CN116684113A - Service processing method and related device based on SDP (software defined boundary) - Google Patents
Service processing method and related device based on SDP (software defined boundary) Download PDFInfo
- Publication number
- CN116684113A CN116684113A CN202210170117.9A CN202210170117A CN116684113A CN 116684113 A CN116684113 A CN 116684113A CN 202210170117 A CN202210170117 A CN 202210170117A CN 116684113 A CN116684113 A CN 116684113A
- Authority
- CN
- China
- Prior art keywords
- sdp
- service access
- user equipment
- user
- control system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本申请公开了一种基于软件定义边界SDP的业务处理方法及相关装置。在该方法中,当用户设备在某一个区域中的SDP控制系统上通过SPA认证和身份认证后,该区域的SDP控制系统则将用户设备对应的用户令牌发送给其他区域的SDP控制系统。其他区域的SDP控制系统通过解析用户令牌获取用户设备的设备标识以及所属的用户组,进而基于用户组确定用户设备的业务访问权限,并向其他区域的SDP网关下发相应的业务访问列表,从而保证用户设备能够通过不同区域的SDP网关访问业务资源。基于本方法,用户设备在跨区域访问业务资源时,无需进行多次SPA认证,简化了用户设备访问业务资源的流程,提高了用户设备访问业务资源的效率。
The present application discloses a service processing method and a related device based on a software-defined boundary (SDP). In this method, after the user equipment passes SPA authentication and identity authentication on the SDP control system in a certain area, the SDP control system in this area sends the user token corresponding to the user equipment to the SDP control systems in other areas. The SDP control system in other areas obtains the device identification of the user equipment and the user group to which it belongs by analyzing the user token, and then determines the service access rights of the user equipment based on the user group, and sends the corresponding service access list to the SDP gateway in other areas. This ensures that the user equipment can access service resources through SDP gateways in different regions. Based on the method, the user equipment does not need to perform multiple SPA authentications when accessing service resources across regions, which simplifies the process of user equipment accessing service resources and improves the efficiency of user equipment accessing service resources.
Description
技术领域technical field
本申请涉及网络技术领域,尤其涉及一种基于SDP的业务处理方法及相关装置。The present application relates to the field of network technologies, and in particular to an SDP-based service processing method and related devices.
背景技术Background technique
软件定义边界(Software Defined Perimeter,SDP)是由云安全联盟开发的一种安全框架,能够根据终端的身份来控制对资源的访问。在SDP架构下,每个终端设备在连接服务器前必须进行单包授权(Single Packet Authorization,SPA)认证,确保每个终端设备都是被允许接入的。SDP的核心思想是通过SDP架构隐藏核心网络资产与设施,使网络资产与设施不直接暴露在互联网下,从而免受外来安全威胁。Software Defined Perimeter (SDP) is a security framework developed by the Cloud Security Alliance, which can control access to resources according to the identity of the terminal. Under the SDP architecture, each terminal device must perform Single Packet Authorization (SPA) authentication before connecting to the server to ensure that each terminal device is allowed to access. The core idea of SDP is to hide core network assets and facilities through the SDP architecture, so that network assets and facilities are not directly exposed to the Internet, thereby avoiding external security threats.
通常来说,SDP系统包括SDP控制器和SDP网关。SDP控制器只有在接收到了部署于终端设备上的SDP客户端发送的SPA数据包并验证到SPA数据包合法之后,才通知SDP网关对该终端设备开放指定的业务访问端口。Generally speaking, an SDP system includes an SDP controller and an SDP gateway. The SDP controller notifies the SDP gateway to open the specified service access port to the terminal device only after receiving the SPA data packet sent by the SDP client deployed on the terminal device and verifying that the SPA data packet is legal.
目前,SDP系统的部署具有地域性,不同的区域通常会部署有不同的SDP系统。当终端设备在某个SDP系统通过SPA认证后,如果终端设备要访问另一个SDP系统所保护的业务资源,终端设备往往需要重新在另一个SDP系统中进行SPA认证,导致终端设备访问业务资源的过程繁琐且效率较低。At present, the deployment of the SDP system is regional, and different SDP systems are usually deployed in different regions. After a terminal device passes SPA authentication in a certain SDP system, if the terminal device wants to access service resources protected by another SDP system, the terminal device often needs to perform SPA authentication in another SDP system again, resulting in the failure of the terminal device to access service resources. The process is cumbersome and inefficient.
发明内容Contents of the invention
本申请提供了一种基于SDP的业务处理方法,能够使得用户设备在跨区域访问业务资源时无需进行多次SPA认证,简化了用户设备访问业务资源的流程,提高用户设备访问业务资源的效率。The present application provides a service processing method based on SDP, which can make user equipment not need to perform multiple SPA authentications when accessing service resources across regions, simplify the process of user equipment accessing service resources, and improve the efficiency of user equipment accessing service resources.
本申请第一方面提供一种基于SDP的业务处理方法,该方法应用于包括第一SDP系统和第二SDP系统的网络系统,第一SDP系统包括第一控制系统和第一SDP网关,第二SDP系统包括第二控制系统和第二SDP网关,第一SDP系统和第二SDP系统部署于不同的区域。该方法包括:第二控制系统接收第一控制系统发送的用户令牌,其中用户令牌是第一控制系统在用户设备通过第一控制系统上的SPA认证以及身份认证后发送的,且用户令牌是第一控制系统基于用户设备的设备标识和用户设备所属的用户组生成的。The first aspect of the present application provides an SDP-based business processing method, the method is applied to a network system including a first SDP system and a second SDP system, the first SDP system includes a first control system and a first SDP gateway, and the second The SDP system includes a second control system and a second SDP gateway, and the first SDP system and the second SDP system are deployed in different areas. The method includes: the second control system receives the user token sent by the first control system, wherein the user token is sent by the first control system after the user equipment passes the SPA authentication and identity authentication on the first control system, and the user token The card is generated by the first control system based on the device identifier of the user equipment and the user group to which the user equipment belongs.
然后,第二控制系统解析用户令牌,从而得到设备标识和用户组。Then, the second control system parses the user token to obtain the device identification and user group.
第二控制系统根据用户组对应的业务访问权限向第二SDP网关提供业务访问列表,以使得第二SDP网关根据业务访问列表对来自于用户设备的业务访问请求进行处理,其中业务访问列表用于指示用户设备能够访问的业务。The second control system provides a service access list to the second SDP gateway according to the service access authority corresponding to the user group, so that the second SDP gateway processes the service access request from the user equipment according to the service access list, wherein the service access list is used for Indicates the services that the user equipment can access.
本方案中,当用户设备在某一个区域中的SDP控制系统上通过SPA认证和身份认证后,该区域的SDP控制系统则将用户设备对应的用户令牌发送给其他区域的SDP控制系统。其他区域的SDP控制系统通过解析用户令牌获取用户设备的设备标识以及所属的用户组,进而基于用户组确定用户设备的业务访问权限,并向其他区域的SDP网关下发相应的业务访问列表,从而保证用户设备能够通过不同区域的SDP网关访问业务资源。基于本申请方案,用户设备在跨区域访问业务资源时,无需进行多次SPA认证,简化了用户设备访问业务资源的流程,提高了用户设备访问业务资源的效率。In this solution, after the user equipment passes SPA authentication and identity authentication on the SDP control system in a certain area, the SDP control system in this area sends the user token corresponding to the user equipment to the SDP control systems in other areas. The SDP control system in other areas obtains the device identification of the user equipment and the user group to which it belongs by analyzing the user token, and then determines the service access rights of the user equipment based on the user group, and sends the corresponding service access list to the SDP gateway in other areas. This ensures that the user equipment can access service resources through SDP gateways in different regions. Based on the solution of this application, when the user equipment accesses service resources across regions, multiple SPA authentications are not required, which simplifies the process of user equipment accessing service resources, and improves the efficiency of user equipment accessing service resources.
可选的,该方法还包括:第二控制系统接收第一控制系统发送的更新后的安全评分,其中更新后的安全评分是第一控制系统检测到与用户设备相关的安全评分发生更新后发送的。其中,更新后的安全评分用于指示用户设备当前的安全情况。更新后的安全评分越高,代表用户设备当前越安全;更新后的安全评分越低,则代表用户设备当前越不安全。Optionally, the method further includes: the second control system receiving the updated security score sent by the first control system, wherein the updated security score is sent after the first control system detects that the security score related to the user equipment is updated of. Wherein, the updated security score is used to indicate the current security situation of the user equipment. The higher the updated security score, the more secure the user device is; the lower the updated security score, the less secure the user device is.
第二控制系统根据更新后的安全评分确定用户设备对应的新的业务访问权限,并向第二SDP网关发送权限变更消息,权限变更消息用于指示第二SDP网关更改业务访问列表。The second control system determines the new service access authority corresponding to the user equipment according to the updated security score, and sends a authority change message to the second SDP gateway, where the authority change message is used to instruct the second SDP gateway to change the service access list.
本方案中,基于更新后的安全评分来指示用户设备当前的安全情况,使得第二控制系统能够根据用户设备当前的安全情况来调整用户设备当前的业务访问权限,从而保证安全性较低的用户设备无法访问部分私密性较高的业务。In this solution, the current security situation of the user equipment is indicated based on the updated security score, so that the second control system can adjust the current service access authority of the user equipment according to the current security situation of the user equipment, thereby ensuring that users with lower security The device cannot access some services with high privacy.
可选的,更新后的安全评分是基于用户设备的安全信息和/或用户设备发送的流量确定的。Optionally, the updated security score is determined based on security information of the user equipment and/or traffic sent by the user equipment.
可选的,用户设备发送的业务访问请求包括设备标识、用户令牌以及用户设备请求访问的目标业务。Optionally, the service access request sent by the user equipment includes a device identifier, a user token, and a target service that the user equipment requests to access.
第二控制系统接收第二SDP网关发送的鉴权请求,鉴权请求是第二SDP网关根据业务访问列表对用户设备的业务访问请求验证通过后发送的,该鉴权请求包括用户令牌以及目标业务。然后,第二控制系统向第二SDP网关返回鉴权请求对应的鉴权结果,以使得第二SDP网关基于鉴权结果接受或拒绝业务访问请求。The second control system receives the authentication request sent by the second SDP gateway. The authentication request is sent by the second SDP gateway after verifying the service access request of the user equipment according to the service access list. The authentication request includes the user token and the target business. Then, the second control system returns an authentication result corresponding to the authentication request to the second SDP gateway, so that the second SDP gateway accepts or rejects the service access request based on the authentication result.
本方案中,基于第二SDP网关以及第二控制系统的双重验证,能够有效地保证用户设备合法访问目标业务,提高业务的访问安全性。In this solution, based on the double authentication of the second SDP gateway and the second control system, it can effectively ensure that the user equipment legally accesses the target service, and improves service access security.
可选的,第一控制系统包括第一SDP控制器和第一认证系统,第二控制系统包括第二SDP控制器和第二认证系统。第二控制系统接收第一控制系统发送的用户令牌,具体包括:第二认证系统接收第一认证系统发送的用户令牌。Optionally, the first control system includes a first SDP controller and a first authentication system, and the second control system includes a second SDP controller and a second authentication system. The second control system receiving the user token sent by the first control system specifically includes: the second authentication system receiving the user token sent by the first authentication system.
第二控制系统根据用户组对应的业务访问权限向第二SDP网关提供业务访问列表,具体包括:第二SDP控制器接收第一SDP控制器发送的设备标识;第二SDP控制器向第二认证系统发送第一消息,第一消息中包括设备标识,第一消息用于请求用户设备的业务访问权限;第二认证系统根据第一消息和用户组对应的业务访问权限向第二SDP控制器发送业务访问列表;第二SDP控制器向第二SDP网关发送业务访问列表。The second control system provides a service access list to the second SDP gateway according to the service access authority corresponding to the user group, which specifically includes: the second SDP controller receives the device identification sent by the first SDP controller; The system sends a first message, the first message includes a device identifier, and the first message is used to request the service access authority of the user equipment; the second authentication system sends the second SDP controller according to the first message and the service access authority corresponding to the user group A service access list; the second SDP controller sends the service access list to the second SDP gateway.
可选的,第一控制系统包括第一SDP控制器和第一认证系统,第二控制系统包括第二SDP控制器和第二认证系统,用户令牌是基于用户设备的设备标识、用户设备所属的用户组和用户设备对应的用户标识生成的。第二控制系统接收第一控制系统发送的用户令牌,具体包括:第二认证系统接收第一认证系统发送的用户令牌。Optionally, the first control system includes a first SDP controller and a first authentication system, the second control system includes a second SDP controller and a second authentication system, and the user token is based on the device identifier of the user equipment, the generated by the user group and the user ID corresponding to the user device. The second control system receiving the user token sent by the first control system specifically includes: the second authentication system receiving the user token sent by the first authentication system.
第二控制系统根据用户组对应的业务访问权限向第二SDP网关提供业务访问列表,具体包括:第二SDP控制器接收第一SDP控制器发送的设备标识和用户标识;第二SDP控制器向第二认证系统发送第一消息,第一消息中包括设备标识和用户标识,第一消息用于请求用户设备的业务访问权限;第二认证系统根据第一消息和用户组对应的业务访问权限向第二SDP控制器发送业务访问列表;第二SDP控制器向第二SDP网关发送业务访问列表。The second control system provides a service access list to the second SDP gateway according to the service access authority corresponding to the user group, which specifically includes: the second SDP controller receives the device identification and the user identification sent by the first SDP controller; The second authentication system sends the first message, the first message includes the device identifier and the user identifier, and the first message is used to request the service access authority of the user equipment; the second authentication system sends the service access authority corresponding to the first message and the user group to The second SDP controller sends the service access list; the second SDP controller sends the service access list to the second SDP gateway.
可选的,第一控制系统包括第一SDP控制器、第一认证系统和第一环境感知系统,第二控制系统包括第二SDP控制器、第二认证系统和第二环境感知系统。Optionally, the first control system includes a first SDP controller, a first authentication system, and a first environment awareness system, and the second control system includes a second SDP controller, a second authentication system, and a second environment awareness system.
