network identity authentication, the authentication result is returned to the terminal user.
  • the identity provider A is the home IDP of the SP
  • the identity provider B is the IDP (usually the default) specified by the terminal user.
  • the terminal user is in the identity circle of the identity provider A and the identity provider B.
  • the embodiment belongs to the application scenario of the cross-trust circle, and the method specifically includes:
  • the terminal user initiates an authentication request to the SP, where the request carries the authentication information of the terminal user and the identifier information of the IDP specified by the terminal user.
  • the IDP specified by the terminal user is IDP B.
  • the SP After receiving the authentication request, the SP requests the corresponding IDP B to the terminal according to the IDP identification information. The user performs network identity authentication.
  • the IDP B After receiving the request sent by the SP, the IDP B performs network authentication on the terminal user according to the saved terminal user information, and returns an authentication result to the SP.
  • the authentication result includes an authentication assertion describing the authentication status of the terminal user.
  • the IDP B since the IDP B is not the ID of the SP, the network identity authentication is not supported for the terminal user. Therefore, the IDP B indicates that the IDP is not the ID of the SP, and the authentication cannot be completed.
  • the authentication result returned by the IDP may further include: guiding information required by the SP to access the DS of the terminal user.
  • the SP After receiving the authentication result returned by the IDP B, the SP sends a response to the terminal user, where the response includes the foregoing authentication result and the IDP information to which the SP belongs.
  • the IDP to which the SP belongs is IDP A.
  • the terminal user After receiving the response from the SP, the terminal user initiates a network identity authentication request to the IDP to which the SP belongs, and in this embodiment, initiates a network identity authentication request to the IDP A.
  • the IDP A After receiving the network identity authentication request, the IDP A performs network identity authentication on the terminal user, and returns the authentication result to the terminal user.
  • the authentication result returned by the IDP A to the terminal user is NI information, such as the NI identifier, and the terminal user can use the I identifier instead of re-entering the IDP every time the service is requested.
  • NI information such as the NI identifier
  • the terminal user After receiving the authentication result returned by the IDP A, the terminal user initiates a service request to the SP, where the service request includes the authentication result returned by the IDP A.
  • the SP After receiving the service request sent by the terminal user, the SP checks the authentication result of the terminal user with the IDP A, that is, checks the NI information of the terminal user;
  • the IDP A After receiving the verification request sent by the SP, the IDP A responds to the SP, and the response includes an authentication assertion describing the authentication status of the terminal user, that is, the result of the verification.
  • the terminal user authenticated by the IDP A.
  • the result of the NI information is correct for the end user's NI information.
  • the SP may also obtain, from the IDP A, the guidance information required to access the discovery service DS of the terminal user, that is, the IDP A may carry the guidance information in the response; correspondingly, the foregoing method further includes:
  • the SP After receiving the response returned by the IDP A, the SP accesses the corresponding DS according to the guiding information, and requests to obtain the information of the attribute provider AP.
  • the DS After receiving the request, the DS returns an authentication assertion to the SP, which includes information about the corresponding AP.
  • the SP accesses the corresponding AP according to the received AP information, and requests to obtain the attribute information of the terminal user.
  • the AP returns a response to the SP, where the response includes attribute information of the terminal user.
  • the SP After receiving the response, the SP responds to the end user and returns to the end user according to the attribute information of the obtained terminal user. End users provide services.
  • the SP may further carry the identifier information in the network identity authentication request, where the identifier information is used to request the network identity authentication result of the return SP, and accordingly, the IDP B in the 203 performs network identity authentication on the SP according to the identifier information. And carrying the result of the network identity authentication of the SP in the returned authentication result. Therefore, it is possible to prevent the fake SP from providing services to the end user and causing loss to the end user.
  • This embodiment is applicable to an application scenario in which an SP has an IDP.
  • the terminal user performs network identity authentication on the IDP of the SP, thereby implementing seamless handover in the single sign-on process. the goal of.
  • Network ID authentication of the SP through IDP can identify fake SPs, avoiding the loss of user identity information, and solving the security vulnerabilities between the end users and the SP.
  • This embodiment is similar to the embodiment shown in FIG. 2, and belongs to an application scenario without a cross-trust circle. Referring to FIG.
  • the identity provider A is an IDP to which the SP belongs
  • the identity provider B is an IDP specified by the terminal user (usually the default).
  • the end user is in the trust circle of the identity provider B
  • the SP is in the trust circle of the identity provider A
  • the two trust circles do not cross, the terminal user cannot complete the authentication at the IDP to which the SP belongs.
  • the embodiment of the invention further provides a method for seamlessly switching the single sign-on process, and the method specifically includes:
  • Steps 301 to 306 are the same as 201 to 206 in the embodiment shown in FIG. 2, and details are not described herein again.
  • the authentication result returned by the IDP A to the terminal user in 306 is the result of the authentication failure.
  • the terminal user may further request the IDP B to obtain the boot information required by the SP to access the DS of the terminal user.
  • the IDP B After receiving the request sent by the terminal user, the IDP B responds to the terminal user, including the boot information required by the SP to access the DS.
  • the terminal user After receiving the response returned by the IDP B, the terminal user initiates a service authentication request to the SP, including the terminal user information, the password information, and the like, and may also carry the foregoing guiding information.
  • the SP After receiving the service authentication request of the terminal user, the SP accesses the corresponding DS according to the guiding information, and requests to obtain the attribute provider AP corresponding to the terminal user.
  • the DS After receiving the SP request, the DS returns an authentication assertion to the SP, where the AP information, such as an AP address information, is included.
  • the SP After receiving the authentication assertion, the SP accesses the corresponding AP according to the AP information, and requests to acquire the terminal user. Attribute information.
  • the AP returns the end user's attribute information to the SP, such as the end user's name, gender, age, address, and phone number.
  • the SP After receiving the attribute information of the terminal user, the SP provides the service to the terminal user according to the attribute information.
  • the SP may further carry the identifier information in the network identity authentication request, where the identifier information is used to request the return of the network identity authentication result of the SP, and accordingly, the IDP B or the IDP A performs the network on the SP according to the identifier information.
  • the authentication is performed, and the result of the network identity authentication of the SP is carried in the returned authentication result, so that the fake SP can be prevented from providing services to the terminal user, thereby causing loss to the terminal user.
  • the present embodiment is applicable to an application scenario in which an IDP to which an SP belongs is not an IDP to which the terminal user belongs.
  • the service authentication is performed on the terminal user through the SP. , the purpose of seamless switching during the single sign-on process.
  • the service interruption in the handover process is avoided to bring losses to the end user.
  • Network ID authentication of the SP through the IDP can identify the fake SP, avoiding the loss of the user's identity information and the like, and solving the security vulnerability between the end user and the SP.
  • the embodiment of the present invention further provides a method for seamlessly switching between the single sign-on process, and is applied to a web service, including: when the SP has no belonging IDP, the SP receives a service authentication request sent by the terminal user; The user performs authentication and returns the authentication result to the end user.
  • the identity provider specifies the IDP (usually the default) for the terminal user, the end user is in the identity provider's trust circle, and the SP has no assigned IDP.
  • this embodiment belongs to the cross-trust circle.
  • An application scenario of switching with an untrusted circle the method specifically includes:
  • the end user initiates a service request to the SP.
  • the SP After receiving the service request, the SP finds that the SP does not have a home IDP, that is, does not support IDP authentication, and returns a response to the terminal user, requesting the user to perform authentication.
  • the terminal user may request the SPP to access the pilot information required by the SP before the 401 or 402, such as 401'. Accordingly, after receiving the SP request, the IDP replies to the terminal user, including the SP access terminal. The boot information required by the user's DS, such as 402'.
  • the terminal user After receiving the response from the SP, the terminal user initiates a service authentication request to the SP, including the terminal user information, the password information, and the like. Further, the terminal information may further include the foregoing guiding information.
  • the SP After receiving the service authentication request of the terminal user, the SP performs service authentication on the terminal user. At this time, the SP can directly return the result of the service authentication to the terminal user, or obtain the attribute information of the terminal user first, and then return. As a result of the service authentication, in this embodiment, the SP accesses the corresponding DS according to the foregoing guiding information, and requests to acquire the corresponding end user. AP information.
  • the DS returns an authentication assertion to the SP, which includes information about the corresponding AP, such as the address information of an AP.
  • 406 After receiving the authentication assertion, the SP accesses the corresponding AP according to the AP information, and requests to obtain the attribute information of the terminal user.
  • the AP After receiving the SP request, the AP returns the attribute information of the terminal user to the SP.
  • the SP After receiving the attribute information of the terminal user, the SP returns a response to the terminal user, and provides a service to the terminal user according to the attribute information.
  • the embodiment of the present invention further provides a method for improving network identity authentication security, which is applied to a web service, including: the IDP receives a request for network identity authentication sent by the SP, and the IDP accesses the SP according to the request. The permission information performs network identity authentication on the terminal user, and returns the authentication result to the SP.
  • the IDP maintains an access control list of an SP, and the SP controls the attribute information of the terminal user.
  • the method includes:
  • the terminal user initiates a network identity authentication request to the IDP, where the request carries the SP access permission information set by the terminal user, which is an access control list of the SP in this embodiment.
  • the list includes two trusted SPs: SP1 and SP2, and SP1 can access the end user's name, age, and address, SP2 can access the end user's name and phone number, and so on, as well as an untrusted SP3, the SP3. Cannot request network identity authentication from IDP, etc.
  • the IDP After receiving the network identity authentication request, the IDP performs network identity authentication on the terminal user, saves the SP access permission information set by the terminal user, and returns the result of the authentication to the terminal user.
  • 501 and 502 are the process of single sign-on for the end user.
  • the authentication result returned by the IDP to the terminal user is NI information, such as the NI identifier.
  • the terminal user can use the NI identifier to re-do the IDP every time the service is requested.
  • Network identity authentication only the SP can verify the NI identity by IDP check.
  • the terminal user After receiving the IDP authentication result, the terminal user initiates a service request to the SP, where the request includes the identity authentication information of the terminal user and the IDP identifier information specified by the terminal user.
  • the SP After receiving the service request, the SP requests, according to the IDP identifier information, the network identity authentication to the terminal user according to the IDP.
  • the IDP After receiving the network identity authentication request sent by the SP, the IDP determines, according to the saved access control list of the SP, that the SP identity is allowed to request authentication, and if yes, performs network identity authentication on the terminal user, and returns the authentication result. give SP; Otherwise, the network authentication request of the SP is rejected.
  • the SP is an SP trusted by the terminal user, and the authentication result is returned to the SP.
  • the IDP authenticates the end user by the network identity, which means that the I information of the terminal user sent by the SP is checked, that is, the terminal user has logged into the web service system, and only the end user's network identity can be checked at this time, without re-repairing Authenticate
  • the authentication result returned by the IDP may further include boot information required by the SP to access the DS of the terminal user. 506: After receiving the authentication result returned by the IDP, the SP accesses the corresponding DS according to the foregoing guiding information, and requests to obtain the information of the attribute provider AP corresponding to the terminal user.
