Disclosure of Invention
In order to ensure the safety of a user accessing a protected application through a mobile network environment, the application provides a method, a system and a medium for safely accessing the protected application through the mobile network environment.
In a first aspect, the present application provides a method for securely accessing a protected application in a mobile network environment, which adopts the following technical scheme:
A secure access protected application method for mobile network environment is applied to an IPv6 stealth access soft terminal, and comprises the following steps:
Receiving a first user identity certificate and a data certificate distributed by an IPv6 stealth communication management platform, wherein the first user identity certificate comprises an organization name, a user name and an identity certificate private key, and the data certificate is used for generating an encrypted IPv6 address and encrypting a transmission message when in IPv6 stealth secure communication;
After an application access request is detected, initializing/verifying operation is carried out on the user information based on the application access request and a first user identity certificate, so that the user information after the initializing/verifying operation is obtained;
determining an IPv6 prefix corresponding to the IPv6 stealth protection application gateway;
Performing dynamic encryption calculation on the IPv6 prefix, the data certificate, the application ID corresponding to the protected application and the current timestamp according to a dynamic DNS module to obtain an encrypted IPv6 address, and packaging the encrypted IPv6 address in an AAAA record of DNS to return to the user application;
When a user accesses the encrypted IPv6 address, encrypting the data load in the transmission message according to the encrypted IPv6 address and the data certificate to obtain an encrypted IPv6 message;
and sending the encrypted IPv6 message to an IPv6 stealth protection application gateway through an IPv6 network.
By adopting the technical scheme, when a user accesses a protected application through a mobile network environment, a first user identity certificate and a data certificate distributed by an IPv6 stealth communication management platform are received, wherein the first user identity certificate comprises an organization name, a user name and an identity certificate private key, the data certificate is used for generating an encrypted IPv6 address and encrypting a transmission message when in IPv6 stealth safety communication, after an application access request is detected, the user information is initialized/verified based on the application access request and the first user identity certificate, the initialized/verified user information is obtained, then an IPv6 prefix corresponding to the IPv6 stealth protection application gateway is determined, dynamic encryption calculation is carried out on the IPv6 prefix, the data certificate, an application ID corresponding to the protected application and a current time stamp according to a dynamic DNS module, the encrypted IPv6 address is obtained, the encrypted IPv6 address is packaged in an AAAA record of a DNS, after the user accesses the encrypted IPv6 address, the user information is initialized/verified based on the application access request and the first user identity certificate, the user information can be encrypted by the IPv6 address and the IPv6 data is transmitted to the protected by the protection gateway through the encrypted network gateway, and the encrypted message can be encrypted by the protection network 6. And the middle communication access process can not be scanned, can not be sniffed and can not restore the content, thereby improving the security of the mobile network environment for accessing the protected application.
In one possible implementation manner, the initializing/verifying operation on the user information based on the application access request and the first user identity certificate, to obtain the user information after the initializing/verifying operation, includes:
Detecting whether an access application corresponding to the application access request is a protected application, if so, carrying out non-empty monitoring on the first user identity certificate, determining whether the first user identity certificate is empty, and when the first user identity certificate is not empty, determining whether a user corresponding to the IPv6 stealth access soft terminal is an initial user, and when the user is the initial user, carrying out initialization/verification operation on user information according to the first user identity certificate to obtain user information after the initialization/verification operation;
If the user is not the initial user, generating user authentication information, and sending the user authentication information to the user for authentication operation.