第二控制系统接收第一控制系统发送的更新后的安全评分,具体包括:第二环境感知系统接收第一环境感知系统发送的更新后的安全评分,更新后的安全评分是第一环境感知系统检测到与用户设备相关的安全评分发生更新后发送的;第二控制系统根据更新后的安全评分确定用户设备对应的新的业务访问权限,并向第二SDP网关发送权限变更消息,包括:第二环境感知系统向第二认证系统发送更新后的安全评分;第二认证系统根据更新后的安全评分确定用户设备对应的新的业务访问权限,并向第二SDP控制器发送权限变更消息;第二SDP控制器向第二SDP网关发送权限变更消息,权限变更消息用于指示第二SDP网关更改业务访问列表。The second control system receives the updated safety score sent by the first control system, which specifically includes: the second environment awareness system receives the updated safety score sent by the first environment awareness system, and the updated safety score is the first environment awareness system It is sent after detecting that the security score related to the user equipment is updated; the second control system determines the new service access authority corresponding to the user equipment according to the updated security score, and sends a permission change message to the second SDP gateway, including: The second environment awareness system sends the updated security score to the second authentication system; the second authentication system determines the new service access authority corresponding to the user equipment according to the updated security score, and sends an authority change message to the second SDP controller; The second SDP controller sends a permission change message to the second SDP gateway, where the permission change message is used to instruct the second SDP gateway to change the service access list.
可选的,更新后的安全评分是第一环境感知系统根据第一SDP控制器发送的设备评分和/或用户设备发送的流量确定的,设备评分是第一SDP控制器根据用户设备的安全信息确定的。Optionally, the updated security score is determined by the first environment awareness system according to the device score sent by the first SDP controller and/or the traffic sent by the user equipment, and the device score is determined by the first SDP controller according to the security information of the user equipment definite.
可选的,第一SDP网关和第二SDP网关分别负责接入不同的业务服务。Optionally, the first SDP gateway and the second SDP gateway are respectively responsible for accessing different business services.
本申请第二方面提供一种基于SDP的业务处理方法,该方法应用于SDP系统,SDP系统包括控制系统、第一SDP网关和第二SDP网关,第一SDP网关和第二SDP网关部署于不同的区域。该方法包括:在用户设备通过控制系统上的SPA认证以及身份认证后,控制系统确定用户设备的业务访问权限;控制系统根据业务访问权限生成第一业务访问列表The second aspect of the present application provides an SDP-based service processing method, which is applied to an SDP system. The SDP system includes a control system, a first SDP gateway, and a second SDP gateway. The first SDP gateway and the second SDP gateway are deployed in different Area. The method includes: after the user equipment passes the SPA authentication and identity authentication on the control system, the control system determines the service access authority of the user equipment; the control system generates a first service access list according to the service access authority
和第二业务访问列表,第一业务访问列表用于指示用户设备通过第一SDP网关能够访问的and the second service access list, the first service access list is used to indicate the user equipment can access through the first SDP gateway
业务,第二业务访问列表用于指示用户设备通过第二SDP网关能够访问的业务;控制系统Service, the second service access list is used to indicate the service that the user equipment can access through the second SDP gateway; the control system
向第一SDP网关发送第一业务访问列表以及向第二SDP网关发送第二业务访问列表。Send the first service access list to the first SDP gateway and send the second service access list to the second SDP gateway.
可选的,基于SDP的业务处理方法还包括:控制系统获取用户设备发送的安全信息;控制系统根据安全信息和/或用户设备发送的流量,确定用户设备的安全评分;控制系统根据安全评分确定用户设备对应的新的业务访问权限,并向第一SDP网关发送第一权限变更消息以及向第二SDP网关发送第二权限变更消息,第一权限变更消息用于指示第一SDP网关更改第一业务访问列表,第二权限变更消息用于指示第二SDP网关更改第二业务访问列表。Optionally, the SDP-based service processing method further includes: the control system obtains the security information sent by the user equipment; the control system determines the security score of the user equipment according to the security information and/or the traffic sent by the user equipment; the control system determines the security score according to the security score The new service access authority corresponding to the user equipment, and send a first authority change message to the first SDP gateway and a second authority change message to the second SDP gateway, the first authority change message is used to instruct the first SDP gateway to change the first The service access list, the second permission change message is used to instruct the second SDP gateway to change the second service access list.
可选的,控制系统包括SDP控制器和认证系统。控制系统确定用户设备的业务访问权限,具体包括:认证系统根据用户设备所属的用户组确定用户设备的业务访问权限。Optionally, the control system includes an SDP controller and an authentication system. The control system determines the service access authority of the user equipment, specifically including: the authentication system determines the service access authority of the user equipment according to the user group to which the user equipment belongs.
控制系统根据业务访问权限生成第一业务访问列表和第二业务访问列表,具体包括:认证系统根据业务访问权限生成第一业务访问列表和第二业务访问列表。The control system generates the first service access list and the second service access list according to the service access authority, specifically including: the authentication system generates the first service access list and the second service access list according to the service access authority.
控制系统向第一SDP网关发送第一业务访问列表以及向第二SDP网关发送第二业务访问列表,具体包括:认证系统向SDP控制器发送第一业务访问列表以及第二业务访问列表;SDP控制器向第一SDP网关发送第一业务访问列表以及向第二SDP网关发送第二业务访问列表。The control system sends the first service access list to the first SDP gateway and sends the second service access list to the second SDP gateway, specifically including: the authentication system sends the first service access list and the second service access list to the SDP controller; the SDP control The device sends the first service access list to the first SDP gateway and sends the second service access list to the second SDP gateway.
可选的,控制系统还包括环境感知系统。基于SDP的业务处理方法还包括:环境感知系统接收SDP控制器发送的设备评分,设备评分是SDP控制器根据用户设备的安全信息确定的;环境感知系统根据设备评分和/或用户设备发送的流量确定安全评分;环境感知系统向认证系统发送安全评分;认证系统根据安全评分确定用户设备对应的新的业务访问权限,并向SDP控制器发送权限变更消息;SDP控制器向SDP网关发送权限变更消息,权限变更消息用于指示SDP网关更改业务访问列表。Optionally, the control system also includes an environment perception system. The SDP-based service processing method also includes: the environment perception system receives the equipment score sent by the SDP controller, and the equipment score is determined by the SDP controller according to the security information of the user equipment; the environment awareness system receives the equipment score and/or the traffic sent by the user equipment Determine the security score; the environment awareness system sends the security score to the authentication system; the authentication system determines the new service access authority corresponding to the user equipment based on the security score, and sends a permission change message to the SDP controller; the SDP controller sends a permission change message to the SDP gateway , the permission change message is used to instruct the SDP gateway to change the service access list.
可选的,第一SDP网关和第二SDP网关分别负责接入不同的业务服务。Optionally, the first SDP gateway and the second SDP gateway are respectively responsible for accessing different business services.
本申请第三方面提供一种基于SDP的业务处理系统,业务处理系统应用于包括第一SDP系统和第二SDP系统的网络系统,第一SDP系统包括第一控制系统和第一SDP网关,第二SDP系统包括业务处理系统和第二SDP网关,第一SDP系统和第二SDP系统部署于不同的区域;业务处理系统,用于接收第一控制系统发送的用户令牌,用户令牌是第一控制系统在用户设备通过第一控制系统上的SPA认证以及身份认证后发送的,用户令牌是基于用户设备的设备标识和用户设备所属的用户组生成的;业务处理系统,还用于解析用户令牌,从而得到设备标识和用户组;业务处理系统,还用于根据用户组对应的业务访问权限向第二SDP网关提供业务访问列表,以使得第二SDP网关根据业务访问列表对来自于用户设备的业务访问请求进行处理,业务访问列表用于指示用户设备能够访问的业务。The third aspect of the present application provides an SDP-based business processing system. The business processing system is applied to a network system including a first SDP system and a second SDP system. The first SDP system includes a first control system and a first SDP gateway. The second SDP system includes a business processing system and a second SDP gateway. The first SDP system and the second SDP system are deployed in different areas; the business processing system is used to receive the user token sent by the first control system, and the user token is the second It is sent by the control system after the user equipment passes the SPA authentication and identity authentication on the first control system, and the user token is generated based on the equipment identification of the user equipment and the user group to which the user equipment belongs; the business processing system is also used for parsing The user token, thereby obtaining the device identification and the user group; the service processing system is also used to provide the second SDP gateway with a service access list according to the service access authority corresponding to the user group, so that the second SDP gateway can use the service access list according to the The service access request of the user equipment is processed, and the service access list is used to indicate the services that the user equipment can access.
可选的,业务处理系统还用于接收第一控制系统发送的更新后的安全评分,更新后的安全评分是第一控制系统检测到与用户设备相关的安全评分发生更新后发送的;业务处理系统根据更新后的安全评分确定用户设备对应的新的业务访问权限,并向第二SDP网关发送权限变更消息,权限变更消息用于指示第二SDP网关更改业务访问列表。Optionally, the business processing system is further configured to receive the updated security score sent by the first control system, the updated security score is sent after the first control system detects that the security score related to the user equipment has been updated; the business processing The system determines the new service access rights corresponding to the user equipment according to the updated security score, and sends a rights change message to the second SDP gateway, where the rights change message is used to instruct the second SDP gateway to change the service access list.
可选的,更新后的安全评分是基于用户设备的安全信息和/或用户设备发送的流量确定的。Optionally, the updated security score is determined based on security information of the user equipment and/or traffic sent by the user equipment.
可选的,业务访问请求包括设备标识、用户令牌以及用户设备请求访问的目标业务;业务处理系统还用于接收第二SDP网关发送的鉴权请求,鉴权请求是在第二SDP网关根据业务访问列表对用户设备的业务访问请求验证通过后发送的,鉴权请求包括用户令牌以及目标业务;业务处理系统还用于向第二SDP网关返回鉴权请求的鉴权结果,以使得第二SDP网关基于鉴权结果接受或拒绝业务访问请求。Optionally, the service access request includes the device identifier, the user token, and the target service that the user equipment requests to access; the service processing system is also used to receive the authentication request sent by the second SDP gateway, and the authentication request is sent by the second SDP gateway according to The service access list is sent after the service access request of the user equipment is verified, and the authentication request includes the user token and the target service; the service processing system is also used to return the authentication result of the authentication request to the second SDP gateway, so that the first Two, the SDP gateway accepts or rejects the service access request based on the authentication result.
可选的,第一控制系统包括第一SDP控制器和第一认证系统,业务处理系统包括第二SDP控制器和第二认证系统;第二认证系统用于接收第一认证系统发送的用户令牌;第二SDP控制器用于接收第一SDP控制器发送的设备标识;第二SDP控制器用于向第二认证系统发送第一消息,第一消息中包括设备标识,第一消息用于请求用户设备的业务访问权限;第二认证系统用于根据第一消息和用户组对应的业务访问权限向第二SDP控制器发送业务访问列表;第二SDP控制器用于向第二SDP网关发送业务访问列表。Optionally, the first control system includes a first SDP controller and a first authentication system, and the business processing system includes a second SDP controller and a second authentication system; the second authentication system is used to receive the user token sent by the first authentication system card; the second SDP controller is used to receive the device identification sent by the first SDP controller; the second SDP controller is used to send the first message to the second authentication system, the first message includes the device identification, and the first message is used to request the user The service access authority of the device; the second authentication system is used to send the service access list to the second SDP controller according to the first message and the service access authority corresponding to the user group; the second SDP controller is used to send the service access list to the second SDP gateway .
可选的,第一控制系统包括第一SDP控制器和第一认证系统,业务处理系统包括第二SDP控制器和第二认证系统,用户令牌是基于用户设备的设备标识、用户设备所属的用户组和用户设备对应的用户标识生成的;第二认证系统用于接收第一认证系统发送的用户令牌;第二SDP控制器用于接收第一SDP控制器发送的设备标识和用户标识;第二SDP控制器用于向第二认证系统发送第一消息,第一消息中包括设备标识和用户标识,第一消息用于请求用户设备的业务访问权限;第二认证系统用于根据第一消息和用户组对应的业务访问权限向第二SDP控制器发送业务访问列表;第二SDP控制器用于向第二SDP网关发送业务访问列表。Optionally, the first control system includes a first SDP controller and a first authentication system, the service processing system includes a second SDP controller and a second authentication system, and the user token is based on the device identifier of the user equipment, the Generated by the user ID corresponding to the user group and user equipment; the second authentication system is used to receive the user token sent by the first authentication system; the second SDP controller is used to receive the device ID and user ID sent by the first SDP controller; The second SDP controller is used to send a first message to the second authentication system, the first message includes the device identifier and the user identifier, and the first message is used to request the service access authority of the user equipment; the second authentication system is used to send the first message according to the first message and The service access authority corresponding to the user group sends the service access list to the second SDP controller; the second SDP controller is used to send the service access list to the second SDP gateway.
可选的,第一控制系统包括第一SDP控制器、第一认证系统和第一环境感知系统,业务处理系统包括第二SDP控制器、第二认证系统和第二环境感知系统;第二环境感知系统用于接收第一环境感知系统发送的更新后的安全评分,更新后的安全评分是第一环境感知系统检测到与用户设备相关的安全评分发生更新后发送的;第二环境感知系统用于向第二认证系统发送更新后的安全评分;第二认证系统用于根据更新后的安全评分确定用户设备对应的新的业务访问权限,并向第二SDP控制器发送权限变更消息;第二SDP控制器用于向第二SDP网关发送权限变更消息,权限变更消息用于指示第二SDP网关更改业务访问列表。Optionally, the first control system includes a first SDP controller, a first authentication system, and a first environment awareness system, and the business processing system includes a second SDP controller, a second authentication system, and a second environment awareness system; the second environment The perception system is configured to receive the updated security score sent by the first environment perception system, and the updated security score is sent after the first environment perception system detects that the security score related to the user equipment has been updated; the second environment perception system uses To send the updated security score to the second authentication system; the second authentication system is used to determine the new service access authority corresponding to the user equipment according to the updated security score, and send an authority change message to the second SDP controller; the second The SDP controller is configured to send a permission change message to the second SDP gateway, and the permission change message is used to instruct the second SDP gateway to change the service access list.
可选的,更新后的安全评分是第一环境感知系统根据第一SDP控制器发送的设备评分和/或用户设备发送的流量确定的,设备评分是第一SDP控制器根据用户设备的安全信息确定的。Optionally, the updated security score is determined by the first environment awareness system according to the device score sent by the first SDP controller and/or the traffic sent by the user equipment, and the device score is determined by the first SDP controller according to the security information of the user equipment definite.
可选的,第一SDP网关和第二SDP网关分别负责接入不同的业务服务。Optionally, the first SDP gateway and the second SDP gateway are respectively responsible for accessing different business services.