  • the DS After receiving the request, the DS returns an authentication assertion to the SP, which includes information about the corresponding AP, such as the address information of an AP.
  • the SP After receiving the authentication assertion, the SP accesses the corresponding AP according to the AP information, and requests to obtain the attribute information of the terminal user.
  • the AP After receiving the request, the AP returns the attribute information of the terminal user to the SP.
  • the SP After receiving the attribute information of the terminal user returned by the AP, the SP returns a response to the terminal user, and provides a service to the terminal user according to the attribute information.
  • the SP may also carry the identifier information in the network identity authentication request, where the identifier information is used to request the return of the network identity authentication result of the SP, and accordingly, the IDP in the 505 performs network identity authentication on the SP according to the identifier information, and The result of the network identity authentication for the SP is carried in the returned authentication result. Therefore, it is possible to prevent the fake SP from providing services to the terminal user and causing loss to the terminal user.
  • the IDP can also obtain one-time information of the SP in advance, such as in 504.
  • the SP sends the request initiation time as a one-time information to the IDP in the network identity authentication request. Accordingly, the IDP can also use the acquired SP one-time information to encrypt the authentication result obtained by performing network identity authentication on the terminal user. And returning the encrypted information to the SP; after receiving the encrypted information, the SP performs decoding to obtain the authentication result.
  • the SP may delete the information of the terminal user in the authentication result, and the information is not cached locally, thereby greatly reducing the maintenance of the SP data information and the data storage of the SP.
  • the quantity reduces the security vulnerability and reduces the storage location of the end user information, eliminating the registration process of the end user for the SP.
  • an embodiment of the present invention provides an identity provider device, which is applied to a web service, and the device includes: an authentication module 601, configured to perform network identity authentication on an SP and an end user;
  • the sending module 602 is configured to return the authentication result obtained by the authentication module 601 to the SP, where the authentication result includes the network identity authentication result of the terminal user and the network identity authentication result of the SP.
  • FIG. 7 further includes:
  • the first receiving module 603 is configured to receive a network identity authentication request sent by the SP, where the network identity authentication request includes the identity authentication information of the SP and the identity authentication information of the terminal user.
  • the authentication module 601 is specifically configured to perform network identity authentication on the SP and the terminal user according to the identity authentication information of the SP and the identity authentication information of the terminal user after the first receiving module 603 receives the network identity authentication request.
  • the apparatus shown in Figure 6 further includes:
  • the second receiving module is configured to receive a network identity authentication request sent by the SP, where the network identity authentication request includes the identifier information and the identity authentication information of the terminal user, where the identifier information is used to request the network identity authentication result of the SP to be returned;
  • the authentication module 601 specifically includes:
  • a first authentication unit configured to perform network identity authentication on the SP
  • the second authentication unit is configured to perform network identity authentication on the terminal user according to the identity authentication information of the terminal user after the second receiving module 604 receives the network identity authentication request.
  • apparatus shown in FIG. 6 further includes:
  • the verification module is configured to: after receiving the request from the terminal user to verify the network identity authentication result of the SP, verify the network identity verification result of the SP, and return the verification result to the terminal user.
  • FIG. 7 further includes:
  • the third receiving module 604 is configured to receive a network identity authentication request sent by the SP.
  • the processing module 605 is configured to: after the third receiving module receives the network identity authentication request, determine, according to the SP access permission information in the request, whether the SP is allowed to request authentication, and if yes, trigger the authentication module to work; otherwise, reject the SP. request.
  • the apparatus shown in FIG. 6 further includes: An obtaining module, configured to obtain one-time information from the SP;
  • the sending module 602 specifically includes:
  • the encryption unit is configured to encrypt the authentication result obtained by the authentication module according to the one-time information acquired by the obtaining module, and the sending unit is configured to return the encrypted information of the encryption unit to the SP.
  • the network identity authentication (two-way authentication) is performed on the terminal user and the SP, and the security of the network identity authentication is improved.
  • the fake SP is prevented from exposing the user identity information to the user. , solved the security hole between the end user and the SP.
  • replay attacks can be avoided, and the security of the network identity authentication is further improved.
  • an embodiment of the present invention further provides a service provider device, which is applied to a web service, and the device includes: a receiving module 801, configured to receive a service request sent by a terminal user, where the service request includes the identifier information and the terminal.
  • the user's identity authentication information which is used to request the return of the service provider's network identity authentication result;
  • the sending module 802 is configured to initiate a network identity authentication request to the IDP, and carry the identity information and the identity authentication information of the terminal user in the network identity authentication request.
  • the sending module 802 in the apparatus shown in FIG. 8 specifically includes:
  • the sending unit is configured to initiate a network identity authentication request to the IDP, and carry the identity information, the identity authentication information of the terminal user, and the identity authentication information of the service provider in the network identity authentication request.
  • the transmitting module 802 in the apparatus shown in FIG. 8 further includes:
  • a one-time information sending unit configured to send a one-time information of the service provider to the IDP
  • the device further includes:
  • the decryption module is configured to perform decryption after the device receives the encrypted information obtained by the IDP according to the one-time information.
  • the IDP is sent to the IDP to enable the IDP to perform network identity authentication on the SP, thereby improving the security of the network identity authentication.
  • the fake SP is prevented from exposing the identity information of the user to the user. The loss has solved the security hole between the end user and the SP.
  • the IDP encrypts the authentication result according to the information, which can avoid replay attacks and further improve the security of the network identity authentication.
  • an embodiment of the present invention further provides an identity provider device, which is applied to a web service, where the identity provider is an identity provider to which the SP belongs, and the device includes:
  • the receiving module 901 is configured to receive a network identity authentication request sent by the terminal user.
  • the authentication module 902 is configured to perform network identity authentication on the terminal user after receiving the network identity authentication request, and return the authentication result to the terminal user.
  • an embodiment of the present invention further provides a service provider device, where the device includes:
  • the receiving module 1001 is configured to receive a service request sent by the terminal user, and is further configured to receive a result that the IDP specified by the terminal user does not support the authentication, and the result indicates that the IDP specified by the terminal user is not an IDP to which the SP belongs;
  • the sending module 1002 is configured to: after receiving the service request, the receiving module 1001 initiates a network identity authentication request to the IDP specified by the terminal user, and after receiving the result, the receiving module sends a response to the terminal user, where the response carries the IDP information of the SP attribution. .
  • the receiving module 1001 is further configured to: when the IDP to which the SP belongs is not the IDP to which the terminal user belongs, receive the service authentication request sent by the terminal user;
  • the above device further comprises:
  • the service authentication module 1003 is configured to: after receiving the service authentication request, the receiving module 1001 authenticates the terminal user, and returns an authentication result to the terminal user.
  • an embodiment of the present invention further provides a service provider device, which is applied to a web service, where the service provider does not have an IDP, and the device includes:
  • the receiving module 1201 is configured to receive a service authentication request sent by the terminal user.
  • the service authentication module 1202 is configured to: after receiving the service authentication request, the receiving module 1201 authenticates the terminal user, and returns an authentication result to the terminal user.
  • the receiving module 1201 is further configured to receive a service request sent by the terminal user.
  • the above device further comprises:
  • the sending module 1203 is configured to: after receiving the service request, the receiving module 1201 returns a response to the terminal user, in response Indicates that the service provider does not have an assigned IDP.
  • an embodiment of the present invention further provides an identity provider device, which is applied to a web service, and the device includes: a receiving module 1401, configured to receive a request for network identity authentication sent by an SP to an end user;
  • the control module 1402 is configured to: after receiving the request, the receiving module 1401 determines, according to the preset SP access right information, whether the SP is allowed to request authentication, and if yes, performs network identity authentication on the terminal user, and returns the authentication result to the SP; otherwise , reject the SP request.
  • the above apparatus further includes:
  • the encryption processing module 1403 is configured to encrypt the authentication result obtained by the control module according to the one-time information of the SP included in the request received by the receiving module, and return the encrypted information to the SP.
  • an embodiment of the present invention further provides a system for improving network identity authentication security, which is applied to a web service, including an SP device 1601 and an IDP device 1602.
  • the SP device 1601 is configured to receive a service request sent by the terminal user, where the service request includes the identifier information and the identity authentication information of the terminal user, initiate a network identity authentication request to the IDP device 1602, and carry the foregoing in the network identity authentication request. Identification information and identity authentication information of the terminal user, the identifier information being used to request returning the network identity authentication result of the SP;
  • the IDP device 1602 is configured to perform network identity authentication on the SP. After receiving the network identity authentication request sent by the SP device 1601 and including the identity information of the terminal user, the network identity authentication is performed on the terminal user, and the obtained The network user authentication result of the end user and the network identity authentication result of the SP are returned to the SP device 1601.
  • an embodiment of the present invention further provides a system for seamlessly switching between single sign-on processes, which is applied to a web service, including an SP device 1701, a first IDP device 1702 designated by a terminal user, and a second IDP to which an SP belongs.
  • the SP device 1701 is configured to receive a service request sent by the terminal user, initiate a network identity authentication request to the first IDP device 1702 designated by the terminal user, and receive a result that the first IDP device 1702 returns the unsupported authentication, and the response is returned to the terminal.
  • the user carries the IDP information of the SP attribution in the response;
  • the first IDP device 1702 is configured to receive a network identity authentication request sent by the SP device 1701, and return a result of not supporting the authentication to the SP device 1701, where the result indicates that the IDP specified by the terminal user is not the IDP to which the SP belongs;
  • the second IDP device 1703 is configured to receive a network identity authentication request sent by the terminal user, perform network identity authentication on the terminal user, and return the authentication result to the terminal user.
  • an embodiment of the present invention further provides a system for improving network identity authentication security, which is applied to a web service, including an SP device 1801 and an IDP device 1802;
  • the SP device 1801 is configured to send a request for network identity authentication to the terminal user to the IDP device, where the request includes the access authority information of the SP;
  • the IDP device 1802 is configured to receive a request for network identity authentication of the terminal user sent by the SP device 1801, perform network identity authentication on the terminal user according to the access permission information, and return the authentication result to the SP device 1801. It will be understood by those skilled in the art that all or part of the steps carried by the method of the foregoing embodiment may be implemented by a program to instruct related hardware, and the program may be stored in a computer readable storage medium, and the program is executed. Including one or a combination of the steps of the method embodiments.
  • each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
  • the above-mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Description