In one possible implementation manner, the initializing/verifying operation is performed on the user information according to the first user identity certificate, so as to obtain the user information after the initializing/verifying operation, including:
Determining an associated organization, verifying a user name and a user password according to the user information;
Checking whether an organization name corresponding to the association organization corresponds to an organization name in the first user identity certificate, if so, determining a mapping relation between the organization name and the user name based on the first user identity name, and performing secondary checking on the verification user name according to the mapping relation to determine whether the verification user name belongs to the organization name;
If the verification user name belongs to the organization name, performing enhanced verification processing on the user, and extracting preset appointed information of an identity certificate private key in the first user identity certificate to perform digital signature after the user passes the enhanced verification processing;
And checking the digital signature for three times, determining whether the digital signature has timeliness, if so, acquiring a control access rule, determining whether a user corresponding to the application access request has permission parameters for accessing the protected application or not based on the control access rule, and if so, performing initialization/verification operation through the user information to obtain the user information after the initialization/verification operation, wherein the control access rule is a rule for designating the protected application for controlling the user access of different identity information.
In one possible implementation manner, the detecting whether the access application corresponding to the application access request is a protected application includes:
and if the access application corresponding to the application access request is not the protected application, directly forwarding the message in the application access request to the corresponding access application.
In one possible implementation manner, the performing a secondary verification on the verification user name according to the mapping relationship, and determining whether the verification user name belongs to the organization name includes:
and if the verification user name does not belong to the organization name, generating identity abnormal information, and controlling and displaying the identity abnormal information.
In a second aspect, the present application provides a method for safely accessing a protected application in a mobile network environment, which adopts the following technical scheme:
a secure access protected application method for mobile network environment is applied to an IPv6 stealth protection application gateway, and comprises the following steps:
Receiving an encrypted IPv6 message sent by the IPv6 stealth access soft terminal, wherein the encrypted IPv6 message is obtained by receiving a first user identity certificate and a data certificate distributed by the IPv6 stealth communication management platform, the first user identity certificate comprises an organization name, a user name and an identity certificate private key, the data certificate is used for generating an encrypted IPv6 address and encrypting a transmission message when in IPv6 stealth secure communication, after an application access request is detected, initializing/verifying operation is carried out on user information based on the application access request and the first user identity certificate to obtain user information after the initialization/verifying operation, an IPv6 prefix corresponding to the IPv6 stealth protection application gateway is determined, dynamic encryption calculation is carried out on the IPv6 prefix, the data certificate, an application ID corresponding to the protected application and a current timestamp according to a dynamic DNS module to obtain the encrypted IPv6 address, the encrypted IPv6 address is packaged in an AAAA record to the user IPv6 address, and the obtained data message is encrypted according to the obtained IPv6 address when the data address is transmitted to the DNS access certificate;
determining a target IPv6 address according to the IPv6 message, and carrying out information restoration on parameters in the target IPv6 address based on the cryptography algorithm to obtain message recording parameters;
checking the different types of parameters in the message recording parameters one by one, judging whether the parameters do not meet the preset standard, and discarding the IPv6 message if the parameters do not meet the preset standard;
If the IPv6 message does not exist, decrypting the data load in the IPv6 message based on a preset data certificate to obtain a decrypted IPv6 message;
and sending the decrypted IPv6 message to the protected application.
By adopting the technical scheme, after the IPv6 stealth protection application gateway receives the IPv6 message sent by the IPv6 stealth access soft terminal, determining a target IPv6 address according to the IPv6 message, restoring the parameters in the target IPv6 address based on the cryptography algorithm to obtain the message recording parameters, checking the different types of parameters in the message recording parameters one by one, judging whether the parameters do not meet the preset standard, discarding the IPv6 message if the parameters do not meet the preset standard, decrypting the data load in the IPv6 message based on the preset data certificate if the parameters do not meet the preset standard, obtaining the decrypted IPv6 message, and then sending the decrypted IPv6 message to the protected application, thereby improving the safety of the access protected application through double decryption and checking of the IPv6 stealth protection application gateway.
In one possible implementation manner, the sending the decrypted IPv6 packet to the protected application further includes:
Judging whether the protected application has an IPv6 address, if so, modifying the source address of the decrypted IPv6 message into the IPv6 address of the IPv6 stealth protection application gateway and modifying the target address of the decrypted IPv6 message into the IPv6 address of the protected application;
If the protected application does not have the IPv6 address, translating the decrypted IPv6 message into an IPv4 message, modifying the source address of the IPv4 message into the IPv4 address of the IPv6 stealth protection application gateway, and modifying the target address of the IPv4 message into the IPv4 address of the protected application.