本申请第四方面提供一种基于SDP的业务处理系统,其特征在于,业务处理系统应用于SDP系统,SDP系统包括业务处理系统、第一SDP网关和第二SDP网关,第一SDP网关和第二SDP网关部署于不同的区域;在用户设备通过业务处理系统上的SPA认证以及身份认证后,业务处理系统用于确定用户设备的业务访问权限;业务处理系统用于根据业务访问权限生成第一业务访问列表和第二业务访问列表,第一业务访问列表用于指示用户设备通过第一SDP网关能够访问的业务,第二业务访问列表用于指示用户设备通过第二SDP网关能够访问的业务;业务处理系统用于向第一SDP网关发送第一业务访问列表以及向第二SDP网关发送第二业务访问列表。The fourth aspect of the present application provides an SDP-based business processing system, which is characterized in that the business processing system is applied to the SDP system, and the SDP system includes a business processing system, a first SDP gateway and a second SDP gateway, and the first SDP gateway and the second SDP gateway Two SDP gateways are deployed in different areas; after the user equipment passes the SPA authentication and identity authentication on the service processing system, the service processing system is used to determine the service access rights of the user equipment; the service processing system is used to generate the first A service access list and a second service access list, the first service access list is used to indicate the services that the user equipment can access through the first SDP gateway, and the second service access list is used to indicate the services that the user equipment can access through the second SDP gateway; The service processing system is configured to send the first service access list to the first SDP gateway and send the second service access list to the second SDP gateway.
可选的,业务处理系统用于获取用户设备发送的安全信息;业务处理系统用于根据安全信息和/或用户设备发送的流量,确定用户设备的安全评分;业务处理系统用于根据安全评分确定用户设备对应的新的业务访问权限,并向第一SDP网关发送第一权限变更消息以及向第二SDP网关发送第二权限变更消息,第一权限变更消息用于指示第一SDP网关更改第一业务访问列表,第二权限变更消息用于指示第二SDP网关更改第二业务访问列表。Optionally, the service processing system is used to obtain the security information sent by the user equipment; the service processing system is used to determine the security score of the user equipment according to the security information and/or the traffic sent by the user equipment; the service processing system is used to determine the security score based on the security score The new service access authority corresponding to the user equipment, and send a first authority change message to the first SDP gateway and a second authority change message to the second SDP gateway, the first authority change message is used to instruct the first SDP gateway to change the first The service access list, the second permission change message is used to instruct the second SDP gateway to change the second service access list.
可选的,业务处理系统包括SDP控制器和认证系统;认证系统用于根据用户设备所属的用户组确定用户设备的业务访问权限;认证系统用于根据业务访问权限生成第一业务访问列表和第二业务访问列表;认证系统用于向SDP控制器发送第一业务访问列表以及第二业务访问列表;SDP控制器用于向第一SDP网关发送第一业务访问列表以及向第二SDP网关发送第二业务访问列表。Optionally, the service processing system includes an SDP controller and an authentication system; the authentication system is used to determine the service access authority of the user equipment according to the user group to which the user equipment belongs; the authentication system is used to generate the first service access list and the second service access authority according to the service access authority. Two service access lists; the authentication system is used to send the first service access list and the second service access list to the SDP controller; the SDP controller is used to send the first service access list to the first SDP gateway and send the second service access list to the second SDP gateway Business access list.
可选的,业务处理系统还包括环境感知系统;环境感知系统用于接收SDP控制器发送的设备评分,设备评分是SDP控制器根据用户设备的安全信息确定的;环境感知系统用于根据设备评分和/或用户设备发送的流量确定安全评分;环境感知系统用于向认证系统发送安全评分;认证系统用于根据安全评分确定用户设备对应的新的业务访问权限,并向SDP控制器发送权限变更消息;SDP控制器用于向SDP网关发送权限变更消息,权限变更消息用于指示SDP网关更改业务访问列表。Optionally, the service processing system further includes an environment awareness system; the environment awareness system is used to receive the equipment score sent by the SDP controller, and the equipment score is determined by the SDP controller according to the security information of the user equipment; the environment awareness system is used to receive the equipment score based on the equipment score and/or the flow sent by the user equipment to determine the security score; the environment awareness system is used to send the security score to the authentication system; the authentication system is used to determine the new service access permission corresponding to the user equipment according to the security score, and send the permission change to the SDP controller Message; the SDP controller is used to send a permission change message to the SDP gateway, and the permission change message is used to instruct the SDP gateway to change the service access list.
可选的,第一SDP网关和第二SDP网关分别负责接入不同的业务服务。Optionally, the first SDP gateway and the second SDP gateway are respectively responsible for accessing different business services.
本申请第五方面提供一种网络设备,包括处理器和存储器;其中,存储器用于存储程序代码,处理器用于调用存储器中的程序代码以使得网络设备执行如第一方面或第二方面的任意一种实施方式的方法。The fifth aspect of the present application provides a network device, including a processor and a memory; wherein the memory is used to store program codes, and the processor is used to call the program codes in the memory so that the network device executes any A method of implementation.
本申请第六方面提供一种计算机可读存储介质,存储有指令,当指令在计算机上运行时,使得计算机执行如第一方面或第二方面的任意一种实施方式的方法。The sixth aspect of the present application provides a computer-readable storage medium, which stores instructions, and when the instructions are run on a computer, the computer executes the method according to any one of the implementation manners of the first aspect or the second aspect.
本申请第七方面提供一种计算机程序产品,当其在计算机上运行时,使得计算机执行如第一方面或第二方面的任意一种实施方式的方法。The seventh aspect of the present application provides a computer program product, which, when running on a computer, causes the computer to execute the method according to any one of the implementation manners of the first aspect or the second aspect.
本申请第八方面提供一种芯片,包括一个或多个处理器。处理器中的部分或全部用于读取并执行存储器中存储的计算机指令,以执行上述任一方面任意可能的实施方式中的方法。可选地,芯片还包括存储器。可选地,芯片还包括通信接口,处理器与通信接口连接。通信接口用于接收需要处理的数据和/或信息,处理器从通信接口获取数据和/或信息,并对数据和/或信息进行处理,并通过通信接口输出处理结果。可选地,通信接口是输入输出接口或者总线接口。本申请提供的方法由一个芯片实现,或者由多个芯片协同实现。The eighth aspect of the present application provides a chip, including one or more processors. Part or all of the processor is used to read and execute computer instructions stored in the memory, so as to execute the method in any possible implementation manner of any aspect above. Optionally, the chip further includes a memory. Optionally, the chip further includes a communication interface, and the processor is connected to the communication interface. The communication interface is used to receive data and/or information to be processed, and the processor obtains the data and/or information from the communication interface, processes the data and/or information, and outputs the processing result through the communication interface. Optionally, the communication interface is an input-output interface or a bus interface. The method provided in this application is implemented by one chip, or is implemented cooperatively by multiple chips.
上述第三方面至第八方面提供的方案,用于实现或配合实现上述第一方面或第二方面提供的方法,因此能够与第一方面或第二方面达到相同或相应的有益效果,此处不再进行赘述。The solutions provided by the third aspect to the eighth aspect above are used to realize or cooperate with the method provided by the first aspect or the second aspect above, so they can achieve the same or corresponding beneficial effects as those of the first aspect or the second aspect, here No further details will be given.
附图说明Description of drawings
图1为本申请实施例提供的一种网络部署场景的示意图;FIG. 1 is a schematic diagram of a network deployment scenario provided by an embodiment of the present application;
图2为本申请实施例提供的一种基于SDP的业务处理方法的流程示意图;FIG. 2 is a schematic flow diagram of an SDP-based service processing method provided in an embodiment of the present application;
图3为本申请实施例提供的一种第二控制系统基于安全评分发送权限变更消息的流程示意图;FIG. 3 is a schematic flow diagram of a second control system sending a permission change message based on a security score provided in an embodiment of the present application;
图4为本申请实施例提供的第一控制系统检测用户设备的安全评分是否发生更新的流程示意图;FIG. 4 is a schematic flow diagram of detecting whether the security score of the user equipment is updated by the first control system provided by the embodiment of the present application;
图5为本申请实施例提供的另一种网络部署场景的示意图;FIG. 5 is a schematic diagram of another network deployment scenario provided by an embodiment of the present application;
图6为本申请实施例提供的另一种基于SDP的业务处理方法的流程示意图;FIG. 6 is a schematic flow diagram of another SDP-based service processing method provided in the embodiment of the present application;
图7为本申请实施例提供的另一种网络部署场景的示意图;FIG. 7 is a schematic diagram of another network deployment scenario provided by an embodiment of the present application;
图8为本申请实施例提供的另一种基于SDP的业务处理方法的流程示意图;FIG. 8 is a schematic flowchart of another SDP-based service processing method provided by the embodiment of the present application;
图9为本申请实施例提供的一种网络设备900的结构示意图。FIG. 9 is a schematic structural diagram of a network device 900 provided by an embodiment of the present application.
具体实施方式Detailed ways
下面结合附图,对本申请的实施例进行描述,显然,所描述的实施例仅仅是本申请一部分的实施例,而不是全部的实施例。本领域普通技术人员可知,随着技术发展和新场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。Embodiments of the present application are described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only part of the embodiments of the present application, not all of the embodiments. Those of ordinary skill in the art know that, with the development of technology and the emergence of new scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。The terms "first", "second" and the like in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence.
在这里专用的词“示例性”意为“用作例子、实施例或说明性”。这里作为“示例性”所说明的任何实施例不必解释为优于或好于其它实施例。The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as superior or better than other embodiments.
下面先对本申请实施例涉及的一些术语概念做解释说明。Some terms and concepts involved in the embodiments of the present application are firstly explained below.
(1)SPA认证(1) SPA certification
SPA认证是一种应用于SDP系统中的认证技术。在SPA认证过程中,客户端将发包时的时间戳、客户端的互联网(Internet Protocol,IP)地址和服务密码组合在一起,生成哈希值。然后,客户端将哈希值打包成用户数据报协议(User Datagram Protocol,UDP)数据包并发送到服务器来指定敲门端口。这样,服务器根据接收到的UDP数据包内时间戳、客户端的IP地址以及服务器内部存储的服务密码生成哈希值,与接收到的UDP数据包内的哈希值进行对比。如果服务器生成的哈希值与接收到的哈希值相同,服务器则为客户端打开申请访问的服务端口。此外,服务器将记录接收到的最后一个有效授权的数据包,以防止攻击者发送旧的数据包进行重放攻击如果。SPA authentication is an authentication technology applied in the SDP system. During the SPA authentication process, the client combines the time stamp when sending the packet, the Internet Protocol (IP) address of the client and the service password to generate a hash value. Then, the client packs the hash value into a User Datagram Protocol (UDP) packet and sends it to the server to specify the knocking port. In this way, the server generates a hash value according to the timestamp in the received UDP data packet, the IP address of the client, and the service password stored in the server, and compares it with the hash value in the received UDP data packet. If the hash value generated by the server is the same as the received hash value, the server opens the service port for the client to apply for access. Additionally, the server will record the last valid authorization packet received to prevent attackers from sending old packets for replay attacks if.
(2)Syslog(2) Syslog
Syslog通常被称为系统日志或系统记录,是一种用来在互联网中传输系统日志消息或系统记录消息的标准。Syslog报文则为一种用于传输系统日志或系统记录的报文。Syslog, commonly referred to as system log or syslog, is a standard used to transmit syslog messages or syslog messages over the Internet. A Syslog message is a message used to transmit system logs or system records.
以上介绍了本申请实施例所涉及的术语概念,以下将介绍本申请实施例提供的基于SDP的业务处理方法所应用的场景。The term concepts involved in the embodiment of the present application are introduced above, and the following will introduce the application scenarios of the SDP-based service processing method provided in the embodiment of the present application.
请参阅图1,图1为本申请实施例提供的一种网络部署场景的示意图。Please refer to FIG. 1. FIG. 1 is a schematic diagram of a network deployment scenario provided by an embodiment of the present application.
如图1所示,区域一中部署有第一SDP系统,第一SDP系统中包括第一SDP网关和第一控制系统。第一SDP网关与区域一中的业务服务器连接,能够控制用户设备对区域一中的业务服务器的访问。As shown in FIG. 1 , a first SDP system is deployed in area 1, and the first SDP system includes a first SDP gateway and a first control system. The first SDP gateway is connected to the service server in area one, and can control the user equipment's access to the service server in area one.
区域二中部署有第二SDP系统,第二SDP系统中包括第二SDP网关和第二控制系统。第二SDP网关与区域二中的业务服务器连接,能够控制用户设备对区域二中的业务服务器的访问。其中,区域一和区域二中的业务服务器用于提供一种或多种业务服务。A second SDP system is deployed in area 2, and the second SDP system includes a second SDP gateway and a second control system. The second SDP gateway is connected to the service server in area 2, and can control the user equipment's access to the service server in area 2. Wherein, the business servers in area 1 and area 2 are used to provide one or more business services.
在区域一中的用户设备通过第一控制系统上的SPA认证以及身份认证后,第一控制系统向第一SDP网关提供用户设备在区域一中的业务访问列表,以使得区域一中的用户设备能够通过第一SDP网关访问区域一中的业务服务器。After the user equipment in area 1 passes the SPA authentication and identity authentication on the first control system, the first control system provides the service access list of the user equipment in area 1 to the first SDP gateway, so that the user equipment in area 1 The service server in area 1 can be accessed through the first SDP gateway.
此外,在区域一中的用户设备通过第一控制系统上的SPA认证以及身份认证后,第二控制系统执行本申请实施例提供的业务处理方法,从而使得区域一中的用户设备能够在不再执行SPA认证的情况下通过第二SDP网关跨域访问区域二中的业务服务器。In addition, after the user equipment in area 1 passes the SPA authentication and identity authentication on the first control system, the second control system executes the service processing method provided by the embodiment of this application, so that the user equipment in area 1 can no longer In the case of performing SPA authentication, the service server in area 2 is accessed across domains through the second SDP gateway.
以上介绍了本申请实施例提供的基于SDP的业务处理方法所应用的场景,以下将详细介绍本申请实施例提供的基于SDP的业务处理方法的具体实现过程。The above describes the application scenarios of the SDP-based service processing method provided in the embodiment of the present application, and the specific implementation process of the SDP-based service processing method provided in the embodiment of the present application will be described in detail below.