提高网络身份认证安全性的方法和装置 本申请要求于 2008年 4月 26日提交中国专利局、 申请号为 200810094877.6、 发明名称 为 "提高网络身份认证安全性的方法和装置" 的中国专利申请的优先权, 其全部内容通过引 用结合在本申请中。
技术领域
本发明涉及通信技术领域, 特别涉及一种提高网络身份认证安全性的方法和装置。 背景技术 书
Web Service (服务)是描述一些操作的接口,可以使用标准化的 XML (extensible Markup Language, 可扩展标记语言)消息传递机制通过网络访问这些操作。 一个 Web Service可以单 独或协同其它 Web Service一起用于实现复杂的功能或商业交易。
终端可能会使用多种 Web Service, 但并不是所有服务都位于其网络运营商的信任域内。 为了提高终端的用户体验, 现有技术提供了一种身份联合方式, 即网络身份, 用来描述在多 种网络服务中, 使提供给终端的状态或数据保持一致。
网络身份消息交换中,会涉及四个实体: SP ( Service Provider,服务提供商)、 IDP (Identity Provider, 身份提供商)、 DS (Discovery Service, 发现服务)禾 P AP (Attribute Provider, 属性 提供商)。 其中, SP是为主体用户提供服务和 /或货物的实体。 IDP用于生成、 维护和管理主 体用户的身份信息, 并且能够为某认证域(甚至信任圈)中的其他服务提供商提供认证断言。 DS允许不同的实体 (如服务提供商)动态地发现一个主体的已注册的服务。 例如, 当 DS确 定了所需服务的类型, 且符合用户设定的权限, 表示该实体上的信息允许向相关实体提供, DS 将会向相关实体回复一个服务描述, 包括所需的实体服务的 WSDL ( Web Service Description Language, Web服务描述语言)。 DS还可以用作安全记号服务, 向请求者发送该 安全记号, 请求者在向 DS请求服务时, 需要出示这个记号。 AP用于提供某个主体用户的属 性。
现有技术中, 一个主体用户使用某个 SP完成某项业务时, 需要通过 IDP的身份认证, 以及属性提供商提供给 SP所需查询的属性(例如, 主体用户的位置信息)共同完成服务。 通 过用户在 IDP上完成认证工作, 信任圈内的其他实体能够利用 IDP对用户的认证信息, 通过 NI (Network Identity, 网络身份) 对用户身份进行识别, 并在此基础上对用户的 Attibute信 息进行获取, 并基于此开展相关的业务应用。 主体用户请求服务以及 NI认证过程如下:
1 ) 主体用户用 HTTP向 SP发起一个请求;
2) SP接收到主体用户发起的请求后, 向 IDP发送核对该主体用户的认证状态的请求;
3 ) IDP收到 SP发送的请求后, 向 SP返回回复请求, 该回复请求包括一个描述用户认证 状态的认证断言, 还可以包括访问主体用户的发现服务实体所需的 bootstrap信息 (可选项); 如果 SP处没有有效的 SSO ( Single Sign— 0n, 单点登录) 内容给主体用户, 主体用户需 要在 IDP认证以便建立一个合法的 SS0会话;
4) SP使用来自 IDP的 bootstrap信息向主体用户的发现服务实体询问某个特定属性提供 商;
5 ) 发现服务实体向 SP返回一个认证断言, 包括主体用户的属性提供商的地址信息;
6) SP 使用认证断言中的地址信息访问属性提供商, 从属性提供商处请求查询属性或有 关属性的操作 (例如, 删除或修改属性);
7) 属性提供商向 SP返回回复信息;
8) SP收到属性提供商的回复信息后, 允许或拒绝该主体用户的请求。
其中, IDP对主体用户的认证需要调用外部认证服务器,如 LDAP (Light Directory Access Protocol, 轻量级目录访问协议) 或关系数据库及附加在关系数据库上的访问控制协议。
在对现有技术进行分析后, 发明人发现:
由于网络中既存在信任圈又存在非信任圈,用户在向 SP请求业务时,可能涉及到信任圈 与非信任圈的切换问题, 上述现有技术还无法实现信任圈与非信任圈的无缝切换, 当从信任 圈切换到非信任圈时, 有可能造成业务中断。 另外, 用户请求业务时, 有可能面临虚假 SP, 会使用户的身份信息等暴露, 给用户带来损失, 存在较大的安全漏洞。 发明内容
为了提高网络身份认证的安全性, 一方面, 本发明实施例提供了一种提高网络身份认证 安全性的方法, 应用于 web服务, 所述方法包括:
对服务提供商 SP和终端用户进行网络身份认证;
将认证结果返回给所述 SP, 所述认证结果包括所述 SP的网络身份认证结果和所述终端 用户的网络身份认证结果。 另一方面, 本发明实施例还提供了一种身份提供商装置, 应用于 web服务, 所述装置包 括:
认证模块, 用于对 SP和终端用户进行网络身份认证;
发送模块, 用于将所述认证模块得到的认证结果返回给所述 SP, 所述认证结果包括所述 终端用户的网络身份认证结果和所述 SP的网络身份认证结果。
再一方面, 本发明实施例还提供了一种服务提供商装置, 应用于 web服务, 所述装置包 括:
认证模块, 用于对 SP和终端用户进行网络身份认证;
发送模块, 用于将所述认证模块得到的认证结果返回给所述 SP, 所述认证结果包括所述 终端用户的网络身份认证结果和所述 SP的网络身份认证结果。
为了实现单点登录过程中的无缝切换, 一方面, 本发明实施例提供了一种实现单点登录 过程无缝切换的方法, 应用于 web服务, 所述方法包括:
当 SP向终端用户指定的 IDP请求网络身份认证并且得到所述 IDP不支持所述认证的结 果后, 所述 SP归属的 IDP接收所述终端用户发来的网络身份认证请求;
所述 SP归属的 IDP对所述终端用户进行网络身份认证后, 返回认证结果给所述终端用 户。
另一方面, 本发明实施例还提供了一种实现单点登录过程无缝切换的方法, 应用于 web 服务, 所述方法包括:
当自身没有归属的 IDP时, 接收终端用户发来的业务鉴权请求;
对所述终端用户进行鉴权, 并返回鉴权结果给所述终端用户。
再一方面, 本发明实施例还提供了一种身份提供商装置, 应用于 web服务, 所述身份提 供商为 SP归属的身份提供商, 所述装置包括:
接收模块, 用于接收终端用户发来的网络身份认证请求;
认证模块, 用于在所述接收模块接收到所述网络身份认证请求后, 对所述终端用户进行 网络身份认证, 并返回认证结果给所述终端用户。
又一方面, 本发明实施例还提供了一种服务提供商装置, 所述装置包括:
接收模块, 用于接收终端用户发来的业务请求; 还用于接收所述终端用户指定的 IDP返 回不支持所述认证的结果,所述结果中指明所述终端用户指定的 IDP不是所述 SP归属的 IDP; 发送模块, 用于在所述接收模块收到所述业务请求后, 向所述终端用户指定的 IDP发起 网络身份认证请求, 在所述接收模块收到所述结果后, 回复响应给所述终端用户, 所述响应 中携带所述 SP归属的 IDP信息。
为了控制 SP对终端用户属性信息的获取,一方面,本发明实施例提供了一种提高网络身 份认证安全性的方法, 应用于 web服务, 所述方法包括:
接收 SP发来的对终端用户进行网络身份认证的请求,所述请求中包括服务提供商的访问 权限信息;
根据所述访问权限信息, 对所述终端用户进行网络身份认证, 返回认证结果。
另一方面, 本发明实施例还提供了一种服务提供商装置, 应用于 web服务, 所述服务提 供商没有归属的 IDP, 所述装置包括:
接收模块, 用于接收终端用户发来的业务鉴权请求;
业务鉴权模块, 用于当所述接收模块收到所述业务鉴权请求后, 对所述终端用户进行鉴 权, 并返回鉴权结果给所述终端用户。
再一方面, 本发明实施例还提供了一种身份提供商装置, 应用于 web服务, 所述装置包 括:
接收模块,用于接收 SP发来的对终端用户进行网络身份认证的请求,所述请求中包括服 务提供商的访问权限信息;
控制模块, 用于当所述接收模块收到所述请求后, 根据所述访问权限信息对所述终端用 户进行网络身份认证, 并返回认证结果给所述 SP。
本发明实施例通过在单点登录过程中对终端用户和 SP均进行网络身份认证的方式,提高 了终端用户和 SP之间的安全性; 采用 SP归属的 IDP对终端用户进行网络身份认证或 SP对 终端用户进行业务鉴权请求的方式, 实现单点登录过程中的无缝切换, 提高了终端用户体验; 通过 SP的访问权限信息控制对终端用户进行网络身份认证, 可以控制 SP对终端用户的属性 信息的获取, 从而使 SP对终端用户提供不同的服务。 附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实施例或现有技术 描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一 些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动性的前提下, 还可以根据这 些附图获得其他的附图。
图 1是本发明实施例提供的提高网络身份认证安全性的方法流程示意图;
图 2是本发明实施例提供的实现单点登录过程无缝切换的方法第一种流程示意图; 图 3是本发明实施例提供的实现单点登录过程无缝切换的方法第二种流程示意图; 图 4是本发明实施例提供的实现单点登录过程无缝切换的方法第三种流程示意图; 图 5是本发明实施例提供的提高网络身份认证安全性的方法流程示意图;
图 6是本发明实施例提供的身份提供商装置的第一种结构示意图;
图 7是本发明实施例提供的身份提供商装置的第二种结构示意图;
图 8是本发明实施例提供的服务提供商装置的第一种结构示意图;
图 9是本发明实施例提供的身份提供商装置的第三种结构示意图;
图 10是本发明实施例提供的服务提供商装置的第二种结构示意图;
图 11是本发明实施例提供的服务提供商装置的第三种结构示意图;
图 12是本发明实施例提供的服务提供商装置的第四种结构示意图;
图 13是本发明实施例提供的服务提供商装置的第五种结构示意图;
图 14是本发明实施例提供的身份提供商装置的第四种结构示意图;
图 15是本发明实施例提供的身份提供商装置的第五种结构示意图;