In a third aspect, the present application provides a mobile network environment security access protected application system, which adopts the following technical scheme:
A mobile network environment secure access protected application system for IPv6 stealth access soft terminals, comprising:
the system comprises a certificate receiving module, a data transmitting module and a data receiving module, wherein the certificate receiving module is used for receiving a first user identity certificate and a data certificate which are distributed by an IPv6 stealth communication management platform, the first user identity certificate comprises an organization name, a user name and an identity certificate private key, and the data certificate is used for generating an encrypted IPv6 address and encrypting a transmission message during IPv6 stealth safety communication;
The information initialization module is used for initializing/verifying the user information based on the application access request and the first user identity certificate after the application access request is detected, so as to obtain the user information after the initialization/verifying operation;
the prefix determining module is used for determining an IPv6 prefix corresponding to the IPv6 stealth protection application gateway;
The dynamic DNS module is used for carrying out dynamic encryption calculation on the IPv6 prefix, the data certificate, the application ID corresponding to the protected application and the current timestamp according to the dynamic DNS module to obtain an encrypted IPv6 address, and packaging the encrypted IPv6 address in an AAAA record of the DNS to return to the user application;
The message encryption module is used for encrypting the data load in the transmission message according to the encrypted IPv6 address and the data certificate when the user accesses the encrypted IPv6 address, so as to obtain an encrypted IPv6 message;
and the message sending module is used for sending the encrypted IPv6 message to an IPv6 stealth protection application gateway through an IPv6 network.
In a fourth aspect, the present application provides a mobile network environment security access protected application system, which adopts the following technical scheme:
A mobile network environment secure access protected application system for an IPv6 stealth protection application gateway, comprising:
The message receiving module is used for receiving an encrypted IPv6 message sent by the IPv6 stealth access soft terminal, wherein the encrypted IPv6 message is obtained by receiving a first user identity certificate and a data certificate distributed by the IPv6 stealth communication management platform, the first user identity certificate comprises an organization name, a user name and an identity certificate private key, the data certificate is used for generating an encrypted IPv6 address and encrypting the transmission message when the IPv6 stealth secure communication is carried out, after an application access request is detected, the user information is initialized or verified based on the application access request and the first user identity certificate, the user information after the initialization or verification operation is obtained, an IPv6 prefix corresponding to the IPv6 stealth protection application gateway is determined, dynamic encryption calculation is carried out on the IPv6 prefix, the data certificate, an application ID corresponding to the protected application and a current timestamp according to the dynamic DNS module, the encrypted IPv6 address is obtained, the encrypted 6 address is packaged in the IPv6 address, after the user access request is recorded in the IPv6 address, and the encrypted data is transmitted according to the encrypted data address after the encrypted data is recorded in the IPv6 address, and the encrypted data is obtained after the encrypted data is transmitted;
The information restoration module determines a target IPv6 address according to the IPv6 message, and performs information restoration on parameters in the target IPv6 address based on the cryptography algorithm to obtain message recording parameters;
The message discarding module is used for checking the parameters of different types in the message recording parameters one by one, judging whether the parameters do not meet the preset standard, and discarding the IPv6 message if the parameters do not meet the preset standard;
The message decryption module is used for decrypting the data load in the IPv6 message based on a preset data certificate to obtain a decrypted IPv6 message when the condition that the preset standard condition is not met does not exist;
and the application access module is used for sending the decrypted IPv6 message to the protected application.
In a fifth aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
a computer readable storage medium storing a computer program capable of being loaded by a processor and executing the method according to any one of the first or second aspects.
