Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network authentication service system and method

A network authentication and service method technology, applied in the field of network authentication service system, can solve the problems of not being able to guarantee that information will not be stolen, violating Web services, and not being able to guarantee the security of Web services, etc.

Active Publication Date: 2008-08-20
ZHEJIANG 1ONE TECH CO LTD
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above methods can achieve a certain level of security, but there are also deficiencies. For the method of using the authentication mechanism, although the access to resources is protected through identity verification, since the data is still in the form of plain text during transmission, Therefore, there is no guarantee that the information will not be stolen during the transmission process; for the encrypted data transmission protocol, since SSL acts on the transport layer, the security of the Web service cannot be guaranteed without the transport layer. Since no XML processing is involved, its It can only realize the encryption or signature of all data, and cannot target a certain part, and it is attached to the transport layer, which violates the principle that Web services have nothing to do with the transport layer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication service system and method
  • Network authentication service system and method
  • Network authentication service system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Figure 5 It is a flow chart of Embodiment 1 of the network authentication service method of the present invention. This embodiment includes: intercepting messages exchanged by the application layer, and performing authentication processing on the intercepted messages, specifically including:

[0029] Step 51: the Web service security device (for example, the client sends an intercepting module) intercepts the request message sent by the Web service client;

[0030] Step 52: The Web service security device (for example, the client sends an intercepting module) encrypts the request message (for example, applies for an authentication code from the authentication server and matches the authentication code to the request message) to obtain an encrypted message , and send the encrypted message to the Web service server;

[0031]Step 53: Web service safety device (for example, server receiving interception module) receives encrypted message (in actual application, encrypted ...

Embodiment 2

[0034] Image 6 It is a flowchart of Embodiment 2 of the network authentication service method of the present invention, and this embodiment includes:

[0035] Step 60: The Web service client sends a SOAP request message.

[0036] Step 61: The client sends the interception module (client OutHandler) to intercept the received request message. According to the regulations of WS-Security, the request message includes a message body and a message header, and the message header includes information such as a user account configured by the client. Interception can be implemented on the Web service client through configuration, such as by registering the OutHandler service in the Web service. When the Web service client sends a SOAP request message to the Web service server, the client OutHandler will implement interception according to the configuration file. this request message. The OutHandler service pre-processes the SOAP request message sent by the client, adds WS-Security i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention embodiment relates to system and method for network authentication service. The network authentication service system is used in network application layer, which includes network service safety device for holding up interactive packet of network application layer and executing authentication process for the packet. The network authentication service method includes holding up interactive packet of network application layer and executing authentication process for the packet. Transmitted packet can be executed safe process by the invention embodiment, and safe authentication modus is variety.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a network authentication service system and method. Background technique [0002] With the continuous development of network (Web) services from technical concepts to practical applications, Web services will be an extremely important model of future application architecture. Web service is independent of language and platform, so its advantages become more and more obvious when linking applications across enterprises and across the Internet. Web services use Extensible Markup Language (Extensible Markup Language, hereinafter referred to as XML) for data exchange. By default, XML is encoded in plain text; at the same time, most Web services use Hypertext Transfer Protocol (Hypertext Transfer Protocol, hereinafter referred to as HTTP ) As a transmission protocol, HTTP also uses plain text to transmit data, which causes unencrypted information to be transmitted on an unencrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/12
Inventor 郑洪伟
Owner ZHEJIANG 1ONE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products