图 16是本发明实施例提供的提高网络身份认证安全性的***的第一种结构示意图; 图 17是本发明实施例提供的实现单点登录过程无缝切换的***的结构示意图; 图 18是本发明实施例提供的提高网络身份认证安全性的***的第二种结构示意图。 具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描 述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部的实施例。 基于本发明 中的实施例, 本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
本发明实施例通过在单点登录过程中对终端用户和 SP均进行网络身份认证的方式,提高 了终端用户和 SP之间的安全性; 采用 SP归属的 IDP对终端用户进行网络身份认证或 SP对 终端用户进行业务鉴权请求的方式, 实现单点登录过程中的无缝切换, 提高了终端用户体验; 通过 SP的访问权限信息控制对终端用户进行网络身份认证, 可以控制 SP对终端用户的属性 信息的获取, 从而使 SP对终端用户提供不同的服务。 本发明实施例提供了一种提高网络身份认证安全性的方法, 包括: IDP对 SP和终端用户 进行网络身份认证, 并将认证结果返回给 SP, 该认证结果包括 SP的网络身份认证结果和用 的网络身份认证结果。 参见图 1, 图 1中所示的实体设备均位于信任圈中, 该方法具体包括: 101: 终端用户向 SP发起一个认证请求, 该请求中携带终端用户的认证信息、 终端用户 指定的 IDP的标识信息, 以及需要 SP返回 SP的网络身份认证结果的标识信息。
102: SP接收到该认证请求后, 根据其中的 IDP标识信息, 向对应的 IDP请求对终端用 户进行网络身份认证, 同时 SP还可以在该请求中携带 SP的身份认证信息, 请求 IDP对 SP 进行网络身份认证。
在实际应用中, SP也可以在 102之前或者 101之前完成向 IDP进行网络身份认证的过程, 当在 102之前 SP已完成向 IDP进行网络身份认证的过程时, 102中 SP发起的网络身份认证 请求中可以不携带 SP的身份认证信息。 在本实施例中 SP同时向 IDP请求对终端用户和 SP 进行网络身份认证。
103: IDP收到 SP发来的请求后, 根据已保存的终端用户信息和 SP的信息, 对终端用户 和 SP进行网络身份认证, 并返回认证结果,该认证结果包括一个描述终端用户认证状态的认 证断言, 以及 IDP对 SP进行网络身份认证的结果。
其中, 进一步地, IDP返回的认证结果中还可以包括: SP访问终端用户的 DS所需的引 导 (bootstrap) 信息。
104: SP收到 IDP返回的认证结果后, 将该认证结果返回给终端用户, 其中包含对终端 用户的认证结果, 以及对 SP的认证结果。
105: 终端用户发送消息给 IDP, 向 IDP核对 SP的认证状态, 该消息中包含 SP的认证 结果。
106: IDP收到该消息后, 返回响应, 其中包括一个描述 SP认证状态的认证断言。 在本 实施例中, IDP返回的响应中指明核对后的结果为该 SP为合法的 SP。
终端用户在得到 IDP返回的 SP为合法的 SP的确认结果后, 进一步地, 还可以向 SP请 求业务, 即上述方法还包括:
107: 终端用户向 SP发起一个业务请求, 该业务请求中包含终端用户需要在 SP进行的 相关操作等等, 例如, 终端用户在该 SP提供的网上商城中买东西。
108: SP根据 103中 IDP返回的引导信息, 向相应的 DS询问终端用户对应的属性提供 商 AP。
109: 该 DS返回一个认证断言给 SP, 其中, 包括相应的 AP信息, 如某个 AP的地址信 息。
110: SP收到该认证断言后, 根据其中的 AP信息, 访问相应的 AP, 请求终端用户的属 性信息。
111: 该 AP返回终端用户的属性信息给 SP, 如终端用户的姓名、 性别、 年龄、 地址和电 话等等。
112: SP收到终端用户的属性信息后, 根据该属性信息向终端用户提供业务。
进一步地, 在 103中 IDP还可以根据 SP发来的 SP访问权限信息控制对终端用户的网络 身份认证, 如判断该 SP是否被允许请求认证, 如果是, 则对该 SP和终端用户进行网络身份 认证; 否则, 拒绝该 SP发来的网络身份认证请求。 其中, SP访问权限信息通常为终端用户 发来的 SP访问控制列表, 包括终端用户信赖的 SP和终端用户不信赖的 SP, 以及不同的 SP 具有不同的访问权限等信息。 例如, SP1 可以访问终端用户的姓名、 年龄和地址, SP2可以 访问终端用户的姓名和电话等等。 IDP通过维护 SP访问控制列表, 可以控制 SP获取终端用 户的属性信息, 从而给终端用户提供不同的业务。
为了避免出现重放攻击, 进一步地, IDP还可以预先获取 SP的一次性信息, 如 102中 SP将发起请求的时间作为一次性信息携带在网络身份认证请求中发给 IDP, 相应地, 103中 IDP还可以利用获取的 SP的一次性信息加密对终端用户进行网络身份认证得到的认证结果, 并将加密后的信息返回给 SP; SP收到该加密后的信息后, 进行解码可以得到该认证结果。
本实施例通过对终端用户和 SP进行网络身份认证 (双向认证), 提高了网络身份认证的 安全性, 与现有技术相比, 避免了虚假 SP使用户的身份信息等暴露给用户带来损失, 解决了 终端用户与 SP之间的安全漏洞。 通过在 IDP维护 SP访问权限信息, 可以控制 SP对终端用 户的属性信息的获取, 从而可以给终端用户提供不同的服务。 IDP通过获取 SP的一次性信息 并对认证结果加密, 可以避免出现重放攻击, 进一步提高了网络身份认证的安全性。 本发明实施例还提供了一种实现单点登录过程无缝切换的方法,应用于 web服务,包括: 当 SP向终端用户指定的 IDP请求网络身份认证并且得到 IDP不支持该认证的结果后, SP归 属的 IDP接收该终端用户发来的网络身份认证请求; SP归属的 IDP对该终端用户进行网络身 份认证后, 返回认证结果给终端用户。 参见图 2, 身份提供商 A为 SP的归属 IDP, 身份提供 商 B为终端用户指定的 IDP (通常为默认的), 终端用户既在身份提供商 A的信任圈内, 又 在身份提供商 B的信任圈内, 本实施例属于交叉信任圈的应用场景, 该方法具体包括:
201: 终端用户向 SP发起一个认证请求, 该请求中携带终端用户的认证信息和终端用户 指定的 IDP的标识信息, 在本实施例中终端用户指定的 IDP为 IDP B。
202: SP收到该认证请求后, 根据其中的 IDP的标识信息, 向对应的 IDP B请求对终端 用户进行网络身份认证。
203: IDP B收到 SP发来的请求后, 根据已保存的终端用户信息对终端用户进行网络身 份认证, 并返回认证结果给 SP, 该认证结果包括一个描述终端用户认证状态的认证断言。 在 本实施例中, 由于 IDP B不是 SP归属的 IDP, 不支持对该终端用户进行网络身份认证, 因此 IDP B在返回的认证结果中指明自己不是 SP归属的 IDP, 无法完成认证。
进一步地, IDP返回的认证结果中还可以包括: SP访问终端用户的 DS所需的引导信息。
204: SP收到 IDP B返回的认证结果后, 回复响应给终端用户, 该响应中包含上述认证 结果和 SP所归属的 IDP信息。 在本实施例中, SP归属的 IDP为 IDP A。
205: 终端用户收到 SP的响应后, 向 SP所归属的 IDP发起网络身份认证请求, 在本实 施例中向 IDP A发起网络身份认证请求。
206: IDP A收到该网络身份认证请求后, 对终端用户进行网络身份认证, 并返回认证结 果给终端用户。
205和 206为终端用户单点登录的过程, 登录成功后, IDP A返回给终端用户的认证结果 为 NI信息, 如 NI标识, 终端用户使用该 I标识可以不用每次请求业务时都向 IDP重新进 行网络身份认证, 只需 SP向 IDP核对验证该 NI标识即可。
207: 终端用户收到 IDP A返回的认证结果后, 向 SP发起一个业务请求, 该业务请求中 包含 IDP A返回的认证结果。
208: SP收到终端用户发来的业务请求后, 向 IDP A核对终端用户的认证结果, 即核对 终端用户的 NI信息;
209: IDP A收到 SP发来的核对请求后, 回复响应给 SP, 该响应中包括一个描述终端用 户认证状态的认证断言, 即核对的结果, 在本实施例中, IDP A核对的终端用户的 NI信息的 结果为终端用户的 NI信息是正确的。 进一步地, SP还可以从 IDP A处获取访问终端用户的 发现服务 DS所需的引导信息, 即 IDP A可以在该响应中携带引导信息; 相应地, 上述方法 还包括:
210: SP收到 IDP A返回的响应后, 根据其中的引导信息访问相应的 DS, 请求获取属性 提供商 AP的信息。
211: DS收到该请求后, 返回一个认证断言给 SP, 其中包括相应的 AP的信息。
212: SP根据收到的 AP的信息, 访问相应的 AP, 请求获取终端用户的属性信息。
213: AP返回响应给 SP, 该响应中包含终端用户的属性信息。
214: SP 收到该响应后, 回复响应给终端用户, 并根据得到的终端用户的属性信息向终 端用户提供业务。
进一步地, 202中 SP还可以在网络身份认证请求中携带标识信息, 该标识信息用于要求 返回 SP的网络身份认证结果, 相应地, 203中 IDP B根据该标识信息对 SP进行网络身份认 证, 并在返回的认证结果中携带对 SP的网络身份身份认证的结果。 从而可以防止虚假的 SP 向终端用户提供业务, 给终端用户带来损失。
本实施例适用于 SP有归属的 IDP的应用场景, 当终端用户指定的 IDP无法完成网络身 份认证时, 通过终端用户在 SP归属的 IDP进行网络身份认证, 实现了单点登录过程中无缝 切换的目的。 与现有技术相比, 避免了切换过程中业务中断给终端用户带来损失。 通过 IDP 对 SP进行网络身份认证, 可以识别虚假的 SP, 避免用户的身份信息等暴露给用户带来损失, 解决了终端用户与 SP之间的安全漏洞。 本实施例与图 2所示的实施例类似, 属于无交叉信任圈的应用场景, 参见图 3, 身份提 供商 A为 SP归属的 IDP, 身份提供商 B为终端用户指定的 IDP (通常为默认的), 终端用户 在身份提供商 B的信任圈内, SP在身份提供商 A的信任圈内, 且两个信任圈不交叉, 则终 端用户无法在 SP归属的 IDP处完成认证。 本发明实施例还提供了一种实现单点登录过程无 缝切换的方法, 该方法具体包括:
步骤 301至 306与图 2所示的实施例中的 201至 206相同, 此处不再赘述。 在本实施例 中, 由于 SP归属的 IDP A不是终端用户归属的 IDP, 因此 306中 IDP A返回给终端用户的认 证结果为认证失败的结果。
307: 终端用户收到 IDP A返回的认证结果后, 进一步地, 还可以向 IDP B请求 SP访问 终端用户的 DS所需的引导信息。
308: IDP B收到终端用户发来的请求后, 回复响应给终端用户, 其中包括 SP访问 DS 所需的引导信息。
309: 终端用户收到 IDP B返回的响应后, 向 SP发起一个业务鉴权请求, 其中包括终端 用户信息、 密码信息等内容, 还可以携带上述引导信息。
310: SP收到终端用户的业务鉴权请求后, 根据其中的引导信息访问相应的 DS, 请求获 取终端用户对应的属性提供商 AP。
311: 该 DS收到 SP的请求后, 返回一个认证断言给 SP, 其中包括相应的 AP信息, 例 如某个 AP的地址信息。
312: SP收到该认证断言后, 根据其中的 AP信息, 访问相应的 AP, 请求获取终端用户 的属性信息。
313: 该 AP返回终端用户的属性信息给 SP, 如终端用户的姓名、 性别、 年龄、 地址和电 话等等。
314: SP收到终端用户的属性信息后, 根据该属性信息向终端用户提供业务。
进一步地,本实施例中 SP还可以在网络身份认证请求中携带标识信息,该标识信息用于 要求返回 SP的网络身份认证结果, 相应地, IDP B或 IDP A根据该标识信息对 SP进行网络 身份认证, 并在返回的认证结果中携带对 SP的网络身份身份认证的结果,从而可以防止虚假 的 SP向终端用户提供业务, 给终端用户带来损失。
本实施例适用于 SP归属的 IDP不是终端用户归属的 IDP的应用场景, 当终端用户指定 的 IDP以及 SP归属的 IDP均无法完成终端用户的网络身份认证时,通过 SP对终端用户进行 业务鉴权, 实现了单点登录过程中无缝切换的目的。 与现有技术相比, 避免了切换过程中业 务中断给终端用户带来损失。 通过 IDP对 SP进行网络身份认证, 可以识别虚假的 SP, 避免 用户的身份信息等暴露给用户带来损失, 解决了终端用户与 SP之间的安全漏洞。 本发明实施例还提供了一种实现单点登录过程无缝切换的方法,应用于 web服务,包括: 当 SP没有归属的 IDP时, SP接收终端用户发来的业务鉴权请求; SP对终端用户进行鉴权, 并返回鉴权结果给终端用户。参见图 4, 身份提供商为终端用户指定的 IDP (通常为默认的), 终端用户在身份提供商的信任圈内, SP没有归属的 IDP, 在非信任圈内, 本实施例属于交叉 信任圈与非信任圈切换的应用场景, 该方法具体包括:
401: 终端用户向 SP发起一个业务请求。
402: SP接收到该业务请求后, 发现该 SP没有归属的 IDP, 即不支持 IDP认证, 则向终 端用户返回响应, 要求用户进行鉴权。
进一步地,终端用户可以在 401或 402之前,向 IDP请求 SP访问 DP所需要的引导信息, 如 401', 相应地, IDP收到 SP的请求之后, 向终端用户回复响应, 其中包括 SP访问终端用 户的 DS所需的引导信息, 如 402'。
403: 终端用户收到 SP的响应后, 向 SP发起一个业务鉴权请求, 其中包括终端用户信 息、 密码信息等内容, 进一步地, 还可以包括上述引导信息。
404: SP收到终端用户的业务鉴权请求后, 对终端用户进行业务鉴权, 此时 SP可以直接 返回业务鉴权的结果给终端用户, 也可以先获取终端用户的属性信息, 然后再返回业务鉴权 的结果, 在本实施例中, SP根据上述引导信息, 访问相应的 DS, 请求获取终端用户对应的 AP的信息。
405: DS返回一个认证断言给 SP, 其中包括相应 AP的信息, 如某个 AP的地址信息。 406: SP收到该认证断言后, 根据其中的 AP信息, 访问相应的 AP, 请求获取终端用户 的属性信息。
407: AP收到 SP的请求后, 返回终端用户的属性信息给 SP。
408: SP 收到终端用户的属性信息后, 返回响应给终端用户, 并根据该属性信息向终端 用户提供业务。
本实施例适用于 SP无归属的 IDP的应用场景,当终端用户得到 SP返回的不支持 IDP认 证的结果后, 通过 SP对终端用户进行业务鉴权, 实现了单点登录过程中无缝切换的目的。与 现有技术相比, 避免了切换过程中业务中断给终端用户带来损失。 本发明实施例还提供了一种提高网络身份认证安全性的方法, 应用于 web服务, 包括: IDP接收 SP发来的对终端用户进行网络身份认证的请求; IDP根据该请求中携带的 SP访问 权限信息对终端用户进行网络身份认证, 并返回认证结果给该 SP。 参见图 5, IDP维护一个 SP的访问控制列表, 控制 SP获取终端用户的属性信息, 该方法具体包括:
501: 终端用户向 IDP发起网络身份认证请求, 该请求中携带有终端用户设定的 SP访问 权限信息, 在本实施例中为 SP 的访问控制列表。 例如, 该列表中包括两个信赖的 SP: SP1 和 SP2, 且 SPl可以访问终端用户的姓名、 年龄和地址, SP2可以访问终端用户的姓名和电 话等等, 以及一个不信赖的 SP3, 该 SP3不能向 IDP请求网络身份认证等等。
502: IDP收到该网络身份认证请求后, 对终端用户进行网络身份认证, 并保存终端用户 设定的 SP访问权限信息, 并将认证后的结果返回给终端用户。
501和 502为终端用户单点登录的过程,登录成功后, IDP返回给终端用户的认证结果为 NI信息, 如 NI标识, 终端用户使用该 NI标识可以不用每次请求业务时都向 IDP重新进行网 络身份认证, 只需 SP向 IDP核对验证该 NI标识即可。
503: 终端用户收到 IDP的认证结果后, 向 SP发起一个业务请求, 该请求中包括携带终 端用户的身份认证信息、 终端用户指定的 IDP的标识信息。
504: SP接收到该业务请求后, 根据其中的 IDP标识信息, 向对应的 IDP请求对终端用 户进行网络身份认证。
505: IDP收到 SP发来的网络身份认证请求后,根据已保存的 SP的访问控制列表判断该 SP 身份被允许请求认证, 如果是, 则对终端用户进行网络身份认证, 并将认证结果返回给 SP; 否则, 拒绝该 SP的网络身份认证请求。 在本实施例中, 该 SP为终端用户信赖的 SP, 则返回认证结果给该 SP。
其中, IDP对终端用户进行网络身份认证是指核对 SP发来的终端用户的 I信息, 即终 端用户已登录到 web服务***, 此时只需核对终端用户的网络身份即可, 不用重新对其进行 认证
进一步地, IDP返回的认证结果中还可以包括 SP访问终端用户的 DS所需的引导信息。 506: SP收到 IDP返回的认证结果后, 根据上述引导信息访问相应的 DS, 请求获取终端 用户对应的属性提供商 AP的信息。
507: DS收到该请求后, 返回一个认证断言给 SP, 其中包括相应 AP的信息, 如某个 AP 的地址信息。
508: SP收到该认证断言后, 根据其中的 AP信息, 访问相应的 AP, 请求获取终端用户 的属性信息。
509: AP收到该请求后, 返回终端用户的属性信息给 SP。
510: SP收到 AP返回的终端用户的属性信息后, 返回响应给终端用户, 并根据该属性信 息向终端用户提供业务。
进一步地, 504中 SP还可以在网络身份认证请求中携带标识信息, 该标识信息用于要求 返回 SP的网络身份认证结果,相应地, 505中 IDP根据该标识信息对 SP进行网络身份认证, 并在返回的认证结果中携带对 SP的网络身份身份认证的结果。 从而可以防止虚假的 SP向终 端用户提供业务, 给终端用户带来损失。
为了避免出现重放攻击, 进一步地, IDP还可以预先获取 SP的一次性信息, 如 504中
SP将发起请求的时间作为一次性信息携带在网络身份认证请求中发给 IDP, 相应地, 505中 IDP还可以利用获取的 SP的一次性信息加密对终端用户进行网络身份认证得到的认证结果, 并将加密后的信息返回给 SP; SP收到该加密后的信息后, 进行解码可以得到该认证结果。
进一步地, 506中 SP收到 IDP返回的认证结果后, 还可以删除该认证结果中的终端用户 的信息, 不在本地缓存该信息, 从而可以极大地减轻 SP数据信息的维护, 以及 SP的数据存 储量, 减少了安全漏洞, 并且减少了终端用户信息的存放位置, 免除了终端用户针对 SP的注 册过程。
本实施例通过在 IDP维护 SP访问权限信息,可以控制 SP对终端用户的属性信息的获取, 从而可以给终端用户提供不同的服务。 通过 IDP对 SP进行网络身份认证, 可以识别虚假的 SP,避免用户的身份信息等暴露给用户带来损失,解决了终端用户与 SP之间的安全漏洞。 IDP 通过获取 SP的一次性信息并对认证结果加密,可以避免出现重放攻击,进一步提高了网络身 份认证的安全性。通过删除认证结果中的终端用户的信息, 减轻了 SP数据信息的维护, 以及 SP的数据存储量, 减少了安全漏洞, 并且减少了终端用户信息的存放位置, 免除了终端用户 针对 SP的注册过程。 参见图 6, 本发明实施例提供了一种身份提供商装置, 应用于 web服务, 该装置包括: 认证模块 601, 用于对 SP和终端用户进行网络身份认证;
发送模块 602, 用于将认证模块 601得到的认证结果返回给 SP, 认证结果包括终端用户 的网络身份认证结果和 SP的网络身份认证结果。
进一步地, 参见图 7, 图 6所示的装置还包括:
第一接收模块 603, 用于接收 SP 发来的网络身份认证请求, 网络身份认证请求中包含 SP的身份认证信息和终端用户的身份认证信息;
相应地, 认证模块 601具体用于当第一接收模块 603收到网络身份认证请求后, 根据 SP 的身份认证信息和终端用户的身份认证信息, 对 SP和终端用户进行网络身份认证。
或者, 图 6所示的装置还包括:
第二接收模块,用于接收 SP发来的网络身份认证请求, 网络身份认证请求中包含标识信 息和终端用户的身份认证信息, 标识信息用于要求返回 SP的网络身份认证结果;
相应地, 认证模块 601具体包括:
第一认证单元, 用于对 SP进行网络身份认证;