In summary, the present application includes at least one of the following beneficial technical effects:
1. By adopting the technical scheme, when a user accesses a protected application through a mobile network environment, a first user identity certificate and a data certificate distributed by an IPv6 stealth communication management platform are received, wherein the first user identity certificate comprises an organization name, a user name and an identity certificate private key, the data certificate is used for generating an encrypted IPv6 address and encrypting a transmission message when in IPv6 stealth safety communication, after an application access request is detected, the user information is initialized/verified based on the application access request and the first user identity certificate, the user information after the initialization/verification operation is obtained, then a user prefix corresponding to an IPv6 stealth protection application gateway is determined, dynamic encryption calculation is carried out on the IPv6 prefix, the data certificate, an application ID corresponding to the protected application and a current timestamp according to a dynamic DNS module, the encrypted IPv6 address is obtained, the encrypted IPv6 address is packaged in an IPv6 AA record of a DNS, when the user accesses the encrypted IPv6 address, the user information is initialized/verified based on the application access request and the first user identity certificate, the user information is encrypted, the user information is obtained, the user information is then the IPv6 is encrypted through the protection gateway, and the IPv6 is encrypted by the protection gateway, and the user can be protected by the network, and the protection gateway. The middle communication access process cannot be scanned, cannot be sniffed and cannot restore the content, so that the safety of the mobile network environment for accessing the protected application is improved;
2. By adopting the technical scheme, after the IPv6 stealth protection application gateway receives the IPv6 message sent by the IPv6 stealth access soft terminal, determining a target IPv6 address according to the IPv6 message, restoring the parameters in the target IPv6 address based on a cryptography algorithm to obtain the message recording parameters, checking the different types of parameters in the message recording parameters one by one, judging whether the parameters do not meet the preset standard, discarding the IPv6 message if the parameters do not meet the preset standard, decrypting the data load in the IPv6 message based on the preset data certificate if the parameters do not meet the preset standard, obtaining the decrypted IPv6 message, and then sending the decrypted IPv6 message to the protected application, thereby improving the safety of accessing the protected application through double decryption and checking of the IPv6 stealth protection application gateway.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings 1 to 4 and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
First, terms of the embodiments of the present application will be explained:
The IPv6 stealth access soft terminal is a network device, performs user identity verification on a user to access the protected application, performs dynamic processing of an IPv6 address and encryption processing of a message load on traffic accessing the protected application after the user identity verification is passed, and sends the traffic to an IPv6 stealth protection application gateway of a target.
The IPv6 stealth protection application gateway is a network device, which issues dynamic IPv6 addresses for protected applications, receives access traffic from an IPv6 stealth access soft terminal, and discards traffic failing verification. For legal access requests from the IPv6 stealth access soft terminal, the IPv6 stealth protection application gateway forwards the legal access requests to the corresponding application server.
The embodiment of the application discloses a mobile network environment security access protected application method based on an IPv6 stealth access soft terminal side.
Referring to fig. 1, a method for a mobile network environment to safely access a protected application is applied to an IPv6 stealth access soft terminal, and includes:
Step S101, a first user identity certificate and a data certificate distributed by an IPv6 stealth communication management platform are received.
The first user identity certificate comprises an organization name, a user name and an identity certificate private key, and the data certificate is used for generating an encrypted IPv6 address and encrypting a transmission message during IPv6 stealth safety communication;
For the embodiment of the application, when the mobile network environment is used for safely accessing the protected application, the IPv6 stealth communication management platform is used for acquiring user identity information in advance and generating identity certificates of different users based on the user identity information, wherein the identity certificates comprise an organization name, a user name, an identity certificate public key and an identity certificate private key, then a first user identity certificate and a second identity certificate are determined according to the identity certificates, wherein the first user identity certificate comprises the organization name, the user name and the identity certificate private key, the second identity certificate comprises the organization name, the user name and the identity certificate public key, then an encrypted IPv6 address and a data certificate for encrypting a transmission message are generated when each user in the identity certificates is associated for IPv6 stealth safety communication, and finally the first user identity certificate and the data certificate are sent to the IPv6 stealth access soft terminal.