请参阅图2,图2为本申请实施例提供的一种基于SDP的业务处理方法的流程示意图。如图2所示,基于SDP的业务处理方法包括以下的步骤201-203。其中,图2所示的基于SDP的业务处理方法应用于图1所示的包括第一SDP系统和第二SDP系统的网络系统中。Please refer to FIG. 2 . FIG. 2 is a schematic flow chart of an SDP-based service processing method provided by an embodiment of the present application. As shown in Fig. 2, the SDP-based service processing method includes the following steps 201-203. Wherein, the SDP-based service processing method shown in FIG. 2 is applied to the network system including the first SDP system and the second SDP system shown in FIG. 1 .
步骤201,第二控制系统接收第一控制系统发送的用户令牌,用户令牌是第一控制系统在用户设备通过第一控制系统上的SPA认证以及身份认证后发送的,该用户令牌是基于用户设备的设备标识和用户设备所属的用户组生成的。Step 201, the second control system receives the user token sent by the first control system. The user token is sent by the first control system after the user equipment passes the SPA authentication and identity authentication on the first control system. The user token is Generated based on the device ID of the user equipment and the user group to which the user equipment belongs.
本实施例中,用户设备通过第一控制系统上的SPA认证是指用户设备向第一控制系统发送的SPA报文通过了认证。用户设备通过第一控制系统上的身份认证是指第一控制系统确认在用户设备上所登陆的用户的身份通过认证。In this embodiment, the user equipment passing the SPA authentication on the first control system means that the SPA message sent by the user equipment to the first control system has passed the authentication. Passing the identity authentication on the first control system for the user equipment means that the first control system confirms that the identity of the logged-in user on the user equipment has passed the authentication.
在用户设备通过第一控制系统上的SPA认证以及身份认证后,第一控制系统会根据用户设备的设备标识和用户设备所属的用户组生成用户令牌,并将该用户令牌发送给第二控制系统。其中,用户设备的设备标识是第一控制系统根据用户设备的信息所生成的唯一标识。用户设备所属的用户组是第一控制系统根据在用户设备上登陆的用户的身份所确定的。并且,用户设备与第一控制系统位于同一个区域中,因此用户设备是在第一控制系统上通过SPA认证以及身份认证。After the user equipment passes the SPA authentication and identity authentication on the first control system, the first control system will generate a user token according to the equipment identification of the user equipment and the user group to which the user equipment belongs, and send the user token to the second Control System. Wherein, the device identifier of the user equipment is a unique identifier generated by the first control system according to the information of the user equipment. The user group to which the user equipment belongs is determined by the first control system according to the identity of the user who logs in on the user equipment. In addition, the user equipment is located in the same area as the first control system, so the user equipment has passed SPA authentication and identity authentication on the first control system.
示例性地,用户令牌是第一控制系统通过对称加密或非对称加密的方式对用户设备的设备标识和用户设备所属的用户组进行加密得到的。例如,假设用户设备的设备标识为2bc17646142b404b9895,用户设备的用户组为a0000000035246,由用户设备的设备标识和用户设备所属的用户组加密得到的用户令牌则为f35989e8fea1。Exemplarily, the user token is obtained by the first control system encrypting the device identifier of the user equipment and the user group to which the user equipment belongs through symmetric encryption or asymmetric encryption. For example, assuming that the device ID of the user equipment is 2bc17646142b404b9895, the user group of the user equipment is a0000000035246, and the user token encrypted by the device ID of the user equipment and the user group to which the user equipment belongs is f35989e8fea1.
步骤202,第二控制系统解析用户令牌,得到设备标识和用户组。Step 202, the second control system parses the user token to obtain the device identifier and user group.
本实施例中,第二控制系统中预置有用于解析用户令牌的密钥。这样,在第二控制系统接收到第一控制系统所发送的用户令牌后,第二控制系统通过预置的密钥对用户令牌进行解析,从而得到用户设备的设备标识和用户设备所属的用户组。In this embodiment, the second control system is preset with a key for parsing the user token. In this way, after the second control system receives the user token sent by the first control system, the second control system analyzes the user token through the preset key, thereby obtaining the device identifier of the user equipment and the user token to which the user equipment belongs. user group.
示例性地,在第一控制系统通过对称加密的方式加密得到用户令牌的情况下,第二控制系统中用于解密用户令牌的密钥与第一控制系统中用于加密得到用户令牌的密钥是同一个密钥。在第一控制系统通过非对称加密的方式加密得到用户令牌的情况下,第一控制系统基于公钥加密得到用户令牌,而第二控制系统则通过私钥对用户令牌进行解密。Exemplarily, in the case that the first control system encrypts the user token through symmetric encryption, the key used to decrypt the user token in the second control system is the same as the key used to encrypt the user token in the first control system. The key for is the same key. In the case that the first control system encrypts the user token through asymmetric encryption, the first control system encrypts the user token based on the public key, and the second control system decrypts the user token through the private key.
步骤203,第二控制系统根据用户组对应的业务访问权限向第二SDP网关提供业务访问列表,以使得第二SDP网关根据业务访问列表对来自于用户设备的业务访问请求进行处理,业务访问列表用于指示用户设备能够访问的业务。Step 203, the second control system provides a service access list to the second SDP gateway according to the service access authority corresponding to the user group, so that the second SDP gateway processes the service access request from the user equipment according to the service access list, the service access list It is used to indicate the services that the user equipment can access.
可选的,第二控制系统中预置有业务权限映射表,该业务权限映射表记录了各个用户组所对应的业务访问权限。示例性地,第二控制系统中所预置的业务权限映射表如表1所示。Optionally, a service authority mapping table is preset in the second control system, and the service authority mapping table records the service access authority corresponding to each user group. Exemplarily, the service authority mapping table preset in the second control system is shown in Table 1.
表1Table 1
在第二控制系统通过解析用户令牌得到用户设备所属的用户组之后,第二控制系统通过查询预置的业务权限映射表,则能够确定用户设备所属的用户组对应的业务访问权限。由于用户设备与用户设备所属的用户组具有对应关系,且用户设备所属的用户组又具有对应的业务访问权限,因此第二控制系统能够根据用户设备所属的用户组对应的业务访问权限生成业务访问列表。其中,业务访问列表用于指示用户设备对应的业务访问权限,即用户设备能够访问的业务。例如,如表1所示,假设用户设备所属的用户组为研发组,则业务访问列表中指示用户设备能够访问的业务包括业务1、业务2和业务3。After the second control system obtains the user group to which the user equipment belongs by parsing the user token, the second control system can determine the service access authority corresponding to the user group to which the user equipment belongs by querying the preset service authority mapping table. Since the user equipment has a corresponding relationship with the user group to which the user equipment belongs, and the user group to which the user equipment belongs has corresponding service access rights, the second control system can generate service access rights according to the service access rights corresponding to the user groups to which the user equipment belongs. list. Wherein, the service access list is used to indicate the service access rights corresponding to the user equipment, that is, the services that the user equipment can access. For example, as shown in Table 1, assuming that the user group to which the user equipment belongs is a research and development group, the services indicated in the service access list that the user equipment can access include service 1, service 2 and service 3.
在第二控制系统向第二SDP网关提供提供业务访问列表之后,当用户设备跨区域向第二SDP网关发送业务访问请求时,第二SDP网关能够根据第二控制系统所提供的业务访问列表对用户设备发送的业务访问请求进行处理。After the second control system provides the service access list to the second SDP gateway, when the user equipment sends a service access request to the second SDP gateway across regions, the second SDP gateway can pair the service access list according to the service access list provided by the second control system The service access request sent by the user equipment is processed.
需要说明的是,以上介绍了用户设备在第一控制系统中通过SPA认证以及身份认证后,第一控制系统向第二控制系统发送用户令牌,以使得用户设备能够在不再执行SPA认证的情况下通过第二SDP网关跨域访问业务。在实际应用中,当其他的用户设备在第二控制系统中通过SPA认证以及身份认证后,第二控制系统也能够向第一控制系统发送用户令牌,以使得其他的用户设备能够在不再执行SPA认证的情况下通过第一SDP网关跨域访问业务,本实施例对此不再赘述。It should be noted that after the user equipment passes the SPA authentication and identity authentication in the first control system, the first control system sends the user token to the second control system so that the user equipment can no longer perform SPA authentication. In this case, the service is accessed across domains through the second SDP gateway. In practical applications, after other user equipments pass SPA authentication and identity authentication in the second control system, the second control system can also send user tokens to the first control system, so that other user equipments can no longer In the case of performing SPA authentication, the service is accessed across domains through the first SDP gateway, which will not be repeated in this embodiment.
本方案中,当用户设备在某一个区域中的SDP控制系统上通过SPA认证和身份认证后,该区域的SDP控制系统则将用户设备对应的用户令牌发送给其他区域的SDP控制系统。其他区域的SDP控制系统通过解析用户令牌获取用户设备的设备标识以及所属的用户组,进而基于用户组确定用户设备的业务访问权限,并向SDP网关下发相应的业务访问列表,从而保证用户设备能够通过不同区域的SDP网关访问业务资源。基于本申请方案,用户设备在跨区域访问业务资源时,无需进行多次SPA认证,简化了用户设备访问业务资源的流程,提高了用户设备访问业务资源的效率。In this solution, after the user equipment passes SPA authentication and identity authentication on the SDP control system in a certain area, the SDP control system in this area sends the user token corresponding to the user equipment to the SDP control systems in other areas. The SDP control system in other areas obtains the device ID of the user device and the user group to which it belongs by analyzing the user token, and then determines the service access rights of the user device based on the user group, and sends the corresponding service access list to the SDP gateway to ensure that the user Devices can access service resources through SDP gateways in different regions. Based on the solution of this application, when the user equipment accesses service resources across regions, multiple SPA authentications are not required, which simplifies the process of user equipment accessing service resources, and improves the efficiency of user equipment accessing service resources.
可选的,用户设备向第二SDP网关发送的业务访问请求包括用户设备的设备标识、用户令牌以及用户设备请求访问的目标业务。第二SDP网关根据业务访问列表查询用户设备是否具有访问目标业务的权限。Optionally, the service access request sent by the user equipment to the second SDP gateway includes the equipment identifier of the user equipment, the user token, and the target service that the user equipment requests to access. The second SDP gateway queries whether the user equipment has the right to access the target service according to the service access list.
在第二SDP网关根据业务访问列表确定用户设备具有访问目标业务的权限的情况下,代表用户设备的业务访问请求通过第二SDP网关上的业务访问列表的验证,因此第二SDP网关将第二控制系统发送鉴权请求。其中,第二SDP网关向第二控制系统发送的鉴权请求包括用户令牌以及目标业务,该鉴权请求用于请求鉴定用户设备是否具有访问目标业务的权限。In the case where the second SDP gateway determines that the user equipment has the authority to access the target service according to the service access list, the service access request on behalf of the user equipment passes the verification of the service access list on the second SDP gateway, so the second SDP gateway sends the second The control system sends an authentication request. Wherein, the authentication request sent by the second SDP gateway to the second control system includes the user token and the target service, and the authentication request is used to request whether the user equipment has the right to access the target service.
在接收到鉴权请求后,第二控制系统根据鉴权请求中的用户令牌以及目标业务,确定用户令牌所对应的用户是否具有访问目标业务的权限,并向第二SDP网关返回鉴权请求对应的鉴权结果,以使得第二SDP网关基于鉴权结果接受或拒绝业务访问请求。例如,第二控制系统解析用户令牌得到用户设备的设备标识和用户设备的用户组,并通过查询用户设备的用户组对应的访问权限来确定用户令牌对应的用户是否具有访问目标业务的权限。After receiving the authentication request, the second control system determines whether the user corresponding to the user token has the authority to access the target service according to the user token and the target service in the authentication request, and returns the authentication request to the second SDP gateway A corresponding authentication result is requested, so that the second SDP gateway accepts or rejects the service access request based on the authentication result. For example, the second control system analyzes the user token to obtain the device identifier of the user equipment and the user group of the user equipment, and determines whether the user corresponding to the user token has the authority to access the target service by querying the access authority corresponding to the user group of the user equipment .
此外,在第二SDP网关根据业务访问列表确定用户设备不具有访问目标业务的权限的情况下,第二SDP则丢弃用户设备所发送的业务访问请求,从而拒绝用户设备访问目标业务。In addition, when the second SDP gateway determines that the user equipment does not have the right to access the target service according to the service access list, the second SDP discards the service access request sent by the user equipment, thereby denying the user equipment access to the target service.
简单来说,第二SDP网关基于业务访问列表对业务访问请求进行验证实际上是对用户设备所进行的合法性检查,即验证该用户设备是否具有访问目标业务的权限。在第二SDP网关验证发现用户设备具有访问目标业务的权限后,第二SDP网关再向第二控制系统发送包括用户令牌的鉴权请求,以使得第二控制系统进一步验证在用户设备上登陆的用户是否具有访问目标业务的权限。基于第二SDP网关以及第二控制系统的双重验证,能够有效地保证用户设备合法访问目标业务,提高业务的访问安全性。To put it simply, the verification of the service access request by the second SDP gateway based on the service access list is actually a legality check on the user equipment, that is, to verify whether the user equipment has the right to access the target service. After the second SDP gateway verifies that the user equipment has the authority to access the target service, the second SDP gateway sends an authentication request including the user token to the second control system, so that the second control system further verifies the login on the user equipment Whether the user has the permission to access the target service. Based on the double authentication of the second SDP gateway and the second control system, it can effectively ensure that the user equipment legally accesses the target service, and improves service access security.
示例性地,假设用户A具有访问目标业务的权限,而用户B不具有访问目标业务的权限。用户A在用户设备上登陆,并通过第一控制系统上的SPA认证和身份认证后,第二控制系统通过执行上述的步骤201-203,使得第二SDP网关上具有与用户设备的设备标识相关的业务访问列表。如果此时用户B在同一个用户设备上登陆,并向第二SDP网关发送请求访问目标业务的业务访问请求,那么,在第二SDP网关上的业务访问列表没有及时更新的情况下,用户B通过用户设备所发送的业务访问请求则能够通过第二SDP网关的验证。在这种情况下,第二控制系统接收第二SDP网关发送的鉴权请求,并确认用户B实际上并不具有访问目标业务的权限,进而向第二SDP网关返回鉴权结果,以指示第二SDP网关拒绝用户B通过用户设备所发送的业务访问请求。Exemplarily, it is assumed that user A has the right to access the target service, but user B does not have the right to access the target service. After user A logs in on the user equipment and passes the SPA authentication and identity authentication on the first control system, the second control system executes the above-mentioned steps 201-203 so that the second SDP gateway has a device ID related to the user equipment. business access list. If user B logs in on the same user equipment at this time, and sends a service access request requesting access to the target service to the second SDP gateway, then, if the service access list on the second SDP gateway is not updated in time, user B The service access request sent by the user equipment can pass the verification of the second SDP gateway. In this case, the second control system receives the authentication request sent by the second SDP gateway, and confirms that user B does not actually have the right to access the target service, and then returns the authentication result to the second SDP gateway to indicate that the second 2. The SDP gateway rejects the service access request sent by user B through the user equipment.