第二认证单元, 用于当第二接收模块 604收到网络身份认证请求后, 根据终端用户的身 份认证信息, 对终端用户进行网络身份认证。
进一步地, 图 6所示的装置还包括:
核对模块, 用于接收到终端用户发来的核实 SP的网络身份认证结果的请求后, 对 SP的 网络身份认证结果进行核实, 并返回核实的结果给终端用户。
另外, 参见图 7, 图 6所示的装置还包括:
第三接收模块 604, 用于接收 SP发来的网络身份认证请求;
处理模块 605, 用于当第三接收模块收到网络身份认证请求后, 根据该请求中的 SP访问 权限信息判断 SP是否被允许请求认证, 如果是, 则触发认证模块工作; 否则, 拒绝 SP的请 求。
另外, 参见图 7, 图 6所示的装置还包括: 获取模块, 用于获取来自 SP的一次性信息;
相应地, 发送模块 602具体包括:
加密单元, 用于根据获取模块获取的一次性信息对认证模块得到的认证结果进行加密; 发送单元, 用于返回加密单元加密后的信息给 SP。
本实施例通过对终端用户和 SP进行网络身份认证 (双向认证), 提高了网络身份认证的 安全性, 与现有技术相比, 避免了虚假 SP使用户的身份信息等暴露给用户带来损失, 解决了 终端用户与 SP之间的安全漏洞。 通过维护 SP访问权限信息, 可以控制 SP对终端用户的属 性信息的获取,从而可以给终端用户提供不同的服务。通过获取 SP的一次性信息并对认证结 果加密, 可以避免出现重放攻击, 进一步提高了网络身份认证的安全性。 参见图 8, 本发明实施例还提供了一种服务提供商装置, 应用于 web服务, 该装置包括: 接收模块 801, 用于接收终端用户发来的业务请求, 业务请求中包含标识信息和终端用 户的身份认证信息, 标识信息用于要求返回服务提供商的网络身份认证结果;
发送模块 802, 用于向 IDP发起网络身份认证请求, 并在网络身份认证请求中携带标识 信息和终端用户的身份认证信息。
进一步地, 图 8所示的装置中发送模块 802具体包括:
发送单元,用于向 IDP发起网络身份认证请求, 并在网络身份认证请求中携带标识信息、 终端用户的身份认证信息和服务提供商的身份认证信息。
进一步地, 图 8所示的装置中发送模块 802还包括:
一次性信息发送单元, 用于发送服务提供商的一次性信息给 IDP;
相应地, 该装置还包括:
解密模块, 用于当装置收到 IDP发来的根据一次性信息得到的加密信息后, 进行解密。 本实施例通过发送标识信息给 IDP,使 IDP对 SP也进行网络身份认证,提高了网络身份 认证的安全性, 与现有技术相比, 避免了虚假 SP使用户的身份信息等暴露给用户带来损失, 解决了终端用户与 SP之间的安全漏洞。 通过发送 SP的一次性信息给 IDP, 使 IDP根据该信 息对认证结果加密, 可以避免出现重放攻击, 进一步提高了网络身份认证的安全性。 参见图 9, 本发明实施例还提供了一种身份提供商装置, 应用于 web服务, 该身份提供 商为 SP归属的身份提供商, 该装置包括:
接收模块 901, 用于接收终端用户发来的网络身份认证请求; 认证模块 902, 用于在接收模块 901接收到网络身份认证请求后, 对终端用户进行网络 身份认证, 并返回认证结果给终端用户。
本实施例适用于终端用户指定的 IDP无法完成对终端用户进行网络身份认证的场景, 通 过以 SP 归属的身份提供商对终端用户进行网络身份认证, 实现了单点登录过程中的无缝切 换。 参见图 10, 本发明实施例还提供了一种服务提供商装置, 该装置包括:
接收模块 1001, 用于接收终端用户发来的业务请求; 还用于接收终端用户指定的 IDP返 回不支持认证的结果, 结果中指明终端用户指定的 IDP不是 SP归属的 IDP;
发送模块 1002, 用于在接收模块 1001收到业务请求后, 向终端用户指定的 IDP发起网 络身份认证请求, 在接收模块收到结果后, 回复响应给终端用户, 响应中携带 SP归属的 IDP 信息。
进一步地, 参见图 11, 接收模块 1001还用于当 SP归属的 IDP不是终端用户归属的 IDP 时, 接收终端用户发来的业务鉴权请求;
相应地, 上述装置还包括:
业务鉴权模块 1003, 用于在接收模块 1001接收到业务鉴权请求后, 对终端用户进行鉴 权, 并返回鉴权结果给终端用户。
本实施例适用于终端用户指定的 IDP无法完成对终端用户进行网络身份认证的场景, 通 过返回 SP归属的 IDP信息给终端用户,使终端用户可以向 SP归属的 IDP发起网络身份认证, 实现了单点登录过程中的无缝切换。 当 SP归属的 IDP不是终端用户归属的 IDP时, 通过对 终端用户进行业务鉴权, 进一步实现了单点登录过程中的无缝切换。 参见图 12, 本发明实施例还提供了一种服务提供商装置, 应用于 web服务, 该服务提供 商没有归属的 IDP, 该装置包括:
接收模块 1201, 用于接收终端用户发来的业务鉴权请求;
业务鉴权模块 1202, 用于当接收模块 1201收到业务鉴权请求后, 对终端用户进行鉴权, 并返回鉴权结果给终端用户。
进一步地, 参见图 13, 接收模块 1201还用于接收终端用户发来的业务请求;
相应地, 上述装置还包括:
发送模块 1203, 用于当接收模块 1201 收到业务请求后, 向终端用户返回响应, 响应中 指明服务提供商没有归属的 IDP。
本实施例适用于 SP无归属的 IDP的场景, 通过对终端用户进行业务鉴权, 实现了单点 登录过程中的无缝切换。 参见图 14,本发明实施例还提供了一种身份提供商装置,应用于 web服务,该装置包括: 接收模块 1401, 用于接收 SP发来的对终端用户进行网络身份认证的请求;
控制模块 1402, 用于当接收模块 1401 收到请求后, 根据预设的 SP访问权限信息判断 SP是否被允许请求认证, 如果是, 则对终端用户进行网络身份认证, 返回认证结果给 SP; 否则, 拒绝 SP的请求。
进一步地, 参见图 15, 上述装置还包括:
加密处理模块 1403, 用于根据接收模块收到的请求中包含的 SP的一次性信息, 加密控 制模块得到的认证结果, 并返回加密后的信息给 SP。
本实施例通过维护 SP访问权限信息, 可以控制 SP对终端用户的属性信息的获取, 从而 可以给终端用户提供不同的服务。通过获取 SP的一次性信息并对认证结果加密,可以避免出 现重放攻击, 进一步提高了网络身份认证的安全性。 参见图 16, 本发明实施例还提供了一种提高网络身份认证安全性的***, 应用于 web服 务, 包括 SP装置 1601和 IDP装置 1602;
SP装置 1601,用于接收终端用户发来的业务请求,该业务请求中包含标识信息和终端用 户的身份认证信息, 向 IDP装置 1602发起网络身份认证请求, 并在该网络身份认证请求中携 带上述标识信息和终端用户的身份认证信息,该标识信息用于要求返回 SP的网络身份认证结 果;
IDP装置 1602, 用于对 SP进行网络身份认证, 当接收到 SP装置 1601发来的包含标识 信息和终端用户的身份认证信息的网络身份认证请求后, 对终端用户进行网络身份认证, 将 得到的终端用户的网络身份认证结果和 SP的网络身份认证结果返回给 SP装置 1601。 参见图 17, 本发明实施例还提供了一种实现单点登录过程无缝切换的***, 应用于 web 服务,包括 SP装置 1701、终端用户指定的第一 IDP装置 1702和 SP归属的第二 IDP装置 1703 ;
SP装置 1701,用于接收终端用户发来的业务请求,向终端用户指定的第一 IDP装置 1702 发起网络身份认证请求,接收第一 IDP装置 1702返回不支持认证的结果, 回复响应给终端用 户, 响应中携带 SP归属的 IDP信息;
第一 IDP装置 1702, 用于接收 SP装置 1701发来的网络身份认证请求, 返回不支持认证 的结果给 SP装置 1701, 该结果中指明终端用户指定的 IDP不是 SP归属的 IDP;
第二 IDP装置 1703, 用于接收终端用户发来的网络身份认证请求, 对终端用户进行网络 身份认证, 返回认证结果给终端用户。 参见图 18, 本发明实施例还提供了一种提高网络身份认证安全性的***, 应用于 web服 务, 包括 SP装置 1801和 IDP装置 1802;
SP装置 1801, 用于发送对终端用户进行网络身份认证的请求给 IDP装置, 该请求中包 括 SP的访问权限信息;
IDP装置 1802, 用于接收 SP装置 1801发来的对终端用户进行网络身份认证的请求, 根 据访问权限信息对终端用户进行网络身份认证, 并返回认证结果给 SP装置 1801。 本领域普通技术人员可以理解, 实现上述实施例方法携带的全部或部分步骤是可以通过 程序来指令相关的硬件完成, 所述的程序可以存储于一种计算机可读存储介质中, 该程序在 执行时, 包括方法实施例的步骤之一或其组合。
另外, 在本发明各个实施例中的各功能单元可以集成在一个处理模块中, 也可以是各个 单元单独物理存在, 也可以两个或两个以上单元集成在一个模块中。 上述集成的模块既可以 采用硬件的形式实现, 也可以采用软件功能模块的形式实现。 所述集成的模块如果以软件功 能模块的形式实现并作为独立的产品销售或使用时, 也可以存储在一个计算机可读取存储介 质中。
上述提到的存储介质可以是只读存储器, 磁盘或光盘等。
以上所述仅为本发明的较佳实施例, 并不用以限制本发明, 凡在本发明的精神和原则之 内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1 . 一种提高网络身份认证安全性的方法, 其特征在于, 应用于 web 服务, 所述方法包 括:
对服务提供商 SP和终端用户进行网络身份认证;
将认证结果返回给所述 SP, 所述认证结果包括所述 SP的网络身份认证结果和所述终端 用户的网络身份认证结果。
2. 根据权利要求 1所述的提高网络身份认证安全性的方法, 其特征在于, 所述对服务提 供商 SP和终端用户进行网络身份认证之前, 还包括:
所述终端用户向所述 SP发起业务请求,所述业务请求中携带标识信息和所述终端用户的 身份认证信息, 所述标识信息用于要求返回 SP的网络身份认证结果。
3. 根据权利要求 2所述的提高网络身份认证安全性的方法, 其特征在于, 所述方法还包 括:
所述 SP收到所述业务请求后,发起网络身份认证请求, 并在所述网络身份认证请求中携 带所述标识信息、 所述终端用户的身份认证信息和所述 SP的身份认证信息;