After the IPv6 stealth communication management platform generates a first user identity certificate and a second user identity certificate, the second user identity certificate is sent to the IPv6 stealth protection application gateway, and the first user identity certificate is sent to the IPv6 stealth access soft terminal in a hardware or software mode, wherein the hardware sending mode comprises a U shield, and the software sending mode comprises an encrypted password package.
For the embodiment of the application, the data certificate is a data certificate which is created by the IPv6 stealth communication management platform for the soft terminal user and used for safety communication, and the created data certificate is sent to the IPv6 stealth access soft terminal in a line form for certificate synchronization.
Step S102, after detecting the application access request, initializing/verifying the user information based on the application access request and the first user identity certificate to obtain the user information after the initializing/verifying operation.
Specifically, in the process of initializing/verifying user information, detecting whether an access application corresponding to an application access request is a protected application, if so, performing non-empty monitoring on a first user identity certificate, determining whether the first user identity certificate is empty, when the first user identity certificate is not empty, determining whether a user corresponding to the user IPv6 stealth application is an initial user, and when the user is the initial user, performing initializing/verifying operation on the user information according to the first user identity certificate, if not, generating user verifying information, and sending the user verifying information to the user for verifying operation, thereby obtaining the user information after the initializing/verifying operation.
The specific initialization/verification operation comprises the steps of determining an associated organization, verifying a user name and a user password according to user information, checking whether an organization name corresponding to the associated organization corresponds to an organization name in a first user identity certificate, determining a mapping relation between the organization name and the user name based on the first user identity name if the organization name corresponds to the organization name, performing secondary verification on the verified user name according to the mapping relation, determining whether the verified user name belongs to the organization name, performing enhanced verification processing on the user if the verified user name belongs to the organization name, extracting preset appointed information of an identity certificate private key in the first user identity certificate to perform digital signature after the user passes the enhanced verification processing, performing tertiary verification on the digital signature, determining whether the digital signature has timeliness or not, acquiring a control access rule if the digital signature has the timeliness, determining whether a user corresponding to an application access request has authority parameter of accessing a protected application or not based on the control access rule, synchronizing the user password according to the user password after the synchronization of the hash value, associating organization and the verified user name, obtaining user information after initialization/verification operation, and controlling the access rule to be the appointed access rule of the user with different identity certificates.
Step S103, determining the IPv6 prefix corresponding to the IPv6 stealth protection application gateway.
Step S104, carrying out dynamic encryption calculation on the IPv6 prefix, the data certificate, the application ID corresponding to the protected application and the current timestamp according to the dynamic DNS module to obtain an encrypted IPv6 address, and packaging the encrypted IPv6 address in an AAAA record of the DNS to return to the user application.
Specifically, for IPv4 applications, it is necessary to configure both an a record and an AAAA record for access by IPv4 terminals and IPv6 terminals in a mobile network. The A record is a real application IPv4 address, and the AAAA record is comprehensively calculated by (IPv 6 prefix of an application associated IPv6 stealth application gateway, safety communication data certificate of a user, application ID and timestamp), dynamically changes, is different for each user, and is updated every short time. For the IPv6 application, only the AAAA record is configured, and the generation manner is the same as that of the above-mentioned IPv4 terminal AAAA record, which is not described herein.
The specific calculation mode is that the hash function is used for carrying out hash processing on different parameters to generate a unique hash value, namely an AAAA record. And determining a corresponding target IPv6 address according to the A record of the IPv4 application configuration, the AAAA record and the AAAA record of the IPv6 application configuration.
Step S105, when the user accesses the encrypted IPv6 address, the data load in the transmission message is encrypted according to the encrypted IPv6 address and the data certificate, and the encrypted IPv6 message is obtained.
And step S106, the encrypted IPv6 message is sent to the IPv6 stealth protection application gateway through the IPv6 network.