以上介绍了用户设备通过SPA认证和身份认证后,第二控制系统如何向第二SDP网关提供业务访问列表的过程。为了便于理解,以下将详细介绍用户设备通过第一控制系统上的SPA认证以及身份认证的过程。The above describes the process of how the second control system provides the service access list to the second SDP gateway after the user equipment passes the SPA authentication and identity authentication. For ease of understanding, the process of the user equipment passing the SPA authentication and identity authentication on the first control system will be introduced in detail below.
首先,用户通过在用户设备上访问SDP客户端下载页面来下载SDP客户端,该SDP客户端用于使得用户设备与SDP系统实现通信。在用户设备安装完毕SDP客户端后,用户则在SDP客户端上执行用户注册流程。在用户进行注册的过程中,用户输入自身的用户身份信息,以便于SDP客户端向第一控制系统反馈用户输入的用户身份信息。例如用户输入自己在企业中的用户名以及工作岗位等信息。此外,SDP客户端还向第一控制系统上传用户设备的信息,例如用户设备的内存信息、硬盘信息以及处理器信息等用户设备信息。第一控制系统根据SDP客户端所反馈的用户设备信息生成与用户设备唯一对应的设备标识,并且建立用户身份信息与用户设备的设备标识之间的对应关系。First, the user downloads the SDP client by accessing the SDP client download page on the user equipment, and the SDP client is used to enable the user equipment to communicate with the SDP system. After the SDP client is installed on the user equipment, the user performs a user registration process on the SDP client. During the registration process of the user, the user inputs his own user identity information, so that the SDP client can feed back the user identity information input by the user to the first control system. For example, the user enters information such as his user name and job position in the enterprise. In addition, the SDP client also uploads information of the user equipment to the first control system, such as user equipment information such as memory information, hard disk information, and processor information of the user equipment. The first control system generates a device identifier uniquely corresponding to the user equipment according to the user equipment information fed back by the SDP client, and establishes a correspondence between user identity information and the device identifier of the user equipment.
并且,第一控制系统还能够根据用户身份信息确定用户所属的用户组,其中用户所属的用户组具有相应的业务访问权限。例如,第一控制系统根据用户在在企业中的用户名以及工作岗位等信息确定用户属于研发组,从而确定用户对应的业务访问权限为业务1、业务2和业务3。Moreover, the first control system can also determine the user group to which the user belongs according to the user identity information, wherein the user group to which the user belongs has corresponding service access rights. For example, the first control system determines that the user belongs to the research and development group according to information such as the user name and job position of the user in the enterprise, thereby determining that the service access rights corresponding to the user are business 1, business 2 and business 3.
简单来说,在用户完成注册后,第一控制系统获取到用户身份信息、用户设备所登录的用户设备的信息、用户所属的用户组以及用户对应的业务访问权限,并建立起多种信息之间的对应关系。例如,第一控制系统所建立的对应关系具体为:用户名—设备标识—用户组—业务访问权限。这样一来,第一控制系统基于用户名或设备标识,则能够确定对应的用户组和业务访问权限。To put it simply, after the user completes the registration, the first control system obtains the user's identity information, the information of the user device where the user device is logged in, the user group to which the user belongs, and the service access rights corresponding to the user, and establishes a relationship between various information. Correspondence between. For example, the corresponding relationship established by the first control system is specifically: user name—device identifier—user group—service access authority. In this way, the first control system can determine the corresponding user group and service access authority based on the user name or device identifier.
在用户注册完毕后,用户在用户设备上的SDP客户端上输入账号和密码,来发起SPA认证。其中,用户所输入的账号和密码可以是由企业管理员向用户发放的,用于标识用户的唯一身份。具体地,SDP客户端基于用户输入的账号和密码生成SPA报文,并向第一控制系统发送该SPA报文。After the user registration is complete, the user enters the account and password on the SDP client on the user device to initiate SPA authentication. Wherein, the account number and password input by the user may be issued to the user by the administrator of the enterprise, and are used to identify the unique identity of the user. Specifically, the SDP client generates a SPA message based on the account and password input by the user, and sends the SPA message to the first control system.
在第一控制系统接收到SPA报文后,第一控制系统对SPA报文进行验证。在SPA报文通过验证的情况下,第一控制系统确定用户设备通过SPA认证,因此第一控制系统对SPA报文中所携带的账号和密码进行用户身份认证。在SPA报文中的账号和密码通过用户身份认证的情况下,第一控制系统则根据发送SPA报文的用户设备的设备标识以及用户设备所属的用户组,生成用户令牌。After the first control system receives the SPA message, the first control system verifies the SPA message. When the SPA message passes the verification, the first control system determines that the user equipment has passed the SPA authentication, so the first control system performs user identity authentication on the account number and password carried in the SPA message. If the account number and password in the SPA message pass the user identity authentication, the first control system generates a user token according to the device identifier of the user equipment sending the SPA message and the user group to which the user equipment belongs.
在用户设备通过SPA认证和身份认证后,第一控制系统根据用户设备所属的用户组生成业务访问列表,并向第一SDP网关提供业务访问列表,以使得第一SDP网关基于业务访问列表对用户设备的业务访问请求进行处理。此外,第一控制系统向用户设备上的SDP客户端返回用户令牌,以通知SDP客户端已通过SPA认证和身份认证并使得SDP客户端能够基于用户令牌来访问相应的业务。After the user equipment passes the SPA authentication and identity authentication, the first control system generates a service access list according to the user group to which the user equipment belongs, and provides the service access list to the first SDP gateway, so that the first SDP gateway provides the service access list to the user based on the service access list. The service access request of the device is processed. In addition, the first control system returns the user token to the SDP client on the user equipment to notify the SDP client that it has passed SPA authentication and identity authentication and enables the SDP client to access corresponding services based on the user token.
可选的,第一SDP网关和第二SDP网关分别负责接入不同的业务服务。在这种情况下,第一控制系统向第一SDP网关下发的业务访问列表与第二控制系统向第二SDP网关下发的业务访问列表是不同的。具体地,第一控制系统向第一SDP网关下发的业务访问列表用于指示用户设备在第一SDP网关所接入的业务服务中能够访问的业务服务,而第二控制系统向第二SDP网关下发的业务访问列表则用于指示用户设备在第二SDP网关所接入的业务服务中能够访问的业务服务。Optionally, the first SDP gateway and the second SDP gateway are respectively responsible for accessing different business services. In this case, the service access list delivered by the first control system to the first SDP gateway is different from the service access list delivered by the second control system to the second SDP gateway. Specifically, the service access list issued by the first control system to the first SDP gateway is used to indicate the service that the user equipment can access among the service services accessed by the first SDP gateway, and the second control system sends the service access list to the second SDP gateway. The service access list delivered by the gateway is used to indicate the service that the user equipment can access among the service services accessed by the second SDP gateway.
示例性地,假设用户设备在整个网络系统上具有访问权限的业务包括业务1、业务2和业务3。其中,第一SDP网关负责接入业务1和业务2,第二SDP网关负责接入业务3。那么,第一控制系统向第一SDP网关下发的业务访问列表则用于指示用户设备能够访问的业务包括业务1和业务2;第二控制系统向第二SDP网关下发的业务访问列表则用于指示用户设备能够访问的业务包括业务3。Exemplarily, it is assumed that the services to which the user equipment has access rights on the entire network system include service 1, service 2 and service 3. Wherein, the first SDP gateway is responsible for accessing service 1 and service 2, and the second SDP gateway is responsible for accessing service 3. Then, the service access list issued by the first control system to the first SDP gateway is used to indicate that the services that the user equipment can access include service 1 and service 2; the service access list issued by the second control system to the second SDP gateway is The services used to indicate that the user equipment can access include service 3.
以上介绍了第一控制系统和第二控制系统分别向相应的SDP网关提供业务访问列表的过程。以下将介绍第一控制系统和第二控制系统指示相应的SDP网关提供更新业务访问列表的过程。The above describes the process of the first control system and the second control system respectively providing the service access list to the corresponding SDP gateway. The following will introduce the process of the first control system and the second control system instructing the corresponding SDP gateway to provide updated service access lists.
可选的,在第二控制系统向第二SDP网关下发业务访问列表后,第二控制系统接收第一控制系统发送的更新后的安全评分。其中,更新后的安全评分是第一控制系统检测到与用户设备相关的安全评分发生更新后发送的。更新后的安全评分用于指示用户设备当前的安全情况。更新后的安全评分越高,代表用户设备当前越安全;更新后的安全评分越低,则代表用户设备当前越不安全。Optionally, after the second control system delivers the service access list to the second SDP gateway, the second control system receives the updated security score sent by the first control system. Wherein, the updated security score is sent after the first control system detects that the security score related to the user equipment is updated. The updated security score is used to indicate the current security posture of the user device. The higher the updated security score, the more secure the user device is; the lower the updated security score, the less secure the user device is.
然后,第二控制系统根据更新后的安全评分确定用户设备对应的新的业务访问权限,并向第二SDP网关发送权限变更消息,该权限变更消息用于指示第二SDP网关更改业务访问列表。由于更新后的安全评分能够指示用户设备当前的安全情况,因此第二控制系统能够根据用户设备当前的安全情况来调整用户设备当前的业务访问权限,从而保证安全性较低的用户设备无法访问部分私密性较高的业务。Then, the second control system determines the new service access authority corresponding to the user equipment according to the updated security score, and sends a authority change message to the second SDP gateway, where the authority change message is used to instruct the second SDP gateway to change the service access list. Since the updated security score can indicate the current security situation of the user equipment, the second control system can adjust the current service access rights of the user equipment according to the current security situation of the user equipment, thereby ensuring that user equipment with low security cannot access some Highly private business.
示例性地,第二控制系统中预置有各种业务的访问条件。例如,业务1和业务2的访问条件为用户设备的安全评分高于80分,业务3的访问条件为用户设备的安全评分高于90分。在第二控制系统接收到更新后的安全评分之前,第二控制系统向第二SDP网关提供的业务访问列表中指示用户设备能够访问的业务包括业务1、业务2和业务3。在第二控制系统接收到更新后的安全评分之后,第二控制系统基于更新后的安全评分为85,确定用户设备的业务访问权限为业务1和业务2。因此,第二控制系统向第二SDP网关发送权限变形消息,以指示第二SDP网关将业务访问列表中用户设备所能够访问的业务变更为业务1和业务2。Exemplarily, the access conditions of various services are preset in the second control system. For example, the access condition of service 1 and service 2 is that the security score of the user equipment is higher than 80 points, and the access condition of service 3 is that the security score of the user equipment is higher than 90 points. Before the second control system receives the updated security score, the service access list provided by the second control system to the second SDP gateway indicates that the services that the user equipment can access include service 1, service 2 and service 3. After the second control system receives the updated security score, the second control system determines that the service access rights of the user equipment are service 1 and service 2 based on the updated security score being 85. Therefore, the second control system sends a rights modification message to the second SDP gateway, instructing the second SDP gateway to change the services accessible by the user equipment in the service access list to service 1 and service 2.
类似地,在第一控制系统检测到与用户设备相关的安全评分发生更新后,第一控制系统也根据更新后的安全评分确定用户设备对应的新的业务访问权限,并向第一SDP网关发送权限变更消息,以用于指示第一SDP网关更改业务访问列表。Similarly, after the first control system detects that the security score related to the user equipment has been updated, the first control system also determines the new service access authority corresponding to the user equipment according to the updated security score, and sends it to the first SDP gateway The authority change message is used to instruct the first SDP gateway to change the service access list.
可选的,更新后的安全评分是基于用户设备的安全信息和/或用户设备发送的流量确定的。其中,用户设备的安全信息用于指示用户设备本身的安全情况。例如用户设备的安全信息包括用户设备上是否具有高危端口以及用户设备上所运行的系统是否具有高危漏洞等安全信息。用户设备发送的流量则用于指示用户设备在网络上的行为。通过分析用户设备所发送的流量能够确定用户设备在网络环境中的安全情况,例如用户设备当前是否被攻击者劫持而不断发送攻击报文。Optionally, the updated security score is determined based on security information of the user equipment and/or traffic sent by the user equipment. Wherein, the security information of the user equipment is used to indicate the security situation of the user equipment itself. For example, the security information of the user equipment includes security information such as whether there is a high-risk port on the user equipment and whether a system running on the user equipment has a high-risk vulnerability. The traffic sent by the user equipment is used to indicate the behavior of the user equipment on the network. By analyzing the traffic sent by the user equipment, the security situation of the user equipment in the network environment can be determined, for example, whether the user equipment is currently being hijacked by an attacker to continuously send attack packets.
本实施例中,第一控制系统在用户设备通过SPA认证和身份认证后,第一控制系统则为用户设备生成一个原始的安全评分,该原始的安全评分例如为100分。然后,第一控制系统持续检测用户设备的安全评分是否发生更新,并在用户设备的安全评分发生更新时,向第二控制系统发送更新后的安全评分。In this embodiment, after the user equipment passes the SPA authentication and identity authentication, the first control system generates an original security score for the user equipment, and the original security score is, for example, 100 points. Then, the first control system continuously detects whether the security score of the user equipment is updated, and sends the updated security score to the second control system when the security score of the user equipment is updated.
此外,在用户设备的安全评分已经发生过更新后,第一控制系统保留更新后的安全评分,并继续持续检测用户设备的安全评分是否再次发生更新,以便于在用户设备的安全评分再次发生更新后通知第二控制系统。也就是说,在用户设备的安全评分每次发生更新时,第一控制系统都会向第二控制系统发送更新后的安全评分,以便于第二控制系统确定用户设备最新的业务访问权限。In addition, after the security score of the user equipment has been updated, the first control system retains the updated security score and continues to continuously detect whether the security score of the user equipment is updated again, so that when the security score of the user equipment is updated again Then notify the second control system. That is to say, every time the security score of the user equipment is updated, the first control system will send the updated security score to the second control system, so that the second control system can determine the latest service access authority of the user equipment.
类似地,第二控制系统在接收到第一控制系统所发送的安全评分后,第二控制系统将接收到的安全评分保存于本地中,并通过对比本地原先所保存的安全评分来确定是否更新用户设备的业务访问权限。Similarly, after the second control system receives the security score sent by the first control system, the second control system saves the received security score locally, and determines whether to update the security score by comparing it with the security score previously stored locally Service access rights of user equipment.