相应地, 所述对服务提供商 SP和终端用户进行网络身份认证, 具体包括:
接收所述网络身份认证请求,
根据所述 SP的身份认证信息对所述 SP进行网络身份认证,
根据所述终端用户的身份认证信息, 对终端用户进行网络身份认证。
4. 根据权利要求 2所述的提高网络身份认证安全性的方法, 其特征在于, 所述方法还包 括:
接收所述终端用户发来的核实所述 SP的网络身份认证结果的请求,所述请求中包含所述 终端用户从所述 SP返回的响应中提取的所述 SP的网络身份认证结果;
对所述 SP的网络身份认证结果进行核实后, 返回核实的结果给所述终端用户。
5. 一种实现单点登录过程无缝切换的方法, 其特征在于, 应用于 web 服务, 所述方法 包括: 当服务提供商 SP向终端用户指定的身份提供商 IDP请求网络身份认证并且得到所述 IDP 不支持所述认证的结果后, 所述 SP归属的 IDP接收所述终端用户发来的网络身份认证请求; 所述 SP归属的 IDP对所述终端用户进行网络身份认证后, 返回认证结果给所述终端用 户。
6. 根据权利要求 5所述的实现单点登录过程无缝切换的方法, 其特征在于, 所述方法还 包括:
所述终端用户指定的 IDP接收所述 SP发来的网络身份认证请求, 对所述终端用户进行 网络身份认证, 并返回不支持所述认证的结果给所述 SP, 所述结果中指明所述终端用户指定 的 IDP不是所述 SP归属的 IDP;
所述 SP收到所述结果后,回复响应给所述终端用户,所述响应中携带所述 SP归属的 IDP 信息。
7. 根据权利要求 6所述的实现单点登录过程无缝切换的方法, 其特征在于, 所述方法还 包括:
所述网络身份认证请求中携带要求返回所述 SP的网络身份认证结果的标识信息; 所述终端用户指定的 IDP根据所述标识信息对所述 SP进行网络身份认证, 并在所述结 果中携带所述 SP的网络身份认证结果。
8. 根据权利要求 5所述的实现单点登录过程无缝切换的方法, 其特征在于, 所述方法还 包括:
当所述 SP归属的 IDP不是所述终端用户归属的 IDP时,所述终端用户接收所述 SP返回 的认证失败的结果;
所述终端用户向所述 SP发起业务鉴权请求;
所述 SP接收到所述业务鉴权请求后,对所述终端用户进行鉴权, 并返回鉴权结果给所述 终端用户。
9. 根据权利要求 8所述的实现单点登录过程无缝切换的方法, 其特征在于, 所述方法还 包括:
所述终端用户向自身归属的 IDP获取引导信息; 相应地, 所述终端用户还在所述业务鉴权请求中携带所述引导信息。
10. 一种提高网络身份认证安全性的方法, 其特征在于, 应用于 web服务, 所述方法包 括:
接收服务提供商 SP发来的对终端用户进行网络身份认证的请求,所述请求中包括服务提 供商的访问权限信息;
根据所述访问权限信息, 对所述终端用户进行网络身份认证, 返回认证结果。
11 . 根据权利要求 10所述的提高网络身份认证安全性的方法, 其特征在于, 所述方法还 包括:
所述请求中携带要求返回所述 SP的网络身份认证结果的标识信息;
根据所述标识信息对所述 SP进行网络身份认证, 并在所述认证结果中携带所述 SP的网 络身份认证结果。
12. 根据权利要求 10所述的提高网络身份认证安全性的方法, 其特征在于, 所述认证结 果包括引导信息, 所述引导信息包括所述 SP的访问权限信息, 所述方法还包括:
所述 SP根据所述引导信息访问相应的发现服务 DS;
所述 DS根据所述 SP的访问权限信息提供相应的 AP的信息给所述 SP。
13. 一种身份提供商装置, 其特征在于, 应用于 web服务, 所述装置包括:
认证模块, 用于对服务提供商 SP和终端用户进行网络身份认证;
发送模块, 用于将所述认证模块得到的认证结果返回给所述 SP, 所述认证结果包括所述 终端用户的网络身份认证结果和所述 SP的网络身份认证结果。
14. 根据权利要求 13所述的身份提供商装置, 其特征在于, 所述装置还包括: 第一接收模块,用于接收所述 SP发来的网络身份认证请求,所述网络身份认证请求中包 含所述 SP的身份认证信息和所述终端用户的身份认证信息;
相应地, 所述认证模块具体用于当所述第一接收模块收到所述网络身份认证请求后, 根 据所述 SP的身份认证信息和所述终端用户的身份认证信息, 对所述 SP和终端用户进行网络 身份认证。
15. 根据权利要求 13所述的身份提供商装置, 其特征在于, 所述装置还包括: 第二接收模块,用于接收所述 SP发来的网络身份认证请求,所述网络身份认证请求中包 含标识信息和所述终端用户的身份认证信息,所述标识信息用于要求返回 SP的网络身份认证 结果;
相应地, 所述认证模块具体包括:
第一认证单元, 用于对所述 SP进行网络身份认证;
第二认证单元, 用于当所述第二接收模块收到所述网络身份认证请求后, 根据所述终端 用户的身份认证信息, 对所述终端用户进行网络身份认证。
16. 根据权利要求 13所述的身份提供商装置, 其特征在于, 所述装置还包括: 核对模块, 用于接收到所述终端用户发来的核实所述 SP的网络身份认证结果的请求后, 对所述 SP的网络身份认证结果进行核实, 并返回核实的结果给所述终端用户。
17. 一种服务提供商装置, 其特征在于, 应用于 web服务, 所述装置包括:
接收模块, 用于接收终端用户发来的业务请求, 所述业务请求中包含标识信息和所述终 端用户的身份认证信息, 所述标识信息用于要求返回所述服务提供商的网络身份认证结果; 发送模块, 用于向身份提供商 IDP发起网络身份认证请求, 并在所述网络身份认证请求 中携带所述标识信息和所述终端用户的身份认证信息。
18. 根据权利要求 17所述的服务提供商装置, 其特征在于, 所述发送模块具体包括: 发送单元, 用于向 IDP发起网络身份认证请求, 并在所述网络身份认证请求中携带所述 标识信息、 所述终端用户的身份认证信息和所述服务提供商的身份认证信息。
19. 一种身份提供商装置, 其特征在于, 应用于 web服务, 所述身份提供商为服务提供 商 SP归属的身份提供商, 所述装置包括:
接收模块, 用于接收终端用户发来的网络身份认证请求;
认证模块, 用于在所述接收模块接收到所述网络身份认证请求后, 对所述终端用户进行 网络身份认证, 并返回认证结果给所述终端用户。
20. 一种服务提供商装置, 其特征在于, 应用于 web服务, 所述装置包括: 接收模块, 用于接收终端用户发来的业务请求; 还用于接收所述终端用户指定的身份提 供商 IDP返回不支持所述认证的结果,所述结果中指明所述终端用户指定的 IDP不是所述 SP 归属的 IDP;
发送模块, 用于在所述接收模块收到所述业务请求后, 向所述终端用户指定的 IDP发起 网络身份认证请求, 在所述接收模块收到所述结果后, 回复响应给所述终端用户, 所述响应 中携带所述 SP归属的 IDP信息。
21. 根据权利要求 20所述的服务提供商装置, 其特征在于, 所述接收模块还用于当所述 SP归属的 IDP不是所述终端用户归属的 IDP时, 接收所述终端用户发来的业务鉴权请求; 所述装置还包括:
业务鉴权模块, 用于在所述接收模块接收到所述业务鉴权请求后, 对所述终端用户进行 鉴权, 并返回鉴权结果给所述终端用户。
22. 一种身份提供商装置, 其特征在于, 应用于 web服务, 所述装置包括:
接收模块,用于接收服务提供商 SP发来的对终端用户进行网络身份认证的请求,所述请 求中包括服务提供商的访问权限信息;
控制模块, 用于当所述接收模块收到所述请求后, 根据所述访问权限信息对所述终端用 户进行网络身份认证, 并返回认证结果给所述 SP。
23. 一种提高网络身份认证安全性的***, 其特征在于, 应用于 web服务, 所述***包 括服务提供商 SP装置和身份提供商 IDP装置;
所述 SP装置,用于接收终端用户发来的业务请求,所述业务请求中包含标识信息和所述 终端用户的身份认证信息, 向所述 IDP装置发起网络身份认证请求, 并在所述网络身份认证 请求中携带所述标识信息和所述终端用户的身份认证信息, 所述标识信息用于要求返回所述 服务提供商的网络身份认证结果;
所述 IDP装置, 用于对所述服务提供商进行网络身份认证, 当接收到所述 SP装置发来 的包含标识信息和所述终端用户的身份认证信息的网络身份认证请求后, 对所述终端用户进 行网络身份认证, 将得到的所述终端用户的网络身份认证结果和所述服务提供商的网络身份 认证结果返回给所述 SP装置。
24. 一种实现单点登录过程无缝切换的***, 其特征在于, 应用于 web服务, 所述*** 包括服务提供商 SP装置、 终端用户指定的第一身份提供商 IDP装置和所述服务提供商归属 的第二 IDP装置;
所述 SP装置,用于接收终端用户发来的业务请求, 向所述终端用户指定的身份提供商发 起网络身份认证请求, 接收所述终端用户指定的身份提供商返回不支持所述认证的结果, 回 复响应给所述终端用户, 所述响应中携带所述服务提供商归属的身份提供商信息;
所述第一 IDP装置, 用于接收所述 SP装置发来的网络身份认证请求, 返回不支持所述 认证的结果给所述 SP装置,所述结果中指明所述终端用户指定的身份提供商不是所述服务提 供商归属的身份提供商;
所述第二 IDP装置, 用于接收所述终端用户发来的网络身份认证请求, 对所述终端用户 进行网络身份认证, 返回认证结果给所述终端用户。
25. 一种提高网络身份认证安全性的***, 其特征在于, 应用于 web服务, 所述***包 括服务提供商 SP装置和身份提供商 IDP装置;
所述 SP装置, 用于发送对终端用户进行网络身份认证的请求给所述 IDP装置, 所述请 求中包括服务提供商的访问权限信息;
所述 IDP装置, 用于接收所述 SP装置发来的对终端用户进行网络身份认证的请求, 根 据所述访问权限信息对所述终端用户进行网络身份认证, 并返回认证结果给所述 SP装置。
PCT/CN2009/071463 2008-04-26 2009-04-24 提高网络身份认证安全性的方法和装置 WO2009129753A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810094877.6 2008-04-26
CN2008100948776A CN101567878B (zh) 2008-04-26 2008-04-26 提高网络身份认证安全性的方法