In the above embodiment, when a user accesses a protected application through a mobile network environment, a first user identity certificate and a data certificate distributed by an IPv6 stealth communication management platform are received, wherein the first user identity certificate includes an organization name, a user name and an identity certificate private key, the data certificate is used for generating an encrypted IPv6 address and encrypting a transmission message when in IPv6 stealth secure communication, after an application access request is detected, initializing/verifying operation is performed on user information based on the application access request and the first user identity certificate to obtain user information after the initializing/verifying operation, then an IPv6 prefix corresponding to an IPv6 stealth protection application gateway is determined, dynamic encryption calculation is performed on the IPv6 prefix, the data certificate, an application ID corresponding to the protected application and a current timestamp according to a dynamic DNS module to obtain an encrypted IPv6 address, the encrypted IPv6 address is encapsulated in a DNS IPv6 address record, when the user accesses the encrypted IPv6 address, the user information is initialized/verified based on the application access request and the first user identity certificate, the encrypted IPv6 address is transmitted to the user IPv6 address through the encrypted network protection gateway, and the encrypted network 6 IPv6 message is encrypted after the user access request is performed, and the network protection gateway is enabled to obtain the encrypted 6 IPv6 message. And the middle communication access process can not be scanned, can not be sniffed and can not restore the content, thereby improving the security of the mobile network environment for accessing the protected application.
In one possible implementation manner of the embodiment of the application, detecting whether the access application corresponding to the application access request is a protected application includes directly forwarding the message in the application access request to the corresponding access application if the access application corresponding to the application access request is not the protected application.
In one possible implementation manner of the embodiment of the application, the verification user name is checked for the second time according to the mapping relation to determine whether the verification user name belongs to the organization name, and the method comprises the steps of generating identity abnormality information and controlling to display the identity abnormality information if the verification user name does not belong to the organization name.
In an embodiment of the application, it is predetermined which users have access to which applications in the protected. The rules can be manually written into the IPv6 stealth access soft terminal and the IPv6 stealth protection application gateway, and can also be issued by an IPv6 communication authorization component of the IPv6 stealth communication management platform.
Referring to fig. 2, the embodiment of the present application also discloses a mobile network environment security access protected application system 20 based on the initiator IPv6 stealth access soft terminal side.
A mobile network environment secure access protected application system 20 for IPv6 stealth access soft terminals, comprising:
The certificate receiving module 21 is configured to receive a first user identity certificate and a data certificate, which are distributed by the IPv6 stealth communication management platform, where the first user identity certificate includes an organization name, a user name, and an identity certificate private key, and the data certificate is configured to generate an encrypted IPv6 address and encrypt a transmission message during IPv6 stealth secure communication;
The information initialization module 22 is configured to perform an initialization/verification operation on the user information based on the application access request and the first user identity certificate after detecting the application access request, so as to obtain user information after the initialization/verification operation;
a prefix determining module 23, configured to determine an IPv6 prefix corresponding to the IPv6 stealth protection application gateway;
the dynamic DNS module 24 is configured to perform dynamic encryption calculation on the IPv6 prefix, the data certificate, the application ID corresponding to the protected application, and the current timestamp according to the dynamic DNS module, obtain an encrypted IPv6 address, and encapsulate the encrypted IPv6 address in an AAAA record of DNS to return to the user application;
the message encrypting module 25 is configured to encrypt a data load in the transmission message according to the encrypted IPv6 address and the data certificate when the user accesses the encrypted IPv6 address, so as to obtain an encrypted IPv6 message;
the message sending module 26 is configured to send the encrypted IPv6 message to the IPv6 stealth protection application gateway through the IPv6 network.
The mobile network environment security access protected application system based on the IPv6 stealth access soft terminal side can realize any one of the mobile network environment security access protected application methods based on the IPv6 stealth access soft terminal side, and the specific working process of each module in the mobile network environment security access protected application system can refer to the corresponding process in the method embodiment.
The embodiment of the application also discloses a mobile network environment security access protected application method based on the IPv6 stealth protection application gateway side.