示例性地,请参阅图3,图3为本申请实施例提供的一种第二控制系统基于安全评分发送权限变更消息的流程示意图。如图3所示,第二控制系统基于安全评分发送权限变更消息的流程包括以下的步骤301-306。For example, please refer to FIG. 3 . FIG. 3 is a schematic flowchart of a second control system sending a permission change message based on a security score according to an embodiment of the present application. As shown in FIG. 3 , the process for the second control system to send a permission change message based on the security score includes the following steps 301-306.
步骤301,第二控制系统接收第一控制系统发送的安全评分。Step 301, the second control system receives the safety score sent by the first control system.
步骤302,第二控制系统检查本地是否保存有安全评分。Step 302, the second control system checks whether there is a safety score stored locally.
步骤303,如果第二控制系统的本地没有保存有安全评分,则第二控制系统在本地新增安全评分。Step 303, if the second control system does not have a local safety score, the second control system adds a new safety score locally.
步骤304,如果第二控制系统的本地保存有安全评分,则第二控制系统判断本地的安全评分是否与接收到的安全评分相同。Step 304, if the second control system locally saves the safety score, the second control system judges whether the local safety score is the same as the received safety score.
步骤305,如果本地没有保存有安全评分,或者本地的安全评分与接收到的安全评分不相同,第二控制系统根据接收到的安全评分向第二SDP网关发送权限变更消息。Step 305, if there is no security score saved locally, or the local security score is different from the received security score, the second control system sends a permission change message to the second SDP gateway according to the received security score.
具体地,第二控制系统根据接收到的安全评分确定用户设备对应的新的业务访问权限,并向第二SDP网关发送权限变更消息,以指示第二SDP网关将业务访问列表中用户设备对应的业务访问权限更改为新的业务访问权限。Specifically, the second control system determines the new service access authority corresponding to the user equipment according to the received security score, and sends a permission change message to the second SDP gateway to instruct the second SDP gateway to add the service access authority corresponding to the user equipment in the service access list to the second SDP gateway. Business access rights changed to new business access rights.
此外,在本地的安全评分与接收到的安全评分不相同的情况下,第二控制系统还根据接收到的安全评分更新本地的安全评分,以使得第二控制系统的本地能够保存最新的安全评分。In addition, when the local safety score is not the same as the received safety score, the second control system also updates the local safety score according to the received safety score, so that the second control system can save the latest safety score locally .
步骤306,如果本地的安全评分与接收到的安全评分相同,第二控制系统则不做任何处置,即第二控制系统不向第二SDP网关发送权限变更消息。Step 306, if the local security score is the same as the received security score, the second control system does not do anything, that is, the second control system does not send a permission change message to the second SDP gateway.
为便于理解,以下将详细介绍第一控制系统检测用户设备的安全评分是否发生更新的详细过程。For ease of understanding, the detailed process of the first control system detecting whether the security score of the user equipment is updated will be introduced in detail below.
请参阅图4,图4为本申请实施例提供的第一控制系统检测用户设备的安全评分是否发生更新的流程示意图。如图4所示,第一控制系统检测用户设备的安全评分是否发生更新的过程包括以下的步骤401-404。Please refer to FIG. 4 . FIG. 4 is a schematic flowchart of the first control system detecting whether the security score of the user equipment is updated according to the embodiment of the present application. As shown in FIG. 4 , the process of the first control system detecting whether the security score of the user equipment is updated includes the following steps 401-404.
步骤401,第一控制系统向用户设备上的SDP客户端发送安全策略。Step 401, the first control system sends the security policy to the SDP client on the user equipment.
在用户设备通过SPA认证以及身份认证后,第一控制系统则向用户设备上的SDP客户端发送安全策略,该安全策略用于指示SDP客户端收集用户设备的安全信息。After the user equipment passes the SPA authentication and identity authentication, the first control system sends a security policy to the SDP client on the user equipment, where the security policy is used to instruct the SDP client to collect security information of the user equipment.
步骤402,第一控制系统接收SDP客户端发送的用户设备的安全信息。Step 402, the first control system receives the security information of the user equipment sent by the SDP client.
在SDP客户端通过执行第一控制系统下发的安全策略收集得到用户设备的安全信息后,SDP客户端则向第一控制系统发送收集得到的用户设备的安全信息。After the SDP client collects the security information of the user equipment by executing the security policy issued by the first control system, the SDP client sends the collected security information of the user equipment to the first control system.
例如,在第一控制系统向SDP客户端发送的安全策略为高危端口策略的情况下,SDP客户端执行高危端口策略,从而在用户设备开启高危端口时向第一控制系统发送高危端口日志。其中,SDK客户端例如通过用户数据报协议(User Datagram Protocol,UDP)中的syslog报文来向第一控制系统发送高危端口日志。在高危端口日志中,包括用户设备的设备标识、用户设备上的威胁事件的威胁类型(即高危端口)以及威胁事件的威胁程度。For example, if the security policy sent by the first control system to the SDP client is a high-risk port policy, the SDP client executes the high-risk port policy, so as to send a high-risk port log to the first control system when the user equipment opens a high-risk port. Wherein, the SDK client sends the high-risk port log to the first control system through, for example, a syslog message in a User Datagram Protocol (User Datagram Protocol, UDP). The high-risk port log includes the device identifier of the user equipment, the threat type (ie high-risk port) of the threat event on the user device, and the threat degree of the threat event.
步骤403,第一控制系统基于用户设备的安全信息和/或用户设备发送的流量确定安全评分。Step 403, the first control system determines a security score based on the security information of the user equipment and/or the traffic sent by the user equipment.
在一种可能的示例中,在接收到SDP客户端发送的用户设备的安全信息后,第一控制系统基于预定义的评分算法来计算用户设备当前的安全评分。例如,假设用户设备的默认安全评分为100分,当用户设备存在一个高危端口时,则用户设备的安全评分需要扣2分,即用户设备当前的安全评分为98分。In a possible example, after receiving the security information of the user equipment sent by the SDP client, the first control system calculates the current security score of the user equipment based on a predefined scoring algorithm. For example, assuming that the default security score of the user equipment is 100 points, when there is a high-risk port on the user equipment, the security score of the user equipment needs to be deducted by 2 points, that is, the current security score of the user equipment is 98 points.
在另一种可能的示例中,第一控制系统监控用户设备在一段时间内发送的流量,并通过分析用户设备所发送的流量来确定用户设备的安全评分。例如,在用户设备发送的流量符合某一个攻击行为的特征时,第一控制系统确定用户设备的安全评分为该攻击行为对应的安全评分。In another possible example, the first control system monitors the traffic sent by the user equipment within a period of time, and determines the security score of the user equipment by analyzing the traffic sent by the user equipment. For example, when the traffic sent by the user equipment meets the characteristics of a certain attack behavior, the first control system determines that the security score of the user equipment is the security score corresponding to the attack behavior.
在又一种可能的示例中,第一控制系统基于用户设备的安全信息确定用户设备对应的设备评分,以及基于用户设备发送的流量确定用户设备对应的网络环境评分。最后,第一控制系统结合用户设备的设备评分和网络环境评分,确定用户设备的安全评分。In yet another possible example, the first control system determines the device score corresponding to the user equipment based on the security information of the user equipment, and determines the network environment score corresponding to the user equipment based on traffic sent by the user equipment. Finally, the first control system determines the security score of the user equipment in combination with the equipment score of the user equipment and the network environment score.
步骤404,第一控制系统将新确定的安全评分与本地保存的安全评分进行比对,以检测安全评分是否发生更新。Step 404, the first control system compares the newly determined safety score with the locally saved safety score to detect whether the safety score is updated.
在第一控制系统确定得到用户设备的安全评分后,第一控制系统则将新确定的安全评分与本地保存的安全评分进行比对,以检测安全评分是否发生更新。在安全评分发生更新的时候,第一控制系统更新本地所保存的安全评分,以及向第二控制系统发送更新后的安全评分。此外,第一控制系统还根据更新后的安全评分确定用户设备对应的新的业务访问权限,进而向第一SDP网关发送权限变更消息。After the first control system determines that the security score of the user equipment is obtained, the first control system compares the newly determined security score with the locally saved security score to detect whether the security score is updated. When the safety score is updated, the first control system updates the locally saved safety score, and sends the updated safety score to the second control system. In addition, the first control system also determines the new service access authority corresponding to the user equipment according to the updated security score, and then sends an authority change message to the first SDP gateway.
请参阅图5,图5为本申请实施例提供的另一种网络部署场景的示意图。如图5所示,图5中所示的网络系统与图1中所示的网络系统区别在于:图5中的第一控制系统包括第一SDP控制器和第一认证系统,且第二控制系统包括第二SDP控制器和第二认证系统。Please refer to FIG. 5 . FIG. 5 is a schematic diagram of another network deployment scenario provided by an embodiment of the present application. As shown in Figure 5, the difference between the network system shown in Figure 5 and the network system shown in Figure 1 is that the first control system in Figure 5 includes a first SDP controller and a first authentication system, and the second control system The system includes a second SDP controller and a second authentication system.
以下将结合图5,详细介绍第二控制系统中的第二SDP控制器和第二认证系统执行本申请实施例提供的基于SDP的业务处理方法的过程。The process of the second SDP controller and the second authentication system in the second control system executing the SDP-based service processing method provided by the embodiment of the present application will be described in detail below with reference to FIG. 5 .
请参阅图6,图6为本申请实施例提供的另一种基于SDP的业务处理方法的流程示意图。如图6所示,基于SDP的业务处理方法应用于图5所示的网络部署场景,且该基于SDP的业务处理方法包括以下的步骤601-604。Please refer to FIG. 6 . FIG. 6 is a schematic flowchart of another SDP-based service processing method provided by the embodiment of the present application. As shown in FIG. 6 , the SDP-based service processing method is applied to the network deployment scenario shown in FIG. 5 , and the SDP-based service processing method includes the following steps 601-604.
步骤601,第二认证系统接收第一认证系统发送的用户令牌。Step 601, the second authentication system receives the user token sent by the first authentication system.
本实施例中,在用户设备通过第一SDP控制器上的SPA认证以及第一认证系统上的身份认证后,第二认证系统接收第一认证系统所发送的用户令牌。In this embodiment, after the user equipment passes SPA authentication on the first SDP controller and identity authentication on the first authentication system, the second authentication system receives the user token sent by the first authentication system.
步骤602,第二认证系统解析所述用户令牌,得到用户设备的设备标识和用户设备所属的用户组。Step 602, the second authentication system parses the user token to obtain the device identifier of the user equipment and the user group to which the user equipment belongs.
在一种可能的示例中,用户令牌是基于用户设备的设备标识和用户设备所属的用户组生成的。因此,第二认证系统解析用户令牌,得到用户设备的设备标识和用户设备所属的用户组。In a possible example, the user token is generated based on the device identifier of the user equipment and the user group to which the user equipment belongs. Therefore, the second authentication system analyzes the user token to obtain the device identifier of the user equipment and the user group to which the user equipment belongs.
可选的,用户令牌是基于用户设备的设备标识、用户设备所属的用户组和用户设备对应的用户标识生成的。因此,第二认证系统解析用户令牌,得到用户设备的设备标识、用户设备所属的用户组和用户设备对应的用户标识。Optionally, the user token is generated based on the device identifier of the user equipment, the user group to which the user equipment belongs, and the user identifier corresponding to the user equipment. Therefore, the second authentication system analyzes the user token to obtain the device identifier of the user equipment, the user group to which the user equipment belongs, and the user identifier corresponding to the user equipment.
步骤603,第二SDP控制器接收第一SDP控制器发送的设备标识。Step 603, the second SDP controller receives the device identifier sent by the first SDP controller.
在用户设备通过第一SDP控制器上的SPA认证以及第一认证系统上的身份认证后,第一认证系统向第一SDP控制器发送用户设备在区域一中的业务访问列表。在获取到业务访问列表后,第一SDP控制器向第二SDP控制器发送用户设备的设备标识。After the user equipment passes the SPA authentication on the first SDP controller and the identity authentication on the first authentication system, the first authentication system sends the service access list of the user equipment in area 1 to the first SDP controller. After obtaining the service access list, the first SDP controller sends the device identifier of the user equipment to the second SDP controller.
可选的,第一SDP控制器在向第二SDP控制器发送用户设备的设备标识的同时,还向第二SDP控制器发送用户设备对应的用户标识,其中用户标识用于表示登陆用户设备的用户身份。Optionally, when the first SDP controller sends the device identifier of the user equipment to the second SDP controller, it also sends the user identifier corresponding to the user equipment to the second SDP controller, where the user identifier is used to indicate the login of the user equipment User ID.
步骤604,第二SDP控制器向第二认证系统发送第一消息,第一消息中包括用户设备的设备标识,该第一消息用于请求用户设备的业务访问权限。Step 604, the second SDP controller sends a first message to the second authentication system, the first message includes the device identifier of the user equipment, and the first message is used to request the service access right of the user equipment.
可选的,在第二SDP控制器接收到第一SDP控制器发送的用户设备的设备标识以及用户标识的情况下,第二SDP控制器向第二认证系统发送的第一消息中包括用户设备的设备标识以及用户标识。Optionally, when the second SDP controller receives the device identifier of the user equipment and the user identifier sent by the first SDP controller, the first message sent by the second SDP controller to the second authentication system includes the user equipment device ID and user ID.
可以理解的是,当用户设备上同时登陆多个用户时,用户设备的设备标识则与多个用户标识对应,且用户设备的设备标识也与多个用户组对应。因此,第二认证基于用户设备的设备标识并不能唯一地确定用户设备所属的用户组,进而无法确定用户设备的业务访问权限。在这种情况下,第二SDP控制器向第二认证系统同时发送用户设备的设备标识以及用户标识,则能够使得第二认证系统确定用户设备所对应的业务访问权限。It can be understood that when multiple users log in to the user equipment at the same time, the device identifier of the user equipment corresponds to multiple user identifiers, and the device identifier of the user equipment also corresponds to multiple user groups. Therefore, based on the device identifier of the user equipment, the second authentication cannot uniquely determine the user group to which the user equipment belongs, and thus cannot determine the service access rights of the user equipment. In this case, the second SDP controller sends the device identifier and the user identifier of the user equipment to the second authentication system at the same time, so that the second authentication system can determine the service access rights corresponding to the user equipment.