Publications (1)

Publication Number Publication Date
WO2009129753A1 true WO2009129753A1 (zh) 2009-10-29

Family

ID=41216446

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/071463 WO2009129753A1 (zh) 2008-04-26 2009-04-24 提高网络身份认证安全性的方法和装置

Country Status (2)

Country Link
CN (2) CN101567878B (zh)
WO (1) WO2009129753A1 (zh)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215107B (zh) * 2010-04-12 2015-09-16 中兴通讯股份有限公司 一种实现身份管理互操作的方法及***
CN102238148B (zh) * 2010-04-22 2015-10-21 中兴通讯股份有限公司 身份管理方法及***
CN101867589B (zh) * 2010-07-21 2012-11-28 深圳大学 一种网络身份认证服务器及其认证方法与***
US9536074B2 (en) 2011-02-28 2017-01-03 Nokia Technologies Oy Method and apparatus for providing single sign-on for computation closures
CN102413198A (zh) * 2011-09-30 2012-04-11 山东中创软件工程股份有限公司 一种基于安全标记的访问控制方法和相关***
CN103078834A (zh) * 2011-10-26 2013-05-01 中兴通讯股份有限公司 一种安全连接的方法、***及网元
CN109040032B (zh) 2013-11-15 2021-02-23 华为终端有限公司 一种网络访问控制方法及装置
CN107710673B (zh) 2015-09-28 2020-04-10 Oppo广东移动通信有限公司 用户身份认证的方法及设备
EP3510514A4 (en) * 2016-10-18 2020-01-22 Hewlett-Packard Development Company, L.P. GENERATION OF AUTHENTICATION ASSERTIONS INCLUDING AN INSURANCE SCORE
CN109088890A (zh) * 2018-10-18 2018-12-25 国网电子商务有限公司 一种身份认证方法、相关装置及***
CN110134859B (zh) * 2019-04-02 2021-05-07 中国科学院数据与通信保护研究教育中心 一种个人信息管理方法及***
CN111177686B (zh) * 2019-12-31 2022-07-29 华为云计算技术有限公司 一种身份认证方法、装置及相关设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116637A1 (en) * 2000-12-21 2002-08-22 General Electric Company Gateway for securely connecting arbitrary devices and service providers
US20040030887A1 (en) * 2002-08-07 2004-02-12 Harrisville-Wolff Carol L. System and method for providing secure communications between clients and service providers
CN1554053A (zh) * 2002-05-20 2004-12-08 ������������ʽ���� 服务提供***和服务提供方法
CN1816822A (zh) * 2003-08-11 2006-08-09 索尼株式会社 验证方法、验证***和验证服务器

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8214887B2 (en) * 2005-03-20 2012-07-03 Actividentity (Australia) Pty Ltd. Method and system for providing user access to a secure application
CN101051896B (zh) * 2006-04-07 2011-01-05 华为技术有限公司 一种认证方法和***

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116637A1 (en) * 2000-12-21 2002-08-22 General Electric Company Gateway for securely connecting arbitrary devices and service providers
CN1554053A (zh) * 2002-05-20 2004-12-08 ������������ʽ���� 服务提供***和服务提供方法
US20040030887A1 (en) * 2002-08-07 2004-02-12 Harrisville-Wolff Carol L. System and method for providing secure communications between clients and service providers
CN1816822A (zh) * 2003-08-11 2006-08-09 索尼株式会社 验证方法、验证***和验证服务器

Also Published As

Publication number Publication date
CN101567878A (zh) 2009-10-28
CN102739664A (zh) 2012-10-17
CN101567878B (zh) 2012-07-25
CN102739664B (zh) 2016-03-30

Similar Documents

Publication Publication Date Title
US10397239B2 (en) Secure access to cloud-based services
WO2009129753A1 (zh) 提高网络身份认证安全性的方法和装置
US9356928B2 (en) Mechanisms to use network session identifiers for software-as-a-service authentication
JP6643373B2 (ja) 情報処理システムと、その制御方法とプログラム
EP3462701B1 (en) Device, control method of the same, and program
US9038138B2 (en) Device token protocol for authorization and persistent authentication shared across applications
JP4742903B2 (ja) 分散認証システム及び分散認証方法
CN112822675B (zh) 面向MEC环境的基于OAuth2.0的单点登录机制
EP3308499B1 (en) Service provider certificate management
KR20160127167A (ko) 다중 팩터 인증 기관
EP2957064B1 (en) Method of privacy-preserving proof of reliability between three communicating parties
KR20090017962A (ko) 통신 수행 방법 및 그 장치와, 통신 수행 제어 방법 및 그장치
WO2006058493A1 (fr) Procede et systeme d'authentification de domaine et d'autorite de reseau
US20130091355A1 (en) Techniques to Prevent Mapping of Internal Services in a Federated Environment
JP2024501326A (ja) アクセス制御方法、装置、ネットワーク側機器、端末及びブロックチェーンノード
WO2011063658A1 (zh) 统一安全认证的方法和***
JP7043480B2 (ja) 情報処理システムと、その制御方法とプログラム
JP2017139026A (ja) 信頼できる認証およびログオンのための方法および装置
CN113660284B (zh) 一种基于票据的分布式认证方法
WO2012028168A1 (en) Identity gateway
CN116366274A (zh) 处理访问控制的装置、方法及***
Liberty SAML Implementation Guidelines

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09734302

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09734302

Country of ref document: EP

Kind code of ref document: A1