Referring to fig. 3, a method for safely accessing a protected application in a mobile network environment is applied to an IPv6 stealth protection application gateway, and includes:
Step S301, an encrypted IPv6 message sent by the IPv6 stealth access soft terminal is received.
The encrypted IPv6 message is obtained by receiving a first user identity certificate and a data certificate distributed by an IPv6 stealth communication management platform, wherein the first user identity certificate comprises an organization name, a user name and an identity certificate private key, the data certificate is used for generating an encrypted IPv6 address and encrypting a transmission message when in IPv6 stealth safety communication, after an application access request is detected, initializing/verifying operation is carried out on user information based on the application access request and the first user identity certificate, the user information after the initializing/verifying operation is obtained, an IPv6 prefix corresponding to an IPv6 stealth protection application gateway is determined, dynamic encryption calculation is carried out on the IPv6 prefix, the data certificate, an application ID corresponding to a protected application and a current time stamp according to a dynamic DNS module, the encrypted IPv6 address is obtained, the encrypted IPv6 address is packaged in an AAAA record of the DNS, when the user accesses the encrypted IPv6 address, the obtained IPv6 address and the data load in the transmission message is encrypted according to the encrypted IPv6 address and the data certificate, and the obtained IPv6 address is encrypted to the encrypted message.
Step S302, determining a target IPv6 address according to the IPv6 message, and carrying out information restoration on parameters in the target IPv6 address based on a cryptography algorithm to obtain message recording parameters.
For the embodiment of the application, the cryptography algorithm is a digital signature algorithm, and in the application, the target IPv6 address is calculated by the digital signature algorithm, so that the original parameters in the target IPv6 address can be restored by carrying out reverse deduction through the digital signature algorithm, thereby obtaining the message recording parameters, and further carrying out the authenticity verification on the target IPv6 address.
Step S303, checking the different types of parameters in the message recording parameters one by one, judging whether the parameters do not meet the preset standard, and discarding the IPv6 message if the parameters do not meet the preset standard.
Specifically, the preset standard is a reference value standard for different types of parameters in the message recording parameters, that is, the different types of parameters in the message recording parameters need to be matched with the parameters in the preset standard, so that the parameters in the preset standard are not only met, but also the type parameter value in the message recording parameters needs to be ensured to be met with the reference value corresponding to the parameter type.
Step S304, if not, decrypting the data load in the IPv6 message based on the preset data certificate to obtain the decrypted IPv6 message.
Specifically, the preset data certificate is a certificate created by the IPv6 stealth communication management platform for each user needing to access the protected application, and is pre-configured in the IPv6 stealth access soft terminal and the IPv6 stealth protection application gateway after being created, and encrypts an IPv6 address and a data load in a message generated during IPv6 secure communication.
Step S305, the decrypted IPv6 message is sent to the protected application.
In the embodiment of the application, the IPv6 gateway of the initiator decrypts the IPv6 message through the encryption algorithm and the secret key in the secure communication information, so that the encrypted IPv6 message is changed into an unreadable form, and only a receiver with the correct secret key can decrypt and read the message content.
In the above embodiment, after the IPv6 stealth protection application gateway receives the IPv6 message sent from the IPv6 stealth access soft terminal, determining a target IPv6 address according to the IPv6 message, restoring the parameters in the target IPv6 address based on a cryptographic algorithm to obtain a message recording parameter, then checking the different types of parameters in the message recording parameter one by one, judging whether the parameters do not meet the preset standard, if yes, discarding the IPv6 message, if not, decrypting the data load in the IPv6 message based on the preset data certificate, to obtain a decrypted IPv6 message, and then sending the decrypted IPv6 message to the protected application, thereby improving the security of accessing the protected application through double decryption and checking of the IPv6 stealth protection application gateway.
In one possible implementation manner of the embodiment of the application, the method includes the steps of sending the decrypted IPv6 message to the protected application, judging whether the protected application has an IPv6 address, if so, modifying the source address of the decrypted IPv6 message into the IPv6 address of the IPv6 stealth protection application gateway and modifying the destination address of the decrypted IPv6 message into the IPv6 address of the protected application, and if not, translating the decrypted IPv6 message into an IPv4 message, and modifying the source address of the IPv4 message into the IPv4 address of the IPv6 stealth protection application gateway and modifying the destination address of the IPv4 message into the IPv4 address of the protected application.
Referring to fig. 4, the embodiment of the present application also discloses a mobile network environment security access protected application system 40 based on the receiver IPv6 gateway side.
A mobile network environment secure access protected application system 40 for use in an IPv6 stealth protection application gateway, comprising:
The message receiving module 41 is configured to receive an encrypted IPv6 message sent from an IPv6 stealth access soft terminal, where the encrypted IPv6 message is obtained by receiving a first user identity certificate and a data certificate distributed by the IPv6 stealth communication management platform, where the first user identity certificate includes an organization name, a user name, and an identity certificate private key, the data certificate is used to generate an encrypted IPv6 address and encrypt the transmission message when the IPv6 stealth secure communication is performed, after an application access request is detected, initialize or verify the user information based on the application access request and the first user identity certificate, obtain user information after the initialization or verify operation, determine an IPv6 prefix corresponding to the IPv6 stealth protection application gateway, dynamically encrypt and calculate the IPv6 prefix, the data certificate, an application ID corresponding to the protected application, and a current timestamp according to the dynamic DNS module, obtain an encrypted IPv6 address, and encapsulate the encrypted IPv6 address in an AAAA record, and, when the user accesses the encrypted IPv6 address and the data certificate are transmitted, and the encrypted data message is obtained;
The information restoration module 42 determines a target IPv6 address according to the IPv6 message, and performs information restoration on parameters in the target IPv6 address based on a cryptography algorithm to obtain message recording parameters;
The message discarding module 43 is configured to check the different types of parameters in the message recording parameters one by one, determine whether there is a condition that the parameters do not meet the preset standard, and discard the IPv6 message if there is the condition;
the message decryption module 44 is configured to decrypt, based on a preset data certificate, the data payload in the IPv6 message to obtain a decrypted IPv6 message when there is no condition that does not meet the preset standard;
and the application access module 45 is used for sending the decrypted IPv6 message to the protected application.
In the embodiment, the security verification flow is optimized, encryption and decryption operations are simplified, meanwhile, the terminal is allowed to rapidly process and forward legal messages, the communication security is improved, meanwhile, the consumption of system resources is reduced, and the forwarding performance of the whole system is improved.
The mobile network environment security access protected application system based on the IPv6 stealth protection application gateway side can realize any one of the above-mentioned mobile network environment security access protected application methods based on the IPv6 stealth protection application gateway side, and the specific working process of each module in the mobile network environment security access protected application system can refer to the corresponding process in the above-mentioned method embodiment.
In several embodiments provided by the present application, it should be understood that the methods and systems provided may be implemented in other ways. For example, the system embodiments described above are merely illustrative, e.g., the partitioning of a module is merely a logical function partitioning, and there may be additional partitioning in actual implementation, e.g., multiple modules may be combined or integrated into another system, or some features may be omitted, or not performed.
The embodiment of the application also discloses a computer readable storage medium.
A computer readable storage medium storing a computer program capable of being loaded by a processor and executing any one of the methods of secure access protected application in a mobile network environment as described above.
Wherein the computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device, the program code contained on the computer readable medium can be transmitted over any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In the foregoing embodiments, the descriptions of the embodiments are focused on, and for those portions of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
The foregoing description of the preferred embodiments of the application is not intended to limit the scope of the application in any way, including the abstract and drawings, in which case any feature disclosed in this specification (including abstract and drawings) may be replaced by alternative features serving the same, equivalent purpose, unless expressly stated otherwise. That is, each feature is one example only of a generic series of equivalent or similar features, unless expressly stated otherwise.