步骤605,第二认证系统根据第一消息和用户组对应的业务访问权限向第二SDP控制器发送业务访问列表。Step 605, the second authentication system sends a service access list to the second SDP controller according to the first message and the service access rights corresponding to the user group.
在第二认证系统解析用户令牌得到用户设备的设备标识以及用户设备所属的用户组的情况下,第二认证系统根据第一消息中的用户设备的设备标识确定用户设备对应的用户组,进而确定用户设备对应的业务访问权限。这样,第二认证系统再根据用户设备对应的业务访问权限向第二SDP控制器发送业务访问列表。When the second authentication system parses the user token to obtain the device identifier of the user equipment and the user group to which the user equipment belongs, the second authentication system determines the user group corresponding to the user equipment according to the device identifier of the user equipment in the first message, and then Determine the service access rights corresponding to the user equipment. In this way, the second authentication system sends the service access list to the second SDP controller according to the service access authority corresponding to the user equipment.
可选的,在第二认证系统解析用户令牌得到用户设备的设备标识、用户设备所属的用户组以及用户设备对应的用户标识的情况下,第二认证系统根据第一消息中的用户设备的设备标识和用户标识确定用户设备对应的用户组,进而确定用户设备对应的业务访问权限。这样,第二认证系统再根据用户设备对应的业务访问权限向第二SDP控制器发送业务访问列表。Optionally, when the second authentication system parses the user token to obtain the device identifier of the user equipment, the user group to which the user equipment belongs, and the user identifier corresponding to the user equipment, the second authentication system according to the ID of the user equipment in the first message The device identifier and the user identifier determine the user group corresponding to the user equipment, and then determine the service access rights corresponding to the user equipment. In this way, the second authentication system sends the service access list to the second SDP controller according to the service access authority corresponding to the user equipment.
步骤606,第二SDP控制器向第二SDP网关发送业务访问列表。Step 606, the second SDP controller sends the service access list to the second SDP gateway.
在获得第二认证系统发送的业务访问列表后,第二SDP控制器向第二SDP网关发送业务访问列表。After obtaining the service access list sent by the second authentication system, the second SDP controller sends the service access list to the second SDP gateway.
可选的,第一控制系统除了包括第一SDP控制器和第一认证系统之外,第一控制系统还包括第一环境感知系统。第二控制系统除了包括第二SDP控制器和第二认证系统之外,第二控制系统还包括第二环境感知系统。Optionally, in addition to the first SDP controller and the first authentication system, the first control system also includes a first environment perception system. In addition to the second control system including the second SDP controller and the second authentication system, the second control system also includes a second environment perception system.
在第二控制系统向第二SDP网关提供业务访问列表后,第二环境感知系统接收第一环境感知系统发送的更新后的安全评分,该更新后的安全评分是第一环境感知系统检测到与用户设备相关的安全评分发生更新后发送的。其中,更新后的安全评分是第一环境感知系统根据第一SDP控制器发送的设备评分和/或用户设备发送的流量确定的,该设备评分是第一SDP控制器根据用户设备的安全信息确定的。关于如何确定更新后的安全评分具体请参考上文的叙述,在此不再赘述。After the second control system provides the service access list to the second SDP gateway, the second environment awareness system receives the updated security score sent by the first environment awareness system. The updated security score is detected by the first environment awareness system. Sent after the security score related to the user device is updated. Wherein, the updated security score is determined by the first environment awareness system according to the device score sent by the first SDP controller and/or the traffic sent by the user equipment, and the device score is determined by the first SDP controller according to the security information of the user equipment of. For details on how to determine the updated security score, please refer to the description above, and will not repeat it here.
然后,第二环境感知系统向第二认证系统发送更新后的安全评分。The second context awareness system then sends the updated security score to the second authentication system.
其次,在得到更新后的安全评分后,第二认证系统根据更新后的安全评分确定用户设备对应的新的业务访问权限,并向第二SDP控制器发送权限变更消息。Secondly, after obtaining the updated security score, the second authentication system determines the new service access permission corresponding to the user equipment according to the updated security score, and sends a permission change message to the second SDP controller.
最后,第二SDP控制器向第二SDP网关发送权限变更消息,该权限变更消息用于指示第二SDP网关更改业务访问列表。Finally, the second SDP controller sends a permission change message to the second SDP gateway, where the permission change message is used to instruct the second SDP gateway to change the service access list.
请参阅图7,图7为本申请实施例提供的另一种网络部署场景的示意图。如图7所示,图7中的SDP系统包括控制系统、第一SDP网关和第二SDP网关。其中,第一SDP网关部署于区域一,第二SDP网关部署于区域二,即第一SDP网关和第二SDP网关部署于不同的区域。此外,第一SDP网关和第二SDP网关均与控制系统连接。Please refer to FIG. 7 . FIG. 7 is a schematic diagram of another network deployment scenario provided by an embodiment of the present application. As shown in Fig. 7, the SDP system in Fig. 7 includes a control system, a first SDP gateway and a second SDP gateway. Wherein, the first SDP gateway is deployed in area 1, and the second SDP gateway is deployed in area 2, that is, the first SDP gateway and the second SDP gateway are deployed in different areas. In addition, both the first SDP gateway and the second SDP gateway are connected to the control system.
请参阅图8,图8为本申请实施例提供的另一种基于SDP的业务处理方法的流程示意图。如图8所示,基于SDP的业务处理方法应用于图7所示的网络部署场景,且该基于SDP的业务处理方法包括以下的步骤801-803。Please refer to FIG. 8 . FIG. 8 is a schematic flowchart of another SDP-based service processing method provided by the embodiment of the present application. As shown in FIG. 8 , the SDP-based service processing method is applied to the network deployment scenario shown in FIG. 7 , and the SDP-based service processing method includes the following steps 801-803.
步骤801,在用户设备通过控制系统上的SPA认证以及身份认证后,控制系统确定用户设备的业务访问权限。Step 801, after the user equipment passes the SPA authentication and identity authentication on the control system, the control system determines the service access authority of the user equipment.
在步骤801中,控制系统确定用户设备的业务访问权限的方式与前述图2所述的实施例中第一控制系统确定用户设备的业务访问权限类似,具体请参考上文的叙述,此处不再赘述。In step 801, the manner in which the control system determines the service access authority of the user equipment is similar to that of the first control system determining the service access authority of the user equipment in the embodiment described in FIG. Let me repeat.
步骤802,控制系统根据业务访问权限生成第一业务访问列表和第二业务访问列表,其中第一业务访问列表用于指示用户设备通过第一SDP网关能够访问的业务,第二业务访问列表用于指示用户设备通过第二SDP网关能够访问的业务。Step 802, the control system generates a first service access list and a second service access list according to the service access rights, wherein the first service access list is used to indicate the services that the user equipment can access through the first SDP gateway, and the second service access list is used to Indicates services that the user equipment can access through the second SDP gateway.
可选的,在第一SDP网关和第二SDP网关负责接入相同的业务服务的情况下,控制系统所生成的一业务访问列表和第二业务访问列表是相同的。例如,在控制系统确认用户设备具有访问权限的业务包括业务1、业务2和业务3,且第一SDP网关和第二SDP网关均负责接入业务1、业务2和业务3的情况下,控制系统所生成的第一业务访问列表和第二业务访问列表均用于指示用户设备能够访问的业务为业务1、业务2和业务3。Optionally, when the first SDP gateway and the second SDP gateway are responsible for accessing the same business service, the first business access list and the second business access list generated by the control system are the same. For example, when the control system confirms that the services that the user equipment has access rights include service 1, service 2 and service 3, and both the first SDP gateway and the second SDP gateway are responsible for accessing service 1, service 2 and service 3, the control Both the first service access list and the second service access list generated by the system are used to indicate that the services that the user equipment can access are service 1, service 2 and service 3.
可选的,在第一SDP网关和第二SDP网关分别负责接入不同的业务服务的情况下,控制系统所生成的一业务访问列表和第二业务访问列表是不相同的。例如,在控制系统确认用户设备具有访问权限的业务包括业务1、业务2和业务3的情况下,假设第一SDP网关负责接入业务1和业务2,第二SDP网关负责接入业务3。那么,控制系统所生成的第一业务访问列表用于指示用户设备能够访问的业务为业务1和业务2;控制系统所生成的第二业务访问列表用于指示用户设备能够访问的业务为业务3。Optionally, when the first SDP gateway and the second SDP gateway are respectively responsible for accessing different business services, the first service access list and the second service access list generated by the control system are different. For example, when the control system confirms that the services that the user equipment has access rights include service 1, service 2 and service 3, assume that the first SDP gateway is responsible for accessing service 1 and service 2, and the second SDP gateway is responsible for accessing service 3. Then, the first service access list generated by the control system is used to indicate that the services that the user equipment can access are service 1 and service 2; the second service access list generated by the control system is used to indicate that the service that the user equipment can access is service 3 .
步骤803,控制系统向第一SDP网关发送第一业务访问列表以及向第二SDP网关发送第二业务访问列表。Step 803, the control system sends the first service access list to the first SDP gateway and sends the second service access list to the second SDP gateway.
这样,第一SDP网关能够根据第一业务访问列表对来自于用户设备的业务访问请求进行处理。第二SDP网关同样能够根据第一业务访问列表对来自于用户设备的业务访问请求进行处理。用户设备在控制系统上通过一次SPA认证和身份认证后,用户设备则能够访问不同区域上的SDP网关,从而通过SDP网关实现业务访问。In this way, the first SDP gateway can process the service access request from the user equipment according to the first service access list. The second SDP gateway can also process the service access request from the user equipment according to the first service access list. After the user equipment passes SPA authentication and identity authentication on the control system, the user equipment can access SDP gateways in different regions, thereby realizing service access through the SDP gateway.
可选的,在控制系统向第一SDP网关发送第一业务访问列表以及向第二SDP网关发送第二业务访问列表后,控制系统获取用户设备发送的安全信息。Optionally, after the control system sends the first service access list to the first SDP gateway and the second service access list to the second SDP gateway, the control system acquires the security information sent by the user equipment.
然后,控制系统根据安全信息和/或用户设备发送的流量,确定用户设备的安全评分。其中,安全评分用于指示用户设备当前的安全情况。安全评分越高,代表用户设备当前越安全;安全评分越低,则代表用户设备当前越不安全。Then, the control system determines the security score of the user equipment according to the security information and/or the traffic sent by the user equipment. Wherein, the security score is used to indicate the current security situation of the user equipment. The higher the security score, the more secure the user device is; the lower the security score, the less secure the user device is.
最后,控制系统根据安全评分确定用户设备对应的新的业务访问权限,并向第一SDP网关发送第一权限变更消息以及向第二SDP网关发送第二权限变更消息,第一权限变更消息用于指示第一SDP网关更改第一业务访问列表,第二权限变更消息用于指示第二SDP网关更改第二业务访问列表。Finally, the control system determines the new service access authority corresponding to the user equipment according to the security score, and sends a first authority change message to the first SDP gateway and a second authority change message to the second SDP gateway. The first authority change message is used to The first SDP gateway is instructed to modify the first service access list, and the second permission change message is used to instruct the second SDP gateway to modify the second service access list.
本实施例中,控制系统确定安全评分以及根据安全评分确定用户设备对应的新的业务访问权限与上述图2所示的实施例中第一控制系统确定安全评分以及用户设备对应的新的业务访问权限的方式类似,具体请参考上文的叙述,在此不再赘述。In this embodiment, the control system determines the security score and determines the new service access authority corresponding to the user equipment based on the security score, which is the same as the first control system in the above embodiment shown in FIG. The permission method is similar, please refer to the above description for details, and will not repeat them here.
可选的,图7所示的控制系统中具体包括SDP控制器和认证系统。Optionally, the control system shown in FIG. 7 specifically includes an SDP controller and an authentication system.
在上述的步骤801中,控制系统中的认证系统根据用户设备所属的用户组确定用户设备的业务访问权限。In the above step 801, the authentication system in the control system determines the service access rights of the user equipment according to the user group to which the user equipment belongs.
在上述的步骤802中,控制系统中的认证系统根据业务访问权限生成第一业务访问列表和第二业务访问列表。In the above step 802, the authentication system in the control system generates the first service access list and the second service access list according to the service access authority.
在上述的步骤803中,控制系统中的认证系统向SDP控制器发送第一业务访问列表以及第二业务访问列表。然后,控制系统中的SDP控制器向第一SDP网关发送第一业务访问列表以及向第二SDP网关发送第二业务访问列表。In the above step 803, the authentication system in the control system sends the first service access list and the second service access list to the SDP controller. Then, the SDP controller in the control system sends the first service access list to the first SDP gateway and sends the second service access list to the second SDP gateway.
可选的,图7所示的控制系统中还包括环境感知系统。Optionally, the control system shown in FIG. 7 also includes an environment perception system.
在SDP控制器向第一SDP网关和第二SDP网关发送相应的业务访问列表后,环境感知系统接收SDP控制器发送的设备评分,该设备评分是SDP控制器根据用户设备的安全信息确定的。其中,用户设备的安全信息是由用户设备上的SDP客户端收集并发送给SDP控制器的。After the SDP controller sends the corresponding service access list to the first SDP gateway and the second SDP gateway, the environment awareness system receives the equipment score sent by the SDP controller, and the equipment score is determined by the SDP controller according to the security information of the user equipment. Wherein, the security information of the user equipment is collected by the SDP client on the user equipment and sent to the SDP controller.
然后,环境感知系统根据设备评分和/或用户设备发送的流量确定安全评分,并向认证系统发送安全评分。其中,环境感知系统确定安全评分的方式请参考上文中第一控制系统确定安全评分的过程,此处不再赘述。The context awareness system then determines a security score based on the device score and/or the traffic sent by the user device and sends the security score to the authentication system. Wherein, for the method of determining the safety score by the environment perception system, please refer to the process of determining the safety score by the first control system above, which will not be repeated here.
其次,认证系统根据安全评分确定用户设备对应的新的业务访问权限,并向SDP控制器发送权限变更消息。Secondly, the authentication system determines the new service access rights corresponding to the user equipment according to the security score, and sends a rights change message to the SDP controller.
最后,SDP控制器向SDP网关发送权限变更消息,该权限变更消息用于指示SDP网关更改业务访问列表。Finally, the SDP controller sends a permission change message to the SDP gateway, where the permission change message is used to instruct the SDP gateway to change the service access list.
以上介绍了本申请实施例提供的基于SDP的业务处理,以下将介绍用于执行上述基于SDP的业务处理方法的执行主体。The above describes the SDP-based service processing provided by the embodiment of the present application, and the execution subject for executing the above-mentioned SDP-based service processing method will be introduced below.
本申请实施例提供一种基于SDP的业务处理系统,该业务处理系统应用于包括第一SDP系统和第二SDP系统的网络系统,第一SDP系统包括第一控制系统和第一SDP网关,第二SDP系统包括业务处理系统和第二SDP网关,第一SDP系统和第二SDP系统部署于不同的区域。示例性地,本实施例所提供的业务处理系统例如为图1或图5中所示的第二控制系统。An embodiment of the present application provides an SDP-based business processing system, the business processing system is applied to a network system including a first SDP system and a second SDP system, the first SDP system includes a first control system and a first SDP gateway, and the first SDP system includes a first SDP gateway. The second SDP system includes a business processing system and a second SDP gateway, and the first SDP system and the second SDP system are deployed in different regions. Exemplarily, the service processing system provided in this embodiment is, for example, the second control system shown in FIG. 1 or FIG. 5 .
在本实施例提供的业务处理系统为图1中所示的第二控制系统的情况下,业务处理系统所执行的业务处理方法如图2-图4对应的实施例所述,具体请参考上述图2-图4对应的实施例,在此不再赘述。In the case that the business processing system provided in this embodiment is the second control system shown in Figure 1, the business processing method executed by the business processing system is as described in the embodiments corresponding to Figures 2-4, please refer to the above for details The embodiments corresponding to FIG. 2-FIG. 4 will not be repeated here.
在本实施例提供的业务处理系统为图5中所示的第二控制系统的情况下,业务处理系统所执行的业务处理方法如图6对应的实施例所述,具体请参考上述图6对应的实施例,在此不再赘述。In the case that the business processing system provided in this embodiment is the second control system shown in FIG. 5, the business processing method executed by the business processing system is as described in the embodiment corresponding to FIG. 6. For details, please refer to the corresponding The embodiment of this will not be repeated here.
在另一个可能的实施例中,本申请实施例还提供一种基于SDP的业务处理系统,该业务处理系统应用于SDP系统,SDP系统包括业务处理系统、第一SDP网关和第二SDP网关,第一SDP网关和第二SDP网关部署于不同的区域。示例性地,本实施例所提供的业务处理系统例如为图7中所示的控制系统。In another possible embodiment, the embodiment of the present application further provides an SDP-based service processing system, the service processing system is applied to an SDP system, and the SDP system includes a service processing system, a first SDP gateway, and a second SDP gateway, The first SDP gateway and the second SDP gateway are deployed in different areas. Exemplarily, the business processing system provided in this embodiment is, for example, the control system shown in FIG. 7 .
在本实施例提供的业务处理系统为图7中所示的控制系统的情况下,业务处理系统所执行的业务处理方法如图8对应的实施例所述,具体请参考上述图8对应的实施例,在此不再赘述。In the case where the business processing system provided in this embodiment is the control system shown in FIG. 7, the business processing method executed by the business processing system is as described in the embodiment corresponding to FIG. 8. For details, please refer to the above implementation corresponding to FIG. example, which will not be repeated here.
请参阅图9,图9为本申请实施例提供的一种网络设备900的结构示意图。其中,上述图1所示的实施例中的第二控制系统,图5所示的第二SDP控制器和第二认证系统以及图7所示的控制系统例如可以部署于图9所示的网络设备900上。网络设备900由一般性的总线体系结构来实现。Please refer to FIG. 9 , which is a schematic structural diagram of a network device 900 provided in an embodiment of the present application. Among them, the second control system in the embodiment shown in FIG. 1, the second SDP controller and the second authentication system shown in FIG. 5, and the control system shown in FIG. 7 can be deployed in the network shown in FIG. 9, for example. on device 900. Network device 900 is implemented by a generic bus architecture.
网络设备900包括至少一个处理器901、通信总线902、存储器903以及至少一个通信接口904。The network device 900 includes at least one processor 901 , a communication bus 902 , a memory 903 and at least one communication interface 904 .
可选地,处理器901是一个通用CPU、NP、微处理器、或者是一个或多个用于实现本申请方案的集成电路,例如,专用集成电路(application-specific integrated circuit,ASIC),可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD是复杂可编程逻辑器件(complex programmable logic device,CPLD),现场可编程逻辑门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic array logic,GAL)或其任意组合。Optionally, the processor 901 is a general-purpose CPU, NP, microprocessor, or one or more integrated circuits for implementing the solution of the present application, for example, an application-specific integrated circuit (application-specific integrated circuit, ASIC), which may Programmable logic device (programmable logic device, PLD) or its combination. The above-mentioned PLD is a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a generic array logic (generic array logic, GAL) or any combination thereof.
通信总线902用于在上述组件之间传送信息。通信总线902分为地址总线、数据总线、控制总线等。为便于表示,图中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The communication bus 902 is used to transfer information between the aforementioned components. The communication bus 902 is divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is used in the figure, but it does not mean that there is only one bus or one type of bus.
可选地,存储器903是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其它类型的静态存储设备。可替换的,存储器903是随机存取存储器(random accessmemory,RAM)或者可存储信息和指令的其它类型的动态存储设备。可替换的,存储器903是电可擦可编程只读存储器(electrically erasable programmable read-only Memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其它光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其它磁存储设备,或者是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其它介质,但不限于此。可选地,存储器903是独立存在的,并通过通信总线902与处理器901相连接。可选地,存储器903和处理器901集成在一起。Optionally, the memory 903 is a read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions. Alternatively, the memory 903 is a random access memory (random access memory, RAM) or other types of dynamic storage devices that can store information and instructions. Alternatively, the memory 903 is an electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage ( including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or are capable of carrying or storing desired program code in the form of instructions or data structures and can be programmed by a computer Any other medium accessed, but not limited to. Optionally, the memory 903 exists independently and is connected to the processor 901 through the communication bus 902 . Optionally, the memory 903 and the processor 901 are integrated together.
通信接口904使用任何收发器一类的装置,用于与其它设备或通信网络通信。通信接口904包括有线通信接口。可选地,通信接口904还包括无线通信接口。其中,有线通信接口例如为以太网接口。以太网接口是光接口,电接口或其组合。无线通信接口为无线局域网(wireless local area networks,WLAN)接口,蜂窝网络通信接口或其组合等。Communication interface 904 uses any transceiver-like device for communicating with other devices or a communication network. The communication interface 904 includes a wired communication interface. Optionally, the communication interface 904 also includes a wireless communication interface. Wherein, the wired communication interface is, for example, an Ethernet interface. The Ethernet interface is an optical interface, an electrical interface or a combination thereof. The wireless communication interface is a wireless local area network (wireless local area networks, WLAN) interface, a cellular network communication interface or a combination thereof.
在具体实现中,作为一种实施例,处理器901包括一个或多个CPU,如图9中所示的CPU0和CPU1。In a specific implementation, as an embodiment, the processor 901 includes one or more CPUs, such as CPU0 and CPU1 shown in FIG. 9 .
在具体实现中,作为一种实施例,网络设备900包括多个处理器,如图9中所示的处理器901和处理器905。这些处理器中的每一个是一个单核处理器(single-CPU),或者是一个多核处理器(multi-CPU)。这里的处理器指一个或多个设备、电路、和/或用于处理数据(如计算机程序指令)的处理核。In a specific implementation, as an embodiment, the network device 900 includes multiple processors, such as a processor 901 and a processor 905 as shown in FIG. 9 . Each of these processors is a single-core processor (single-CPU), or a multi-core processor (multi-CPU). A processor herein refers to one or more devices, circuits, and/or processing cores for processing data such as computer program instructions.
在一些实施例中,存储器903用于存储执行本申请方案的程序代码99,处理器901执行存储器903中存储的程序代码99。也就是说,网络设备900通过处理器901以及存储器903中的程序代码99,来实现上述的方法实施例。In some embodiments, the memory 903 is used to store the program code 99 for implementing the solution of the present application, and the processor 901 executes the program code 99 stored in the memory 903 . That is to say, the network device 900 implements the foregoing method embodiments through the processor 901 and the program code 99 in the memory 903 .
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分可互相参考,每个实施例重点说明的都是与其他实施例的不同之处。Each embodiment in this specification is described in a progressive manner, the same and similar parts of each embodiment can be referred to each other, and each embodiment focuses on the differences from other embodiments.
A参考B,指的是A与B相同或者A为B的简单变形。A reference to B means that A is the same as B or A is a simple variation of B.
本申请实施例的说明书和权利要求书中的术语“第一”和“第二”等是用于区别不同的对象,而不是用于描述对象的特定顺序,也不能理解为指示或暗示相对重要性。例如,第一限速通道和第二限速通道用于区别不同的限速通道,而不是用于描述限速通道的特定顺序,也不能理解为第一限速通道比第二限速通道更重要。The terms "first" and "second" in the description and claims of the embodiments of the present application are used to distinguish different objects, not to describe a specific order of objects, nor can they be interpreted as indicating or implying relative importance sex. For example, the first speed-limiting channel and the second speed-limiting channel are used to distinguish different speed-limiting channels, but not to describe the specific order of the speed-limiting channels, nor can it be understood that the first speed-limiting channel is faster than the second speed-limiting channel. important.
本申请实施例,除非另有说明,“至少一个”的含义是指一个或多个,“多个”的含义是指两个或两个以上。In the embodiments of the present application, unless otherwise specified, "at least one" means one or more, and "multiple" means two or more.
上述实施例可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例描述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘SolidState Disk(SSD))等。The above-mentioned embodiments may be fully or partially implemented by software, hardware, firmware or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, all or part of the processes or functions described in accordance with the embodiments of the present application will be generated. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media. The available medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a magnetic tape), an optical medium (for example, DVD), or a semiconductor medium (for example, a Solid State Disk (SSD)).
以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。The above embodiments are only used to illustrate the technical solutions of the present application, rather than to limit them; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: it can still apply to the foregoing embodiments Modifications are made to the recorded technical solutions, or equivalent replacements are made to some of the technical features; and these modifications or replacements do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of each embodiment of the application.
Claims (30)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210170117.9A CN116684113A (en) | 2022-02-23 | 2022-02-23 | Service processing method and related device based on SDP (software defined boundary) |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210170117.9A CN116684113A (en) | 2022-02-23 | 2022-02-23 | Service processing method and related device based on SDP (software defined boundary) |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN116684113A true CN116684113A (en) | 2023-09-01 |
Family
ID=87779712
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210170117.9A Pending CN116684113A (en) | 2022-02-23 | 2022-02-23 | Service processing method and related device based on SDP (software defined boundary) |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN116684113A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119135375A (en) * | 2024-08-09 | 2024-12-13 | 中国铁道科学研究院集团有限公司 | A data access method and device based on software-defined boundaries |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111600906A (en) * | 2020-06-08 | 2020-08-28 | 奇安信科技集团股份有限公司 | Data processing method, apparatus, system, medium and program |
| CN113890767A (en) * | 2021-11-12 | 2022-01-04 | 中国联合网络通信集团有限公司 | Network access method, device, equipment and storage medium |
| US20220045854A1 (en) * | 2020-08-09 | 2022-02-10 | Perimeter 81 Ltd | Unification of data flows over network links with different internet protocol (ip) addresses |
-
2022
- 2022-02-23 CN CN202210170117.9A patent/CN116684113A/en active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111600906A (en) * | 2020-06-08 | 2020-08-28 | 奇安信科技集团股份有限公司 | Data processing method, apparatus, system, medium and program |
| US20220045854A1 (en) * | 2020-08-09 | 2022-02-10 | Perimeter 81 Ltd | Unification of data flows over network links with different internet protocol (ip) addresses |
| CN113890767A (en) * | 2021-11-12 | 2022-01-04 | 中国联合网络通信集团有限公司 | Network access method, device, equipment and storage medium |
Non-Patent Citations (2)
| Title |
|---|
| 新华三: "零信任应用实践:SDP技术应用场景与方案落地", pages 1, Retrieved from the Internet <URL:https://www.51cto.com/article/701395.html> * |
| 王刚;张英涛;杨正权;: "基于零信任打造封闭访问空间", 信息安全与通信保密, no. 08, 10 August 2020 (2020-08-10) * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119135375A (en) * | 2024-08-09 | 2024-12-13 | 中国铁道科学研究院集团有限公司 | A data access method and device based on software-defined boundaries |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10298610B2 (en) | Efficient and secure user credential store for credentials enforcement using a firewall | |
| US10425387B2 (en) | Credentials enforcement using a firewall | |
| US9237021B2 (en) | Certificate grant list at network device | |
| US10021101B2 (en) | Embedding security posture in network traffic | |
| US9781096B2 (en) | System and method for out-of-band application authentication | |
| KR20230048431A (en) | Service communication methods, systems, devices and electronic devices | |
| US9548982B1 (en) | Secure controlled access to authentication servers | |
| US8191131B2 (en) | Obscuring authentication data of remote user | |
| WO2022247751A1 (en) | Method, system and apparatus for remotely accessing application, device, and storage medium | |
| US12368713B2 (en) | Mitigating multiple authentications for a geo-distributed security service using an authentication cache | |
| CN114513786A (en) | 5G feeder automation access control method, device and medium based on zero trust | |
| WO2023065969A1 (en) | Access control method, apparatus, and system | |
| CN111628960B (en) | Method and apparatus for connecting to network services on a private network | |
| US12335263B2 (en) | Identity proxy and access gateway | |
| WO2023279782A1 (en) | Access control method, access control system and related device | |
| US11784993B2 (en) | Cross site request forgery (CSRF) protection for web browsers | |
| US20240195795A1 (en) | Computer-implemented methods and systems for establishing and/or controlling network connectivity | |
| JP5869552B2 (en) | Method for securing access to data or services accessible through a device performing the method and corresponding device | |
| CN115603932A (en) | An access control method, access control system and related equipment | |
| WO2023078106A1 (en) | Access control method, apparatus and system for encrypted traffic | |
| CN111031067A (en) | Monitoring data transmission method and device of distributed system and electronic equipment | |
| CN116684113A (en) | Service processing method and related device based on SDP (software defined boundary) | |
| CN117278275A (en) | Access right adjustment method, device and storage medium | |
| CN116760595A (en) | Access method, computing device and computer storage medium | |
| TW201721498A (en) | Wired area network user management system and method with security and function scalability wherein a network controller is used to control a programmable network switch, and divert a non-authenticated terminal device to an authentication server |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |