[go: up one dir, main page]

WO2025045112A1 - Private network security authentication method, apparatus and system, and electronic device, storage medium and computer program product - Google Patents

Private network security authentication method, apparatus and system, and electronic device, storage medium and computer program product Download PDF

Info

Publication number
WO2025045112A1
WO2025045112A1 PCT/CN2024/115281 CN2024115281W WO2025045112A1 WO 2025045112 A1 WO2025045112 A1 WO 2025045112A1 CN 2024115281 W CN2024115281 W CN 2024115281W WO 2025045112 A1 WO2025045112 A1 WO 2025045112A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
user information
information
sim card
private network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/CN2024/115281
Other languages
French (fr)
Chinese (zh)
Inventor
庄严
蒋周良
张燕平
熊中芝
童安璐
吴锦涛
陈澎聪
李卫
毋挺
林翔
马晓凯
柯晓程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Internet Co Ltd filed Critical China Mobile Communications Group Co Ltd
Publication of WO2025045112A1 publication Critical patent/WO2025045112A1/en
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Definitions

  • the present application relates to the field of communication technology, and in particular to a private network security authentication method, device and system, electronic equipment, storage medium and computer program product.
  • the current 5G private network construction plan relies on the operator's core network and base stations. Terminal access is activated by the operator, and data contracts are configured on the operator side. For industry users, it is impossible to independently manage users' access rights to access business systems through 5G private networks.
  • the present application provides a private network security authentication method, device and system, electronic device, storage medium and computer program product.
  • the technical solution of the present application is as follows:
  • an embodiment of the present application provides a private network security authentication method, which is applied to a subscriber identity module (SIM) card, comprising:
  • the step before responding to triggering the card information reporting operation, the step includes:
  • An event that the first terminal passes the first network access authentication is monitored, triggering a card information reporting operation.
  • sending the first data SMS to the service system through the SMS gateway includes:
  • Reading card information and assembling the card information into a response data packet of the first data SMS;
  • a response data packet of the first data SMS is sent to the business system through the SMS gateway.
  • the receiving a second data SMS sent by the business system through the SMS gateway, and acquiring and storing user information based on the second data SMS includes:
  • sending the user information to the first terminal includes:
  • Reading user information and encrypting the user information to obtain a ciphertext of the user information
  • the user information ciphertext is sent to the first terminal through the secure access channel.
  • the response data packet includes a card application main version number, a security parameter identifier, an application response data packet, and a media access control (MAC) address
  • the application response data packet includes the card information
  • the security parameter identifier includes an encryption identifier and an environment identifier.
  • storing the user information includes:
  • the user information is stored in the secure storage space of the SIM card.
  • an embodiment of the present application provides a private network security authentication method, the method is applied to a first terminal, the first terminal includes a SIM card; the method includes:
  • the user information sent by the SIM card is received, and first information is sent to the service system through the gateway device, and based on the user information in the first information, the service system is requested to perform identity authentication on the first terminal user.
  • the process before sending the intranet application access request to the private network, the process includes:
  • the first terminal sends an access request to the private network, where the access request instructs the private network to verify the authority of the first terminal.
  • the method further includes:
  • an embodiment of the present application provides a private network security authentication method, which is applied to a gateway device and includes:
  • an embodiment of the present application provides a private network security authentication method, which is applied to a business system in a private network, including:
  • an embodiment of the present application provides a private network security authentication system, including a SIM card, a first terminal where the SIM card is located, a short message gateway, a gateway device, and a service system.
  • the SIM card is configured to execute the private network security authentication method according to the first aspect
  • the first terminal where the SIM card is located is configured to execute the private network security authentication method described in the second aspect
  • the gateway device is configured to execute the private network security authentication method according to the third aspect
  • the business system is configured to execute the private network security authentication method described in the fourth aspect.
  • an embodiment of the present application provides a private network security authentication device, the device being configured on a SIM card, comprising:
  • the card information reporting module is further configured to receive a second data SMS sent by the business system through the SMS gateway, and obtain and store user information based on the second data SMS; wherein the user information includes a mobile phone number;
  • the first transceiver module is configured to receive a first instruction sent by a first terminal where the SIM card is located, and send the user information to the first terminal, so that the first terminal requests the service system to perform identity authentication on the first terminal user based on the user information; wherein the first instruction instructs to obtain the user information.
  • the card information reporting module is further configured to:
  • An event that the first terminal passes the first network access authentication is monitored, triggering a card information reporting operation.
  • the card information reporting module is configured to:
  • Reading card information and assembling the card information into a response data packet of the first data SMS;
  • a response data packet of the first data SMS is sent to the business system through the SMS gateway.
  • the card information reporting module is configured to:
  • the first transceiver module is configured to:
  • Reading user information and encrypting the user information to obtain a ciphertext of the user information
  • the user information ciphertext is sent to the first terminal through the secure access channel.
  • the response data packet includes a card application major version number, a security parameter identifier, an application response data packet and a MAC address
  • the application response data packet includes the card information
  • the security parameter identifier includes an encryption identifier and an environment identifier.
  • the card information reporting module is configured to:
  • the user information is stored in the secure storage space of the SIM card.
  • an embodiment of the present application provides a private network security authentication device, the device being configured in a first terminal, the first terminal including a SIM card, including:
  • a second transceiver module is configured to send an intranet application access request to the private network, wherein the intranet application access request indicates access to a business system;
  • the second transceiver module is further configured to receive an identity authentication link redirected by a gateway device, and send a first instruction to the SIM card based on the identity authentication link, wherein the first instruction instructs to obtain user information, the user information is sent to the SIM card by the service system based on the card information reported by the SIM card, and the user information includes a mobile phone number;
  • the second transceiver module is further configured to receive the user information sent by the SIM card, send first information to the service system through the gateway device, and request the service system to perform identity authentication on the first terminal user based on the user information in the first information.
  • the second transceiver module is further configured to:
  • the first terminal Before sending an intranet application access request to the private network, the first terminal sends an access request to the private network, where the access request instructs the private network to verify the authority of the first terminal.
  • the second transceiver module is further configured to:
  • an embodiment of the present application provides a private network security authentication device, the device being configured in a gateway device, including:
  • the access gateway module is configured to intercept an intranet application access request sent by a first terminal to a private network, and redirect an identity authentication link to the first terminal; wherein the first terminal includes a SIM card, and the intranet application access request indicates access to a service system;
  • the control center module is configured to receive the first information sent by the first terminal and send the first information to the business system, wherein the first information includes user information, and the user information is sent to the SIM card by the business system based on the card information reported by the SIM card, and the user information includes a mobile phone number, and the user information is used by the first terminal to request the business system to authenticate the first terminal user.
  • an embodiment of the present application provides a private network security authentication device, wherein the device is configured in a business system within the private network, including:
  • a third transceiver module is configured to receive a first data SMS sent by the SIM card through the SMS gateway, wherein the first data SMS includes card information;
  • a processing module configured to obtain the mobile phone number and the card information corresponding to the SIM card based on the first data SMS, and record the binding relationship between the card information and the mobile phone number;
  • the third transceiver module is further configured to send a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes the mobile phone number;
  • the identity authentication module is configured to receive first information sent by the first terminal where the SIM card is located through the gateway device, and perform identity authentication on the first terminal user based on the user information in the first information.
  • an embodiment of the present application provides an electronic device, comprising: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can execute the private network security authentication method described in any one of the embodiments of the first to fourth aspects of the present application.
  • an embodiment of the present application provides a non-transitory computer-readable storage medium storing computer instructions, wherein the computer instructions are configured to enable the computer to execute the private network security authentication method described in any one of the embodiments of the first to fourth aspects of the present application.
  • an embodiment of the present application provides a computer program product, including computer instructions, which, when executed by a processor, implement the private network security authentication method described in any one of the embodiments of the first to fourth aspects of the present application.
  • the SIM card reports the card information to the business system in the private network, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the gateway device redirects the identity authentication, and the first terminal sends the user information stored in the SIM card to the business system for identity authentication.
  • the private network user side can independently manage the user's access rights to the business system through the private network, and the identity authentication control on the private network enterprise side is realized.
  • Fig. 1 is a flow chart showing a private network security authentication method according to an exemplary embodiment.
  • FIG. 2 is a schematic diagram of the structure of a first data SMS according to an example.
  • FIG. 3 is a schematic diagram of the structure of a response data packet according to an example.
  • FIG. 4 is a schematic diagram showing the structure of a second data SMS according to an example.
  • FIG. 5 is a schematic diagram of the structure of an application command message according to an example.
  • Fig. 6 is a flow chart showing a private network security authentication method according to another exemplary embodiment.
  • Fig. 7 is a flow chart showing a private network security authentication method according to yet another exemplary embodiment.
  • Fig. 8 is a flow chart showing a private network security authentication method according to yet another exemplary embodiment.
  • Fig. 9 is a flow chart showing a private network security authentication method according to yet another exemplary embodiment.
  • Fig. 10 is a block diagram showing a private network security authentication device according to an exemplary embodiment.
  • Fig. 11 is a block diagram showing a private network security authentication device according to another exemplary embodiment.
  • Fig. 12 is a block diagram of a private network security authentication device according to yet another exemplary embodiment.
  • Fig. 13 is a block diagram of a private network security authentication device according to yet another exemplary embodiment.
  • Fig. 14 is a block diagram of a private network security authentication system according to an exemplary embodiment.
  • 5G networks Since its official commercial use, 5G networks have rapidly achieved popularization in the civilian stage. In the commercial field, the construction of 5G private networks by operators led by China Mobile has also developed rapidly. With the low latency, high bandwidth, and high capacity of private networks, it is highly consistent with the needs of digital transformation. It is a comprehensive integration and improvement of operation technology (OT, Operation Technology) + Internet technology (IT, Internet Technology) + communication technology (CT, Communication Technology), which can quickly help traditional industries, vertical public security, rail transit, social departments, etc. to achieve digital transformation.
  • OT Operation Technology
  • IT Internet Technology
  • CT Communication Technology
  • 5G private network is a local area network (LAN). Relying on 5G network slicing technology, it can create an exclusive network connection system for target customers and enterprises with unified connectivity, optimized service functions and guaranteed communication security in a specific area. As an exclusive service, the network's stability, serviceability and security are better guaranteed.
  • LAN local area network
  • the embodiments of the present application provide a private network security authentication method, device and system, electronic device, storage medium and computer program product.
  • SIM cards and gateway devices as infrastructure and IT support, the secure identity authentication of the 5G private network at the CT layer is realized, and the problems of the inability to authenticate and control the 5G private network enterprise side, the need for frequent logins for secondary user identity control authentication, and low security levels are solved.
  • FIG1 is a flow chart of a private network security authentication method according to an exemplary embodiment.
  • the method is applied to a private network security authentication system, which includes a SIM card, a first terminal where the SIM card is located, a short message gateway, a gateway device, and a service system in a private network, wherein the short message gateway and the gateway device are gateways of the private network.
  • the private network security authentication method may include the following steps.
  • Step S101 In response to triggering a card information reporting operation, the SIM card sends a first data SMS to a service system through a SMS gateway, wherein the first data SMS includes card information.
  • the SIM card in the embodiment of the present application is a smart card that supports the ISO/IEC 7816-4 specification and the 3GPPTS 31.111 specification. Specifically, it supports the Application Protocol Data Unit (APDU) instruction and the connection-oriented Bearer Independent Protocol (BIP).
  • APDU Application Protocol Data Unit
  • BIP connection-oriented Bearer Independent Protocol
  • the SIM card registers with the first terminal where the SIM card is located to monitor network access events; after monitoring the first terminal's first network access authentication passing event, a card information reporting operation is triggered.
  • the SIM card registers a STATUS network access event monitor with the first terminal.
  • the SIM card detects that the SIM card has successfully accessed the network for the first time, and automatically triggers a card information report, that is, triggers the SIM card to report the card information to the SMS gateway.
  • a card information reporting module of the SIM card registers with the first terminal where the SIM card is located to monitor the network access event.
  • the SIM card reads the card information, assembles the card information into a response data packet of the first data SMS, and sends the response data packet of the first data SMS to the service system through the SMS gateway.
  • the SIM card sends a first data SMS to the SMS gateway.
  • the first data SMS includes a response data packet.
  • the response data packet includes card information.
  • the SMS gateway transparently transmits the card information and the mobile phone number to the business system.
  • the data SMS is a digital identifier, which can be understood as an APDU instruction.
  • the SMS gateway needs to send the SMS to the SMS gateway through the mobile phone number.
  • the gateway port can obtain the mobile phone number of the SIM card. That is, when the SIM card is connected to the network, it needs to access the mobile network through the mobile phone number.
  • the business system can obtain the mobile phone number corresponding to the SIM card. The mobile phone number is bound to the terminal user. Therefore, the business system can authenticate the terminal user based on the mobile phone number.
  • the SIM card assembles card information such as the blank card serial number, integrated circuit card identification code (ICCID, Integrated Circuit Card Identity) (i.e., SIM card number), international mobile subscriber identity code (IMSI, International Mobile Subscriber Identity), and security element identifier (SEID, Security Element Identifier) in a response data packet as part of the first data message and sends it to the SMS gateway.
  • the first data message is an uplink message.
  • the SMS gateway receives the first data message, i.e., the card information reporting message, and the SMS gateway transparently transmits the card information and mobile phone number to the business system.
  • FIG2 shows the structure of the first data SMS, which is an uplink SMS structure
  • the uplink SMS structure includes an uplink message header, an SMS security field, and a response data packet
  • FIG3 shows the structure of the response data packet of the first data SMS.
  • the response data packet includes the card application main version number (Ver(1Byte(B))), the security parameter identifier (Flag(1B)), the application response data packet (APP-DATA) and the MAC address.
  • the application response data packet includes card information.
  • APP-DATA includes TAG (i.e., APP-DATA tag, 1B), length (i.e., APP-DATA length), card application sub-version number (2B), empty card serial number length (1B), empty card serial number (10B), IMSI length (1B), IMSI (9B), SEID length (1B), SEID (10B).
  • Table 1 is a schematic diagram of the definition of the uplink SMS response data packet field
  • Table 2 is a schematic diagram of the definition of the security parameter identifier field.
  • the security parameter identifier includes an encryption identifier and an environment identifier.
  • the security parameter identification field has a total of 1 Byte (8 bits), namely b1 to b8.
  • 8 bits can be selected from b1 to b8 to indicate the security parameter identification field definition.
  • b1 and b2 are selected and enabled, while b3 to b8 are not enabled yet (not enabled yet is indicated by 0).
  • b1 when the security parameter identification includes an encryption identification, b1 is selected to be enabled (X indicates that the position value of b1 is variable, and the value can be 0 or 1, 0 indicates no encryption, and 1 indicates encryption); when the security parameter identification includes an environment identification, b2 is selected to be enabled (X indicates that the position value of b2 is variable, and the value can be 0 or 1, 0 indicates a test environment, and 1 indicates a production environment). It should be noted that b1 and b2 are not mutually exclusive, but independent of each other.
  • Step S102 the service system receives a first data SMS sent by the SIM card through the SMS gateway, obtains the mobile phone number and card information corresponding to the SIM card based on the first data SMS, and records the binding relationship between the card information and the mobile phone number.
  • the business system can obtain the mobile phone number corresponding to the SIM card, and the business system can bind the received card information with the mobile phone number, and record the binding relationship between the card information and the mobile phone number.
  • the business system can bind the received card information with the mobile phone number, and record the binding relationship between the card information and the mobile phone number.
  • the empty card serial number, ICCID, IMSI, etc. in the card information are unique, the mobile phone number is bound to these unique card information one by one, and the card information is associated with the mobile phone number through the SIM card, and the SIM card serves as the identity of the terminal user.
  • Step S103 the service system sends a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes a mobile phone number.
  • the business system assembles the second data SMS carrying the mobile phone number and requests the SMS gateway to send the second data SMS to the SIM card.
  • the SMS gateway sends the second data SMS to the SIM card corresponding to the mobile phone number, and the second data SMS is a downlink SMS.
  • the second data SMS includes an application command message
  • the application command message includes a mobile phone number
  • FIG4 shows the structure of the second data message
  • the structure of the second data message is a downlink message format
  • the downlink message format includes a message header, an application command security field, and an application command message.
  • FIG5 shows the structure of the application command message of the second data message, and the application command message includes main_Ver (i.e., the downlink message main version number, 1B), Flag (i.e., the downlink message identifier, 1B), APP-DATA (downlink message application data), and MAC address.
  • Table 3 is a schematic diagram of the definition of the downlink message application data APP-DATA field, as shown in Table 3:
  • XX in Table 3 respectively represents the length of the downlink SMS application data field (such as the length in Table 3), the length of the mobile phone number, and the variable value of the mobile phone number.
  • Step S104 The SIM card receives a second data SMS sent by the service system through the SMS gateway, and obtains and stores user information based on the second data SMS.
  • the SIM card receives a second data SMS sent by a service system forwarded by an SMS gateway; decrypts the second data SMS to obtain SMS content in an application command message; and parses the SMS content to obtain and store user information.
  • the SIM card receives the second data SMS sent by the business system forwarded by the SMS gateway, performs a message authentication code verification on the second data SMS, decrypts the second data SMS after the verification passes, obtains the content of the second data SMS, parses the content, extracts user information such as the mobile phone number, and writes the user information into the storage.
  • the SIM card stores the user information in a secure storage space of the SIM card.
  • Step S105 The first terminal sends an intranet application access request to the private network, wherein the intranet application access request indicates access to a business system.
  • the terminal corresponds to the private network.
  • the first terminal is the 5G terminal.
  • the first terminal before the first terminal sends an intranet application access request to the private network, it also includes: the first terminal sends an access request to the private network, and the access request instructs the private network to verify the authority of the first terminal.
  • the terminal user accesses the private network through the first terminal, and the operator's core network implements one-time authentication of the private network by allocating the private network Internet Protocol (IP) address.
  • IP Internet Protocol
  • the first terminal sends an intranet application access request to the private network, and the terminal user's identity authentication verification will be triggered when requesting to access the enterprise intranet application.
  • the first terminal receives a registration request for monitoring network access events sent by the SIM card, so that after the SIM card monitors an event that the first terminal passes the first network access authentication for the private network, a card information reporting operation is triggered.
  • Step S106 The gateway device intercepts the intranet application access request sent by the first terminal to the private network, and redirects the identity authentication link to the first terminal.
  • the gateway device intercepts the private network traffic and initiates the redirection request.
  • the access gateway module of the gateway device intercepts the private network traffic and initiates the redirection request.
  • the network traffic of the intranet application access request sent by the first terminal is mirrored to the access gateway module of the gateway device via the switch/router.
  • the access gateway module receives the mirrored intranet application access request of the switch/router, sends a transmission control protocol (TCP, Transmission Control Protocol) reset (RESET) blocking packet to the switch/router, and redirects the authentication link (access gateway 8081 port uniform resource locator (URL, Uniform Resource Locator)) to the first terminal.
  • TCP Transmission Control Protocol
  • REET Transmission Control Protocol reset
  • Step S107 The first terminal receives the identity authentication link redirected by the gateway device, and sends a first instruction to the SIM card based on the identity authentication link, wherein the first instruction instructs obtaining user information.
  • the gateway device intercepts the intranet application access request sent by the first terminal to the private network and redirects the identity authentication link to the first terminal.
  • the first terminal after receiving the identity authentication link, the first terminal obtains the user information ciphertext from the SIM card.
  • the first instruction is an APDU instruction, that is, the first terminal sends an APDU instruction to the SIM card, and the APDU instruction instructs obtaining user information.
  • Step S108 The SIM card receives the first instruction sent by the first terminal, and sends the user information to the first terminal.
  • the first terminal sends a first instruction request to the SIM card configured therein to obtain user information previously stored in the SIM card.
  • the SIM card establishes a secure access channel with the first terminal; reads the stored user information, encrypts the user information, and obtains the user information ciphertext; and sends the user information ciphertext to the first terminal through the secure access channel.
  • the SIM card reads the user information stored in the secure storage space, encrypts the user information using a key preset in the card, and obtains the user information ciphertext.
  • the key is preset during the SIM card manufacturing process and is only shared with the business system to ensure data security.
  • Step S109 The first terminal receives the user information sent by the SIM card, and sends first information to the service system through the gateway device; wherein the first information includes the user information.
  • the "information" in the first information may also be a name such as a message, a signaling, or an instruction.
  • the user information in the first information is ciphertext of the user information.
  • the first terminal receives the user information ciphertext sent by the SIM card, and sends a proxy identity authentication request including the user information ciphertext, accesses the gateway device through an access identity authentication link, and sends the proxy identity authentication request to the control center of the gateway device; wherein the proxy identity authentication request instructs the gateway device to transparently transmit the user information to the business system.
  • the first terminal After the first terminal receives the user information ciphertext, it transparently transmits the user information ciphertext to the business system through the gateway device.
  • Step S110 The gateway device receives first information sent by the first terminal, and sends the first information to the service system.
  • the gateway device receives a proxy identity authentication request sent by the first terminal and sends the user information to the business system; wherein the proxy identity authentication request instructs the gateway device to send the user information to the business system, and the proxy identity authentication request includes the first information.
  • control center of the gateway device receives the proxy identity authentication request sent by the first terminal through the identity authentication link, and transparently transmits the user information to the business system.
  • the first information includes ciphertext of user information.
  • the control center receives the proxy authentication request and encapsulates the user information ciphertext into a general authentication interface protocol message; and sends the general authentication interface protocol message to the identity authentication platform of the business system of the enterprise intranet. Since the entire transmission process is encrypted, the secure transmission of user information is guaranteed.
  • Step S111 The service system receives first information sent by a first terminal where a SIM card is located through a gateway device, and performs identity authentication on a user of the first terminal based on user information in the first information.
  • the business system receives the user information and performs identity authentication on the first terminal user based on the user information.
  • the identity authentication platform of the business system parses the received general authentication interface protocol message to obtain the user information ciphertext; decrypts it through the local private key to obtain the user information; compares the user information with the user information whitelist configured by the local administrator, and only allows access after verification, that is, authorizes the first terminal user to access the business system.
  • the card information is reported to the business system in the private network through the SIM card, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the gateway device redirects the identity authentication, and the first terminal sends the user information stored in the SIM card to the business system for identity authentication.
  • the private network user side can independently manage the access rights of users to access the business system through the private network, and realize the identity authentication control on the private network enterprise side.
  • the business system collects and binds user information through the SIM card and the SMS gateway, without the need for an interface to collect user information, and provides a good experience.
  • User information is encrypted at the hard medium layer of the SIM card, and encrypted text is transmitted throughout the process to achieve secure authentication.
  • User identity information verification is performed through gateway device redirection, which can cover all terminals and is easy to promote.
  • FIG6 is a flow chart of a private network security authentication method according to another exemplary embodiment. The method is applied to a SIM card. As shown in FIG6, the private network security authentication method may include the following steps.
  • Step S601 in response to triggering a card information reporting operation, sending a first data SMS to a business system through an SMS gateway, wherein the first data SMS includes card information.
  • Step S602 receiving a second data SMS sent by the business system through the SMS gateway, and acquiring and storing user information based on the second data SMS; wherein the user information includes a mobile phone number.
  • Step S603 receiving a first instruction sent by the first terminal where the SIM card is located, and sending user information to the first terminal, so that the first terminal requests the service system to perform identity authentication on the first terminal user based on the user information; wherein the first instruction instructs obtaining user information.
  • the user information is sent to the first terminal, so that the first terminal sends the user information to the business system through the gateway device to request the business system to perform identity authentication on the first terminal user.
  • steps S601 to S603 can refer to the description of the implementation process of the corresponding steps in the embodiment shown in FIG. 1 of the present application, and will not be repeated here.
  • the card information is reported to the business system in the private network through the SIM card, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the first terminal sends the user information stored in the SIM card to the business system for identity authentication.
  • the private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized.
  • the business system collects and binds user information through the SIM card and the SMS gateway, without the need for an interface to collect user information, and provides a good experience.
  • User information is encrypted at the hard medium layer of the SIM card, and encrypted text is transmitted throughout the process to achieve secure authentication.
  • Figure 7 is a flow chart of a private network security authentication method according to another exemplary embodiment.
  • the method is applied to a first terminal, and the first terminal includes a SIM card; as shown in Figure 7, the private network security authentication method may include the following steps.
  • Step S701 Send an intranet application access request to a private network, wherein the intranet application access request indicates access to a business system.
  • the first terminal sends an intranet application access request to the private network, wherein the intranet application access request indicates access to a business system.
  • Step S702 receiving an identity authentication link redirected by a gateway device, and sending a first instruction to the SIM card based on the identity authentication link.
  • the first instruction instructs to obtain user information, where the user information is sent to the SIM card by the service system based on the card information reported by the SIM card, and the user information includes a mobile phone number.
  • Step S703 receiving user information sent by the SIM card, sending first information to the service system through the gateway device, and requesting the service system to perform identity authentication on the first terminal user based on the user information in the first information.
  • steps S701 to S703 can refer to the description of the implementation process of the corresponding steps in the embodiment shown in FIG. 1 of the present application, and will not be repeated here.
  • the card information is reported to the business system in the private network through the SIM card, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the gateway device redirects the identity authentication, and the first terminal sends the user information stored in the SIM card to the business system for identity authentication.
  • the private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized.
  • Fig. 8 is a flow chart of a private network security authentication method according to another exemplary embodiment. The method is applied to a gateway device; as shown in Fig. 8, the private network security authentication method may include the following steps.
  • Step S801 intercepting an intranet application access request sent by a first terminal to a private network, and redirecting an identity authentication link to the first terminal; wherein the first terminal includes a SIM card, and the intranet application access request indicates access to a service system.
  • Step S802 receiving the first information sent by the first terminal, and sending the first information to the business system, wherein the first information includes user information, the user information is sent to the SIM card by the business system based on the card information reported by the SIM card, the user information includes the mobile phone number, and the user information is used by the first terminal to request the business system to authenticate the first terminal user.
  • step S801-step S802 can refer to the description of the implementation process of the corresponding steps in the embodiment shown in Figure 1 of the present application, and will not be repeated here.
  • the gateway device redirects the identity authentication, and the first terminal sends the user information returned by the service system stored in the SIM card based on the card information reported by the SIM card to the service system for identity authentication.
  • the private network user side can independently manage the access rights of users to access the service system through the private network, and the identity authentication control on the private network enterprise side is realized. By redirecting the user identity information through the gateway device, it can cover all terminals and is easy to promote.
  • Figure 9 is a flow chart of a private network security authentication method according to another exemplary embodiment. The method is applied to a service system in a private network; as shown in Figure 9, the private network security authentication method may include the following steps.
  • Step S901 receiving a first data SMS sent by a SIM card via a SMS gateway, wherein the first data SMS includes card information.
  • Step S902 based on the first data SMS, obtain the mobile phone number and card information corresponding to the SIM card, and record the binding relationship between the card information and the mobile phone number.
  • Step S903 Send a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes a mobile phone number.
  • Step S904 receiving first information sent by the first terminal where the SIM card is located through the gateway device, and performing identity authentication on the first terminal user based on the user information in the first information.
  • step S901 to step S904 can refer to the description of the implementation process of the corresponding steps in the embodiment shown in Figure 1 of the present application, and will not be repeated here.
  • the card information is reported to the business system in the private network through the SIM card, and the business system returns the user information to the SIM card; when the first terminal where the SIM card is located requests to access the business system, the first terminal sends the user information stored in the SIM card to the business system for identity authentication.
  • the private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized.
  • the business system collects and binds user information through the SIM card and the SMS gateway, without the need for an interface to collect user information, and provides a good experience.
  • FIG10 is a block diagram of a private network security authentication device according to an exemplary embodiment, and the device is configured in a SIM card.
  • the private network security authentication device may include: a card information reporting module 1001 and a first transceiver module 1002 .
  • the card information reporting module 1001 is configured to send a first data SMS to the business system through the SMS gateway in response to triggering the card information reporting operation, wherein the first data SMS includes the card information;
  • the card information reporting module 1001 is further configured to receive a second data SMS sent by the business system through the SMS gateway, and obtain and store user information based on the second data SMS; wherein the user information includes a mobile phone number;
  • the first transceiver module 1002 is configured to receive a first instruction sent by a first terminal where the SIM card is located, and send user information to the first terminal so that the first terminal requests the service system to perform identity authentication on the first terminal user based on the user information; wherein the first instruction indicates obtaining user information.
  • the card information reporting module 1001 is further configured to:
  • An event that the first terminal passes the first network access authentication is monitored, triggering a card information reporting operation.
  • the card information reporting module 1001 is configured to:
  • the card information reporting module 1001 is configured to:
  • Parse SMS content obtain and store user information.
  • the first transceiver module 1002 is configured to:
  • Read user information and encrypt the user information to obtain the ciphertext of the user information
  • the user information ciphertext is sent to the first terminal through a secure access channel.
  • the response data packet includes the card application major version number, the security parameter identifier, the application response data packet and the MAC address, the application response data packet includes the card information, and the security parameter identifier includes the encryption identifier and the environment identifier.
  • the card information reporting module 1001 is configured to:
  • the card information is reported to the business system in the private network through the SIM card, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the first terminal sends the user information stored in the SIM card to the business system for identity authentication.
  • the private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control of the private network enterprise side is realized.
  • the business system realizes user information through the SIM card and SMS gateway The user information is collected and bound without the need for an interface, providing a better experience.
  • User information is encrypted through the hard medium layer of the SIM card, and the entire process is encrypted to achieve secure authentication.
  • FIG11 is a block diagram of a private network security authentication device according to another exemplary embodiment, the device is configured in a first terminal, and the first terminal includes a SIM card.
  • the private network security authentication device may include: a second transceiver module 1101 .
  • the second transceiver module 1101 is configured to send an intranet application access request to the private network, wherein the intranet application access request indicates access to the business system;
  • the second transceiver module 1101 is further configured to receive an identity authentication link redirected by the gateway device, and send a first instruction to the SIM card based on the identity authentication link, wherein the first instruction instructs to obtain user information, the user information is sent to the SIM card by the service system based on the card information reported by the SIM card, and the user information includes a mobile phone number;
  • the second transceiver module 1101 is further configured to receive user information sent by the SIM card, send first information to the service system through the gateway device, and request the service system to perform identity authentication on the first terminal user based on the user information in the first information.
  • the second transceiver module 1101 is further configured to:
  • the first terminal Before sending an intranet application access request to the private network, the first terminal sends an access request to the private network, where the access request instructs the private network to verify the authority of the first terminal.
  • the second transceiver module 1101 is further configured to:
  • the card information is reported to the business system in the private network through the SIM card, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the gateway device redirects the identity authentication, and the first terminal sends the user information stored in the SIM card to the business system for identity authentication.
  • the private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized.
  • FIG12 is a block diagram of a private network security authentication device according to another exemplary embodiment, and the device is configured in a gateway device.
  • the private network security authentication device may include: an access gateway module 1201 and a control center module 1202 .
  • the access gateway module 1201 is configured to intercept an intranet application access request sent by the first terminal to the private network, and redirect the identity authentication link to the first terminal; wherein the first terminal includes a SIM card, and the intranet application access request indicates access to the service system;
  • the control center module 1202 is configured to receive the first information sent by the first terminal and send the first information to the business system, wherein the first information includes user information, and the user information is sent to the SIM card by the business system based on the card information reported by the SIM card.
  • the user information includes a mobile phone number, and the user information is used by the first terminal to request the business system to authenticate the identity of the first terminal user.
  • the gateway device redirects the identity authentication, and the first terminal sends the user information returned by the service system stored in the SIM card based on the card information reported by the SIM card to the service system for identity authentication.
  • the private network user side can independently manage the access rights of users to access the service system through the private network, and the identity authentication control on the private network enterprise side is realized. By redirecting the user identity information through the gateway device, it can cover all terminals and is easy to promote.
  • FIG13 is a block diagram of a private network security authentication device according to another exemplary embodiment, and the device is configured in a service system in a private network.
  • the private network security authentication device may include: a third transceiver module 1301, a processing module 1302, and an identity authentication module 1303.
  • the third transceiver module 1301 is configured to receive a first data SMS sent by the SIM card through the SMS gateway, wherein the first data SMS includes card information.
  • the processing module 1302 is configured to obtain the mobile phone number and card information corresponding to the SIM card based on the first data SMS, and record the binding relationship between the card information and the mobile phone number.
  • the third transceiver module 1301 is further configured to send a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes a mobile phone number.
  • the identity authentication module 1303 is configured to receive first information sent by the first terminal where the SIM card is located through the gateway device, and perform identity authentication on the first terminal user based on the user information in the first information.
  • the card information is reported to the business system in the private network through the SIM card, and the business system returns the user information to the SIM card; when the first terminal where the SIM card is located requests to access the business system, the first terminal sends the user information stored in the SIM card to the business system for identity authentication.
  • the private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized.
  • the business system collects and binds user information through the SIM card and the SMS gateway, without the need for an interface to collect user information, and provides a good experience.
  • Figure 14 is a block diagram of a private network security authentication system according to an exemplary embodiment.
  • the private network security authentication system may include: a SIM card 1401, a first terminal (such as a 5G terminal) where the SIM card is located 1402, a SMS gateway 1403, a gateway device 1404 and a business system 1405.
  • the SIM card 1401 is configured to execute the private network security authentication method shown in FIG6 ;
  • the first terminal 1402 where the SIM card is located is configured to execute the private network security authentication method shown in FIG7 ;
  • the gateway device 1404 is configured to execute the private network security authentication method shown in FIG8 ;
  • the business system 1405 is configured to execute the private network security authentication method shown in FIG. 9 .
  • the card information is reported to the business system in the private network through the SIM card, and the business system returns the user information to the SIM card; when the first terminal where the SIM card is located requests to access the business system, the first terminal sends the user information stored in the SIM card to the business system for identity authentication.
  • the private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized.
  • the business system collects and binds user information through the SIM card and the SMS gateway, without the need for an interface to collect user information, and provides a good experience.
  • the present application also provides an electronic device and a readable storage medium.
  • FIG. 15 is a block diagram of an electronic device shown according to an exemplary embodiment, which is an electronic device for implementing a method for private network security authentication.
  • the electronic device is intended to represent various forms of digital computers, such as laptop computers, desktop computers, workbenches, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers.
  • the electronic device can also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices and other similar computing devices.
  • the components shown herein, their connections and relationships, and their functions are merely examples and are not intended to limit the implementation of the present application described and/or required herein.
  • the electronic device includes: one or more processors 1501, a memory 1502, and interfaces for connecting various components, including high-speed interfaces and low-speed interfaces.
  • the various components are connected to each other using different buses and can be installed on a common motherboard or installed in other ways as needed.
  • the processor can process instructions executed in the electronic device, including instructions stored in or on the memory to display graphical information of a graphical user interface (GUI, Graphical User Interface) on an external input/output device (such as a display device coupled to the interface).
  • GUI graphical user interface
  • an external input/output device such as a display device coupled to the interface.
  • multiple processors and/or multiple buses can be used with multiple memories.
  • multiple electronic devices can be connected, and each device provides some necessary operations (for example, as a server array, a group of blade servers, or a multi-processor system).
  • Figure 15 takes a processor 1501 as an example.
  • the memory 1502 is the non-transitory computer-readable storage medium provided in the present application.
  • the memory 1502 stores instructions executable by at least one processor 1501, so that the at least one processor 1501 performs the method for private network security authentication provided in the present application.
  • the non-transitory computer-readable storage medium of the present application stores computer instructions, which are configured to enable a computer to perform the method for private network security authentication provided in the present application.
  • the memory 1502 as a non-transient computer-readable storage medium, can be used to store non-transient software programs, non-transient computer executable programs and modules, such as the program instructions/modules corresponding to the method for private network security authentication in the embodiment of the present application (for example, the access gateway module 1201 and the control center module 1202 shown in FIG. 12).
  • the processor 1501 executes various functional applications and data processing of the server by running the non-transient software programs, instructions and modules stored in the memory 1502, that is, implements the method for private network security authentication in the above method embodiment.
  • the memory 1502 may include a program storage area and a data storage area, wherein the program storage area may store an operating system and at least one application required for a function; the data storage area may store data created based on the use of the electronic device with private network security authentication, etc.
  • the memory 1502 may include a high-speed random access memory, and may also include a non-transient memory, such as at least one disk storage device, a flash memory device, or other non-transient solid-state storage device.
  • the memory 1502 may optionally include a remote memory remotely located relative to the processor 1501, and these remote memories may be connected to the private network security authentication through a network. Electronic devices. Examples of the above network include, but are not limited to, the Internet, corporate intranets, local area networks, mobile communication networks, and combinations thereof.
  • the electronic device for private network security authentication may further include: an input device 1503 and an output device 1504.
  • the processor 1501, the memory 1502, the input device 1503 and the output device 1504 may be connected via a bus or other means, and FIG15 takes the bus connection as an example.
  • the input device 1503 can receive input digital or character information, and generate key signal input related to user settings and function control of the electronic device with private network security authentication, such as a touch screen, a keypad, a mouse, a track pad, a touch pad, an indicator rod, one or more mouse buttons, a trackball, a joystick and other input devices.
  • the output device 1504 may include a display device, an auxiliary lighting device (e.g., a light emitting diode (LED)) and a tactile feedback device (e.g., a vibration motor).
  • the display device may include, but is not limited to, a liquid crystal display (LCD), an LED display and a plasma display. In some embodiments, the display device may be a touch screen.
  • Various implementations of the systems and techniques described herein can be implemented in digital electronic circuit systems, integrated circuit systems, application specific integrated circuits (ASICs), computer hardware, firmware, software, and/or combinations thereof. These various implementations can include: being implemented in one or more computer programs that can be executed and/or interpreted on a programmable system including at least one programmable processor, which can be a special purpose or general purpose programmable processor that can receive data and instructions from a storage system, at least one input device, and at least one output device, and transmit data and instructions to the storage system, the at least one input device, and the at least one output device.
  • ASICs application specific integrated circuits
  • the systems and techniques described herein can be implemented on a computer having: a display device (e.g., a cathode ray tube (CRT) or an LCD monitor) for displaying information to the user; and a keyboard and pointing device (e.g., a mouse or trackball) through which the user can provide input to the computer.
  • a display device e.g., a cathode ray tube (CRT) or an LCD monitor
  • a keyboard and pointing device e.g., a mouse or trackball
  • Other types of devices can also be used to provide interaction with the user; for example, the feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user can be received in any form (including acoustic input, voice input, or tactile input).
  • the systems and techniques described herein may be implemented in a computing system that includes back-end components (e.g., as a data server), or a computing system that includes middleware components (e.g., an application server), or a computing system that includes front-end components (e.g., a user computer with a graphical user interface or a web browser through which a user can interact with implementations of the systems and techniques described herein), or a computing system that includes any combination of such back-end components, middleware components, or front-end components.
  • the components of the system may be interconnected by any form or medium of digital data communication (e.g., a communications network). Examples of communications networks include: LANs, Wide Area Networks (WANs), and the Internet.
  • a computer system may include clients and servers.
  • Clients and servers are generally remote from each other and usually interact through a communication network.
  • the relationship of client and server is generated by computer programs running on respective computers and having a client-server relationship to each other.
  • the embodiment of the present application also provides a computer program product.
  • the processor 1501 of the electronic device can execute the above-mentioned private network security authentication method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided in the present application are a private network security authentication method, apparatus and system, and an electronic device, a storage medium and a computer program product. The method comprises: an SIM card sending card information to a service system by means of a short message gateway; the service system returning user information to the SIM card; the first terminal sending an intranet application access request to a private network; a gateway device intercepting the intranet application access request, and redirecting an identity authentication link to the first terminal; the first terminal acquiring the user information of the SIM card and sending same to the service system by means of the gateway device; and the service system performing identity authentication on a user of the first terminal on the basis of the user information.

Description

专网安全认证方法、装置及系统、电子设备、存储介质和计算机程序产品Private network security authentication method, device and system, electronic device, storage medium and computer program product

相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS

本申请基于申请号为202311113791.4、申请日为2023年08月30日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此以全文引入的方式引入本申请。This application is based on the Chinese patent application with application number 202311113791.4 and application date August 30, 2023, and claims the priority of the Chinese patent application. The entire content of the Chinese patent application is hereby introduced into this application in its entirety.

技术领域Technical Field

本申请涉及通信技术领域,尤其涉及一种专网安全认证方法、装置及系统、电子设备、存储介质和计算机程序产品。The present application relates to the field of communication technology, and in particular to a private network security authentication method, device and system, electronic equipment, storage medium and computer program product.

背景技术Background Art

目前,运营商为行业用户建设第五代移动通信技术(5G,5th Generation Mobile Communication Technology)专网普遍采用核心网用户面功能(UPF,User Plane Function)下沉模式,该模式依赖于运营商的核心网和基站,终端准入由运营商进行业务开通,但对于行业用户而言,建设完成的5G专网等同于企业内网,仅依赖于运营商在5G核心网的一次鉴权不足以满足行业用户的接入安全需求,尤其是党政军、公检法、金融等高安全级别面向个人用户接入的场景,仅依赖运营商做安全准入管理,远不能满足行业用户的需求。At present, operators generally adopt the core network user plane function (UPF) sinking mode to build fifth-generation mobile communication technology (5G) private networks for industry users. This mode relies on the operator's core network and base stations, and the terminal access is opened by the operator. However, for industry users, the completed 5G private network is equivalent to the enterprise intranet. Only relying on the operator's one-time authentication in the 5G core network is not enough to meet the access security needs of industry users. In particular, for high-security scenarios for individual user access such as the party, government, military, public security, procuratorial, judicial, and financial sectors, relying solely on operators for security access management is far from meeting the needs of industry users.

目前5G专网建设方案,依赖于运营商的核心网和基站,终端准入由运营商进行业务开通,数据签约在运营商侧配置,对于行业用户而言,无法自主管理用户通过5G专网访问业务系统的准入权限。The current 5G private network construction plan relies on the operator's core network and base stations. Terminal access is activated by the operator, and data contracts are configured on the operator side. For industry users, it is impossible to independently manage users' access rights to access business systems through 5G private networks.

发明内容Summary of the invention

本申请提供了一种专网安全认证方法、装置及系统、电子设备、存储介质和计算机程序产品。本申请的技术方案如下:The present application provides a private network security authentication method, device and system, electronic device, storage medium and computer program product. The technical solution of the present application is as follows:

第一方面,本申请实施例提供了一种专网安全认证方法,所述方法应用于客户识别模块(SIM,Subscriber Identity Module)卡,包括:In a first aspect, an embodiment of the present application provides a private network security authentication method, which is applied to a subscriber identity module (SIM) card, comprising:

响应于触发卡信息上报操作,通过短信网关向业务系统发送第一数据短信,其中,所述第一数据短信包括卡信息;In response to triggering the card information reporting operation, sending a first data SMS to the business system through the SMS gateway, wherein the first data SMS includes the card information;

接收所述业务系统通过所述短信网关发送的第二数据短信,基于所述第二数据短信,获取并存储用户信息;其中,所述用户信息包括手机号;Receiving a second data SMS sent by the business system through the SMS gateway, and acquiring and storing user information based on the second data SMS; wherein the user information includes a mobile phone number;

接收所述SIM卡所在的第一终端发送的第一指令,将所述用户信息发送至所述第一终端,以使所述第一终端基于所述用户信息请求所述业务系统对第一终端用户进行身份认证;其中,所述第一指令指示获取所述用户信息。Receive a first instruction sent by a first terminal where the SIM card is located, and send the user information to the first terminal, so that the first terminal requests the service system to perform identity authentication on the first terminal user based on the user information; wherein the first instruction instructs to obtain the user information.

在一些实现方式中,所述响应于触发卡信息上报操作之前,包括:In some implementations, before responding to triggering the card information reporting operation, the step includes:

向所述第一终端注册监听入网事件;Registering with the first terminal to monitor network access events;

监听到所述第一终端首次入网鉴权通过事件,触发卡信息上报操作。An event that the first terminal passes the first network access authentication is monitored, triggering a card information reporting operation.

在一些实现方式中,所述通过短信网关向业务系统发送第一数据短信,包括:In some implementations, sending the first data SMS to the service system through the SMS gateway includes:

读取卡信息,并将所述卡信息组装于所述第一数据短信的响应数据包中;Reading card information, and assembling the card information into a response data packet of the first data SMS;

通过所述短信网关向所述业务系统发送所述第一数据短信的响应数据包。A response data packet of the first data SMS is sent to the business system through the SMS gateway.

在一些实现方式中,所述接收所述业务系统通过所述短信网关发送的第二数据短信,基于所述第二数据短信,获取并存储用户信息,包括: In some implementations, the receiving a second data SMS sent by the business system through the SMS gateway, and acquiring and storing user information based on the second data SMS, includes:

接收所述短信网关转发的所述业务系统发送的第二数据短信;其中,所述第二数据短信包括应用命令报文,所述应用命令报文包括所述用户信息;receiving a second data SMS sent by the business system and forwarded by the SMS gateway; wherein the second data SMS includes an application command message, and the application command message includes the user information;

解密所述第二数据短信,获取所述应用命令报文中的短信内容;Decrypting the second data SMS message to obtain SMS content in the application command message;

解析所述短信内容,获取并存储所述用户信息。Parse the text message content, obtain and store the user information.

在一些实现方式中,所述将所述用户信息发送至所述第一终端,包括:In some implementations, sending the user information to the first terminal includes:

建立与所述第一终端之间的安全访问通道;Establishing a secure access channel with the first terminal;

读取用户信息;并加密所述用户信息,得到用户信息密文;Reading user information; and encrypting the user information to obtain a ciphertext of the user information;

将所述用户信息密文通过所述安全访问通道发送至所述第一终端。The user information ciphertext is sent to the first terminal through the secure access channel.

在一些实现方式中,所述响应数据包包括卡应用主版本号、安全参数标识、应用响应数据包和媒体访问控制(MAC,Media Access Control)地址,所述应用响应数据包包括所述卡信息,所述安全参数标识包括加密标识和环境标识。In some implementations, the response data packet includes a card application main version number, a security parameter identifier, an application response data packet, and a media access control (MAC) address, the application response data packet includes the card information, and the security parameter identifier includes an encryption identifier and an environment identifier.

在一些实现方式中,所述存储所述用户信息,包括:In some implementations, storing the user information includes:

将所述用户信息存储于所述SIM卡的安全存储空间。The user information is stored in the secure storage space of the SIM card.

第二方面,本申请实施例提供了一种专网安全认证方法,所述方法应用于第一终端,所述第一终端包括SIM卡;所述方法包括:In a second aspect, an embodiment of the present application provides a private network security authentication method, the method is applied to a first terminal, the first terminal includes a SIM card; the method includes:

向专网发送内网应用访问请求,其中,所述内网应用访问请求指示访问业务系统;Sending an intranet application access request to a private network, wherein the intranet application access request indicates access to a business system;

接收网关设备重定向的身份认证链接,并基于所述身份认证链接,向所述SIM卡发送第一指令,其中,所述第一指令指示获取用户信息,所述用户信息为所述业务系统基于所述SIM卡上报的卡信息发送至所述SIM卡的,所述用户信息包括手机号;Receive an identity authentication link redirected by a gateway device, and send a first instruction to the SIM card based on the identity authentication link, wherein the first instruction instructs to obtain user information, the user information is sent to the SIM card by the service system based on the card information reported by the SIM card, and the user information includes a mobile phone number;

接收所述SIM卡发送的所述用户信息,并通过所述网关设备向业务系统发送第一信息,以及基于所述第一信息中的用户信息请求所述业务系统对第一终端用户进行身份认证。The user information sent by the SIM card is received, and first information is sent to the service system through the gateway device, and based on the user information in the first information, the service system is requested to perform identity authentication on the first terminal user.

在一些实现方式中,所述向专网发送内网应用访问请求之前,包括:In some implementations, before sending the intranet application access request to the private network, the process includes:

所述第一终端向专网发送接入请求,所述接入请求指示所述专网验证所述第一终端的权限。The first terminal sends an access request to the private network, where the access request instructs the private network to verify the authority of the first terminal.

在一些实现方式中,所述方法还包括:In some implementations, the method further includes:

接收所述SIM卡发送的监听入网事件注册请求。Receive a network access event monitoring registration request sent by the SIM card.

第三方面,本申请实施例提供了一种专网安全认证方法,所述方法应用于网关设备,包括:In a third aspect, an embodiment of the present application provides a private network security authentication method, which is applied to a gateway device and includes:

拦截第一终端向专网发送的内网应用访问请求,重定向身份认证链接至所述第一终端;其中,所述第一终端包括SIM卡,所述内网应用访问请求指示访问业务系统;Intercepting an intranet application access request sent by a first terminal to a private network, and redirecting an identity authentication link to the first terminal; wherein the first terminal includes a SIM card, and the intranet application access request indicates access to a service system;

接收所述第一终端发送的第一信息,并将所述第一信息发送至所述业务系统,其中,所述第一信息包括用户信息,所述用户信息为所述业务系统基于所述SIM卡上报的卡信息发送至所述SIM卡的,所述用户信息包括手机号,所述用户信息用于所述第一终端请求所述业务系统对第一终端用户进行身份认证。Receive first information sent by the first terminal, and send the first information to the business system, wherein the first information includes user information, and the user information is sent to the SIM card by the business system based on the card information reported by the SIM card, and the user information includes a mobile phone number, and the user information is used by the first terminal to request the business system to perform identity authentication on the first terminal user.

第四方面,本申请实施例提供了一种专网安全认证方法,所述方法应用于专网内的业务系统,包括:In a fourth aspect, an embodiment of the present application provides a private network security authentication method, which is applied to a business system in a private network, including:

接收SIM卡通过短信网关发送的第一数据短信,其中,所述第一数据短信包括卡信息;Receiving a first data SMS sent by the SIM card through a SMS gateway, wherein the first data SMS includes card information;

基于所述第一数据短信,获取所述SIM卡对应的手机号和所述卡信息,并记录所述卡信息与所述手机号的绑定关系;Based on the first data SMS, obtain the mobile phone number and the card information corresponding to the SIM card, and record the binding relationship between the card information and the mobile phone number;

通过所述短信网关向所述SIM卡发送第二数据短信,其中,所述第二数据短信包括用户信息,所述用户信息包括所述手机号;Sending a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes the mobile phone number;

接收所述SIM卡所在的第一终端通过网关设备发送的第一信息,并基于所述第一信息中的用户信息对第一终端用户进行身份认证。Receive first information sent by the first terminal where the SIM card is located through a gateway device, and perform identity authentication on the first terminal user based on the user information in the first information.

第五方面,本申请实施例提供了一种专网安全认证系统,包括SIM卡,所述SIM卡所在的第一终端、短信网关、网关设备和业务系统,In a fifth aspect, an embodiment of the present application provides a private network security authentication system, including a SIM card, a first terminal where the SIM card is located, a short message gateway, a gateway device, and a service system.

所述SIM卡,被配置为执行第一方面所述的专网安全认证方法;The SIM card is configured to execute the private network security authentication method according to the first aspect;

所述SIM卡所在的第一终端,被配置为执行第二方面所述的专网安全认证方法;The first terminal where the SIM card is located is configured to execute the private network security authentication method described in the second aspect;

所述网关设备,被配置为执行第三方面所述的专网安全认证方法;The gateway device is configured to execute the private network security authentication method according to the third aspect;

所述业务系统,被配置为执行第四方面所述的专网安全认证方法。The business system is configured to execute the private network security authentication method described in the fourth aspect.

第六方面,本申请实施例提供了一种专网安全认证装置,所述装置配置于SIM卡,包括: In a sixth aspect, an embodiment of the present application provides a private network security authentication device, the device being configured on a SIM card, comprising:

卡信息上报模块,被配置为响应于触发卡信息上报操作,通过短信网关向业务系统发送第一数据短信,其中,所述第一数据短信包括卡信息;A card information reporting module, configured to send a first data SMS to a business system through a SMS gateway in response to triggering a card information reporting operation, wherein the first data SMS includes card information;

所述卡信息上报模块,还被配置为接收所述业务系统通过所述短信网关发送的第二数据短信,基于所述第二数据短信,获取并存储用户信息;其中,所述用户信息包括手机号;The card information reporting module is further configured to receive a second data SMS sent by the business system through the SMS gateway, and obtain and store user information based on the second data SMS; wherein the user information includes a mobile phone number;

第一收发模块,被配置为接收所述SIM卡所在的第一终端发送的第一指令,将所述用户信息发送至所述第一终端,以使所述第一终端基于所述用户信息请求所述业务系统对第一终端用户进行身份认证;其中,所述第一指令指示获取所述用户信息。The first transceiver module is configured to receive a first instruction sent by a first terminal where the SIM card is located, and send the user information to the first terminal, so that the first terminal requests the service system to perform identity authentication on the first terminal user based on the user information; wherein the first instruction instructs to obtain the user information.

在一些实现方式中,所述卡信息上报模块,还被配置为:In some implementations, the card information reporting module is further configured to:

响应于触发卡信息上报操作之前,向所述第一终端注册监听入网事件;In response to triggering the card information reporting operation, registering with the first terminal to monitor network access events;

监听到所述第一终端首次入网鉴权通过事件,触发卡信息上报操作。An event that the first terminal passes the first network access authentication is monitored, triggering a card information reporting operation.

在一些实现方式中,所述卡信息上报模块,被配置为:In some implementations, the card information reporting module is configured to:

读取卡信息,并将所述卡信息组装于所述第一数据短信的响应数据包中;Reading card information, and assembling the card information into a response data packet of the first data SMS;

通过所述短信网关向所述业务系统发送所述第一数据短信的响应数据包。A response data packet of the first data SMS is sent to the business system through the SMS gateway.

在一些实现方式中,所述卡信息上报模块,被配置为:In some implementations, the card information reporting module is configured to:

接收所述短信网关转发的所述业务系统发送的第二数据短信;其中,所述第二数据短信包括应用命令报文,所述应用命令报文包括所述用户信息;receiving a second data SMS sent by the business system and forwarded by the SMS gateway; wherein the second data SMS includes an application command message, and the application command message includes the user information;

解密所述第二数据短信,获取所述应用命令报文中的短信内容;Decrypting the second data SMS message to obtain SMS content in the application command message;

解析所述短信内容,获取并存储所述用户信息。Parse the text message content, obtain and store the user information.

在一些实现方式中,所述第一收发模块,被配置为:In some implementations, the first transceiver module is configured to:

建立与所述第一终端之间的安全访问通道;Establishing a secure access channel with the first terminal;

读取用户信息;并加密所述用户信息,得到用户信息密文;Reading user information; and encrypting the user information to obtain a ciphertext of the user information;

将所述用户信息密文通过所述安全访问通道发送至所述第一终端。The user information ciphertext is sent to the first terminal through the secure access channel.

在一些实现方式中,所述响应数据包包括卡应用主版本号、安全参数标识、应用响应数据包和MAC地址,所述应用响应数据包包括所述卡信息,所述安全参数标识包括加密标识和环境标识。In some implementations, the response data packet includes a card application major version number, a security parameter identifier, an application response data packet and a MAC address, the application response data packet includes the card information, and the security parameter identifier includes an encryption identifier and an environment identifier.

在一些实现方式中,所述卡信息上报模块,被配置为:In some implementations, the card information reporting module is configured to:

将所述用户信息存储于所述SIM卡的安全存储空间。The user information is stored in the secure storage space of the SIM card.

第七方面,本申请实施例提供了一种专网安全认证装置,所述装置配置于第一终端,所述第一终端包括SIM卡,包括:In a seventh aspect, an embodiment of the present application provides a private network security authentication device, the device being configured in a first terminal, the first terminal including a SIM card, including:

第二收发模块,被配置为向专网发送内网应用访问请求,其中,所述内网应用访问请求指示访问业务系统;A second transceiver module is configured to send an intranet application access request to the private network, wherein the intranet application access request indicates access to a business system;

所述第二收发模块,还被配置为接收网关设备重定向的身份认证链接,并基于所述身份认证链接,向所述SIM卡发送第一指令,其中,所述第一指令指示获取用户信息,所述用户信息为所述业务系统基于所述SIM卡上报的卡信息发送至所述SIM卡的,所述用户信息包括手机号;The second transceiver module is further configured to receive an identity authentication link redirected by a gateway device, and send a first instruction to the SIM card based on the identity authentication link, wherein the first instruction instructs to obtain user information, the user information is sent to the SIM card by the service system based on the card information reported by the SIM card, and the user information includes a mobile phone number;

所述第二收发模块,还被配置为接收所述SIM卡发送的所述用户信息,并通过所述网关设备向业务系统发送第一信息,以及基于所述第一信息中的用户信息请求所述业务系统对第一终端用户进行身份认证。The second transceiver module is further configured to receive the user information sent by the SIM card, send first information to the service system through the gateway device, and request the service system to perform identity authentication on the first terminal user based on the user information in the first information.

在一些实现方式中,所述第二收发模块,还被配置为:In some implementations, the second transceiver module is further configured to:

所述第一终端向专网发送内网应用访问请求之前,向专网发送接入请求,所述接入请求指示所述专网验证所述第一终端的权限。Before sending an intranet application access request to the private network, the first terminal sends an access request to the private network, where the access request instructs the private network to verify the authority of the first terminal.

在一些实现方式中,所述第二收发模块,还被配置为:In some implementations, the second transceiver module is further configured to:

接收所述SIM卡发送的监听入网事件注册请求。Receive a network access event monitoring registration request sent by the SIM card.

第八方面,本申请实施例提供了一种专网安全认证装置,所述装置配置于网关设备,包括:In an eighth aspect, an embodiment of the present application provides a private network security authentication device, the device being configured in a gateway device, including:

接入网关模块,被配置为拦截第一终端向专网发送的内网应用访问请求,重定向身份认证链接至所述第一终端;其中,所述第一终端包括SIM卡,所述内网应用访问请求指示访问业务系统;The access gateway module is configured to intercept an intranet application access request sent by a first terminal to a private network, and redirect an identity authentication link to the first terminal; wherein the first terminal includes a SIM card, and the intranet application access request indicates access to a service system;

控制中心模块,被配置为接收所述第一终端发送的第一信息,并将所述第一信息发送至所述业务系统,其中,所述第一信息包括用户信息,所述用户信息为所述业务系统基于所述SIM卡上报的卡信息发送至所述SIM卡的,所述用户信息包括手机号,所述用户信息用于所述第一终端请求所述业务系统对第一终端用户进行身份认证。 The control center module is configured to receive the first information sent by the first terminal and send the first information to the business system, wherein the first information includes user information, and the user information is sent to the SIM card by the business system based on the card information reported by the SIM card, and the user information includes a mobile phone number, and the user information is used by the first terminal to request the business system to authenticate the first terminal user.

第九方面,本申请实施例提供了一种专网安全认证装置,所述装置配置于专网内的业务系统,包括:In a ninth aspect, an embodiment of the present application provides a private network security authentication device, wherein the device is configured in a business system within the private network, including:

第三收发模块,被配置为接收SIM卡通过短信网关发送的第一数据短信,其中,所述第一数据短信包括卡信息;A third transceiver module is configured to receive a first data SMS sent by the SIM card through the SMS gateway, wherein the first data SMS includes card information;

处理模块,被配置为基于所述第一数据短信,获取所述SIM卡对应的手机号和所述卡信息,并记录所述卡信息与所述手机号的绑定关系;a processing module configured to obtain the mobile phone number and the card information corresponding to the SIM card based on the first data SMS, and record the binding relationship between the card information and the mobile phone number;

所述第三收发模块,还被配置为通过所述短信网关向所述SIM卡发送第二数据短信,其中,所述第二数据短信包括用户信息,所述用户信息包括所述手机号;The third transceiver module is further configured to send a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes the mobile phone number;

身份认证模块,被配置为接收所述SIM卡所在的第一终端通过网关设备发送的第一信息,并基于所述第一信息中的用户信息对第一终端用户进行身份认证。The identity authentication module is configured to receive first information sent by the first terminal where the SIM card is located through the gateway device, and perform identity authentication on the first terminal user based on the user information in the first information.

第十方面,本申请实施例提供了一种电子设备,包括:至少一个处理器;以及与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行本申请第一方面至第四方面中任一项实施例所述的专网安全认证方法。In the tenth aspect, an embodiment of the present application provides an electronic device, comprising: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can execute the private network security authentication method described in any one of the embodiments of the first to fourth aspects of the present application.

第十一方面,本申请实施例提供了一种存储有计算机指令的非瞬时计算机可读存储介质,所述计算机指令被配置为使所述计算机执行本申请第一方面至第四方面中任一项实施例所述的专网安全认证方法。In the eleventh aspect, an embodiment of the present application provides a non-transitory computer-readable storage medium storing computer instructions, wherein the computer instructions are configured to enable the computer to execute the private network security authentication method described in any one of the embodiments of the first to fourth aspects of the present application.

第十二方面,本申请实施例提供了一种计算机程序产品,包括计算机指令,所述计算机指令被处理器执行时实现本申请第一方面至第四方面中任一项实施例所述的专网安全认证方法。In the twelfth aspect, an embodiment of the present application provides a computer program product, including computer instructions, which, when executed by a processor, implement the private network security authentication method described in any one of the embodiments of the first to fourth aspects of the present application.

本申请实施例提供的技术方案至少带来以下有益效果:The technical solution provided by the embodiments of the present application brings at least the following beneficial effects:

通过SIM卡上报卡信息至专网内的业务系统,将业务系统返回的用户信息存储于SIM卡;当SIM卡所在的第一终端请求访问业务系统时,网关设备重定向身份认证,第一终端则将存储于SIM卡的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。The SIM card reports the card information to the business system in the private network, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the gateway device redirects the identity authentication, and the first terminal sends the user information stored in the SIM card to the business system for identity authentication. The private network user side can independently manage the user's access rights to the business system through the private network, and the identity authentication control on the private network enterprise side is realized.

应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本申请。It should be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the present application.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请的实施例,并与说明书一起用于解释本申请的原理,并不构成对本申请的不当限定。The drawings herein are incorporated into the specification and constitute a part of the specification, illustrate embodiments consistent with the present application, and together with the specification are used to explain the principles of the present application, and do not constitute improper limitations on the present application.

图1是根据一示例性实施例示出的一种专网安全认证方法的流程图。Fig. 1 is a flow chart showing a private network security authentication method according to an exemplary embodiment.

图2是根据一示例示出的第一数据短信的结构示意图。FIG. 2 is a schematic diagram of the structure of a first data SMS according to an example.

图3是根据一示例示出的响应数据包的结构示意图。FIG. 3 is a schematic diagram of the structure of a response data packet according to an example.

图4是根据一示例示出的第二数据短信的结构示意图。FIG. 4 is a schematic diagram showing the structure of a second data SMS according to an example.

图5是根据一示例示出的应用命令报文的结构示意图。FIG. 5 is a schematic diagram of the structure of an application command message according to an example.

图6是根据另一示例性实施例示出的一种专网安全认证方法的流程图。Fig. 6 is a flow chart showing a private network security authentication method according to another exemplary embodiment.

图7是根据又一示例性实施例示出的一种专网安全认证方法的流程图。Fig. 7 is a flow chart showing a private network security authentication method according to yet another exemplary embodiment.

图8是根据又一示例性实施例示出的一种专网安全认证方法的流程图。Fig. 8 is a flow chart showing a private network security authentication method according to yet another exemplary embodiment.

图9是根据又一示例性实施例示出的一种专网安全认证方法的流程图。Fig. 9 is a flow chart showing a private network security authentication method according to yet another exemplary embodiment.

图10是根据一示例性实施例示出的一种专网安全认证装置的框图。Fig. 10 is a block diagram showing a private network security authentication device according to an exemplary embodiment.

图11是根据另一示例性实施例示出的一种专网安全认证装置的框图。Fig. 11 is a block diagram showing a private network security authentication device according to another exemplary embodiment.

图12是根据又一示例性实施例示出的一种专网安全认证装置的框图。Fig. 12 is a block diagram of a private network security authentication device according to yet another exemplary embodiment.

图13是根据又一示例性实施例示出的一种专网安全认证装置的框图。Fig. 13 is a block diagram of a private network security authentication device according to yet another exemplary embodiment.

图14是根据一示例性实施例示出的一种专网安全认证系统的框图。Fig. 14 is a block diagram of a private network security authentication system according to an exemplary embodiment.

图15是根据一示例性实施例示出的一种电子设备的框图。 Fig. 15 is a block diagram of an electronic device according to an exemplary embodiment.

具体实施方式DETAILED DESCRIPTION

为了使本领域普通人员更好地理解本申请的技术方案,下面将结合附图,对本申请实施例中的技术方案进行清楚、完整地描述。In order to enable ordinary persons in the art to better understand the technical solution of the present application, the technical solution in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings.

需要说明的是,本申请中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本申请实施例能够以除了在这里图示或描述的那些以外的顺序实施。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。It should be noted that the terms "first", "second", etc. in this application are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. It should be understood that the data used in this way can be interchangeable where appropriate, so that the embodiments of the application described here can be implemented in an order other than those illustrated or described here. The implementation methods described in the following exemplary embodiments do not represent all implementation methods consistent with the present application. On the contrary, they are merely examples of devices and methods consistent with some aspects of the present application as detailed in the attached claims.

5G网络自正式商用以来,已快速实现民用阶段的普及,商用领域以中国移动为首的运营商5G专网的建设也迅猛发展,借助于专网的低时延、高带宽、高容载等特点,高度契合数字化转型需求,是操作技术(OT,Operation Technology)+互联网技术(IT,Internet Technology)+通讯技术(CT,Communication Technology)的全面融合与提升,可快速助力于传统行业、垂直公安、轨道交通、社会部门等实现数字化转型。Since its official commercial use, 5G networks have rapidly achieved popularization in the civilian stage. In the commercial field, the construction of 5G private networks by operators led by China Mobile has also developed rapidly. With the low latency, high bandwidth, and high capacity of private networks, it is highly consistent with the needs of digital transformation. It is a comprehensive integration and improvement of operation technology (OT, Operation Technology) + Internet technology (IT, Internet Technology) + communication technology (CT, Communication Technology), which can quickly help traditional industries, vertical public security, rail transit, social departments, etc. to achieve digital transformation.

5G专网是一种局域网(LAN,Local Area Network),依托于5G网络切片技术,能为目标客户和企业创建具有统一连接性、优化服务功能和在特定区域内保障通信安全的专属的网络连接体系,作为专属服务,网络的稳定性、服务性和安全性都具备更好的保障。5G private network is a local area network (LAN). Relying on 5G network slicing technology, it can create an exclusive network connection system for target customers and enterprises with unified connectivity, optimized service functions and guaranteed communication security in a specific area. As an exclusive service, the network's stability, serviceability and security are better guaranteed.

目前,运营商为行业用户建设5G专网普遍采用核心网UPF下沉模式,该模式依赖于运营商的核心网和基站,终端准入由运营商进行业务开通,数据签约在运营商侧配置。但对于行业用户而言,建设完成的5G专网等同于企业内网,仅依赖于运营商在5G核心网的一次鉴权不足以满足行业用户的接入安全需求,尤其是高安全级别面向个人用户接入的场景,仅依赖运营商做安全准入管理,远不能满足行业用户的需求,无法自主管理用户通过5G专网访问业务系统的准入权限。At present, operators generally adopt the core network UPF sinking mode to build 5G private networks for industry users. This mode relies on the core network and base stations of operators. Terminal access is opened by operators, and data contracts are configured on the operator side. However, for industry users, the completed 5G private network is equivalent to the enterprise intranet. Only relying on the operator's one-time authentication in the 5G core network is not enough to meet the access security needs of industry users, especially in the high-security level access scenario for individual users. Only relying on operators for security access management is far from meeting the needs of industry users, and it is impossible to independently manage the access rights of users to access business systems through 5G private networks.

为了解决上述问题,本申请实施例提供了一种专网安全认证方法、装置及系统、电子设备、存储介质和计算机程序产品,通过引入SIM卡和网关设备作为基础设施和IT支撑,实现5G专网在CT层的安全身份认证,解决5G专网企业侧无法认证管控,二次用户身份管控鉴权需要频繁登录、安全等级低等问题。In order to solve the above problems, the embodiments of the present application provide a private network security authentication method, device and system, electronic device, storage medium and computer program product. By introducing SIM cards and gateway devices as infrastructure and IT support, the secure identity authentication of the 5G private network at the CT layer is realized, and the problems of the inability to authenticate and control the 5G private network enterprise side, the need for frequent logins for secondary user identity control authentication, and low security levels are solved.

图1是根据一示例性实施例示出的一种专网安全认证方法的流程图。该方法应用于专网安全认证系统,专网安全认证系统包括SIM卡,SIM卡所在的第一终端、短信网关、网关设备和专网内的业务系统,短信网关和网关设备为专网的网关。如图1所示,该专网安全认证方法可以包括如下步骤。FIG1 is a flow chart of a private network security authentication method according to an exemplary embodiment. The method is applied to a private network security authentication system, which includes a SIM card, a first terminal where the SIM card is located, a short message gateway, a gateway device, and a service system in a private network, wherein the short message gateway and the gateway device are gateways of the private network. As shown in FIG1 , the private network security authentication method may include the following steps.

步骤S101,SIM卡响应于触发卡信息上报操作,通过短信网关向业务系统发送第一数据短信,其中,第一数据短信包括卡信息。Step S101: In response to triggering a card information reporting operation, the SIM card sends a first data SMS to a service system through a SMS gateway, wherein the first data SMS includes card information.

首先需要说明的是,本申请实施例的SIM卡为支持ISO/IEC 7816-4规范及3GPPTS 31.111规范的智能卡,具体表现形式为支持应用协议数据单元(APDU,Application Protocol Data Unit)指令,支持面向连接的承载独立协议(BIP,Bearer Independent Protocol)。First of all, it should be noted that the SIM card in the embodiment of the present application is a smart card that supports the ISO/IEC 7816-4 specification and the 3GPPTS 31.111 specification. Specifically, it supports the Application Protocol Data Unit (APDU) instruction and the connection-oriented Bearer Independent Protocol (BIP).

在一些实施例中,SIM卡向该SIM卡所在的第一终端注册监听入网事件;监听到第一终端首次入网鉴权通过事件后,触发卡信息上报操作。In some embodiments, the SIM card registers with the first terminal where the SIM card is located to monitor network access events; after monitoring the first terminal's first network access authentication passing event, a card information reporting operation is triggered.

示例性的,SIM卡通过向第一终端注册STATUS入网事件监听,当第一终端接入专网入网鉴权通过后,SIM卡检测到SIM卡首次入网成功,自动触发一次卡信息上报,即触发SIM卡上报卡信息至短信网关。Exemplarily, the SIM card registers a STATUS network access event monitor with the first terminal. When the first terminal passes the private network access authentication, the SIM card detects that the SIM card has successfully accessed the network for the first time, and automatically triggers a card information report, that is, triggers the SIM card to report the card information to the SMS gateway.

作为一种实现方式,SIM卡的卡信息上报模块向该SIM卡所在的第一终端注册监听入网事件。As an implementation manner, a card information reporting module of the SIM card registers with the first terminal where the SIM card is located to monitor the network access event.

作为一种实现方式,SIM卡读取卡信息,并将卡信息组装于第一数据短信的响应数据包中,通过短信网关向业务系统发送第一数据短信的响应数据包。As an implementation method, the SIM card reads the card information, assembles the card information into a response data packet of the first data SMS, and sends the response data packet of the first data SMS to the service system through the SMS gateway.

SIM卡向短信网关发送第一数据短信,第一数据短信包括响应数据包,响应数据包包括卡信息,短信网关将卡信息和手机号透传至业务系统。The SIM card sends a first data SMS to the SMS gateway. The first data SMS includes a response data packet. The response data packet includes card information. The SMS gateway transparently transmits the card information and the mobile phone number to the business system.

需要说明的是,数据短信是一段数字标识,可以理解为APDU指令,在SIM卡通过短信网关将第一数据短信发送至业务系统时,由于SIM卡需要通过手机号向短信网关发送短信,短信网关 的网关端口则可以获取SIM卡的手机号。即SIM卡入网的时候,需要通过手机号接入移动网络,业务系统在接收到该第一数据短信之后,则可以获取该SIM卡对应的手机号,手机号是与终端用户绑定的,由此,业务系统能够基于手机号对终端用户进行身份认证。It should be noted that the data SMS is a digital identifier, which can be understood as an APDU instruction. When the SIM card sends the first data SMS to the business system through the SMS gateway, the SMS gateway needs to send the SMS to the SMS gateway through the mobile phone number. The gateway port can obtain the mobile phone number of the SIM card. That is, when the SIM card is connected to the network, it needs to access the mobile network through the mobile phone number. After receiving the first data SMS, the business system can obtain the mobile phone number corresponding to the SIM card. The mobile phone number is bound to the terminal user. Therefore, the business system can authenticate the terminal user based on the mobile phone number.

可选的,SIM卡将空卡序列号、集成电路卡识别码(ICCID,Integrate Circuit Card Identity)(即SIM卡卡号)、国际移动用户识别码(IMSI,International Mobile Subscriber Identity)、安全元素标识符(SEID,Security Element Identifier)等卡信息组装在响应数据包中作为第一数据短信的一部分发送至短信网关,第一数据短信为上行短信。短信网关接收第一数据短信,即卡信息上报短信,短信网关将卡信息及手机号透传至业务系统。Optionally, the SIM card assembles card information such as the blank card serial number, integrated circuit card identification code (ICCID, Integrated Circuit Card Identity) (i.e., SIM card number), international mobile subscriber identity code (IMSI, International Mobile Subscriber Identity), and security element identifier (SEID, Security Element Identifier) in a response data packet as part of the first data message and sends it to the SMS gateway. The first data message is an uplink message. The SMS gateway receives the first data message, i.e., the card information reporting message, and the SMS gateway transparently transmits the card information and mobile phone number to the business system.

示例性的,图2所示为第一数据短信的结构,第一数据短信的结构为上行短信结构,该上行短信结构包括上行消息头、短信安全字段和响应数据包。图3所示为第一数据短信的响应数据包的结构。响应数据包包括卡应用主版本号(Ver(1Byte(B)))、安全参数标识(Flag(1B))、应用响应数据包(APP-DATA)和MAC地址,应用响应数据包包括卡信息,具体的,APP-DATA包括TAG(即APP-DATA标签,1B)、长度(即APP-DATA长度)、卡应用子版本号(2B)、空卡序列号长度(1B)、空卡序列号(10B)、IMSI长度(1B)、IMSI(9B)、SEID长度(1B)、SEID(10B)。表1是上行短信响应数据包字段定义的示意,表2是安全参数标识字段定义的示意,安全参数标识包括加密标识和环境标识。Exemplarily, FIG2 shows the structure of the first data SMS, which is an uplink SMS structure, and the uplink SMS structure includes an uplink message header, an SMS security field, and a response data packet. FIG3 shows the structure of the response data packet of the first data SMS. The response data packet includes the card application main version number (Ver(1Byte(B))), the security parameter identifier (Flag(1B)), the application response data packet (APP-DATA) and the MAC address. The application response data packet includes card information. Specifically, APP-DATA includes TAG (i.e., APP-DATA tag, 1B), length (i.e., APP-DATA length), card application sub-version number (2B), empty card serial number length (1B), empty card serial number (10B), IMSI length (1B), IMSI (9B), SEID length (1B), SEID (10B). Table 1 is a schematic diagram of the definition of the uplink SMS response data packet field, and Table 2 is a schematic diagram of the definition of the security parameter identifier field. The security parameter identifier includes an encryption identifier and an environment identifier.

表1
Table 1

其中,表1中的“XX”表示APP-DATA的长度值可变。Among them, "XX" in Table 1 indicates that the length value of APP-DATA is variable.

表2
Table 2

其中,安全参数标识字段共有1Byte(8bit),即b1至b8,实际应用中,可以从b1至b8中选择启用两个比特位来表示安全参数标识字段定义,例如上述表2所示的选择启用了b1、b2,而b3至b8暂未启用(暂未启用用0表示)。示例性的,安全参数标识包括加密标识时,选择启用b1(X表示b1位置值可变,可取值为0或1,0表示不加密,1表示加密);安全参数标识包括环境标识时,选择启用b2(X表示b2位置值可变,可取值为0或1,0表示测试环境,1表示生产环境)。需要说明的是,b1、b2之间不是互斥的,而是相互独立的。Among them, the security parameter identification field has a total of 1 Byte (8 bits), namely b1 to b8. In actual applications, two bits can be selected from b1 to b8 to indicate the security parameter identification field definition. For example, as shown in Table 2 above, b1 and b2 are selected and enabled, while b3 to b8 are not enabled yet (not enabled yet is indicated by 0). Exemplarily, when the security parameter identification includes an encryption identification, b1 is selected to be enabled (X indicates that the position value of b1 is variable, and the value can be 0 or 1, 0 indicates no encryption, and 1 indicates encryption); when the security parameter identification includes an environment identification, b2 is selected to be enabled (X indicates that the position value of b2 is variable, and the value can be 0 or 1, 0 indicates a test environment, and 1 indicates a production environment). It should be noted that b1 and b2 are not mutually exclusive, but independent of each other.

步骤S102,业务系统接收SIM卡通过短信网关发送的第一数据短信,基于第一数据短信,获取SIM卡对应的手机号和卡信息,并记录卡信息与手机号的绑定关系。Step S102, the service system receives a first data SMS sent by the SIM card through the SMS gateway, obtains the mobile phone number and card information corresponding to the SIM card based on the first data SMS, and records the binding relationship between the card information and the mobile phone number.

可以理解为,业务系统在接收到第一数据短信之后,则可以获取该SIM卡对应的手机号,业务系统便可以将接收到的卡信息与手机号进行绑定,记录卡信息与手机号的绑定关系。也就是说,由于卡信息中的空卡序列号、ICCID、IMSI等均是唯一的,手机号与这些唯一的卡信息是一一绑定的,通过SIM卡实现将卡信息与手机号关联起来,SIM卡则作为终端用户的身份标识。 It can be understood that after receiving the first data SMS, the business system can obtain the mobile phone number corresponding to the SIM card, and the business system can bind the received card information with the mobile phone number, and record the binding relationship between the card information and the mobile phone number. In other words, since the empty card serial number, ICCID, IMSI, etc. in the card information are unique, the mobile phone number is bound to these unique card information one by one, and the card information is associated with the mobile phone number through the SIM card, and the SIM card serves as the identity of the terminal user.

步骤S103,业务系统通过短信网关向SIM卡发送第二数据短信,其中,第二数据短信包括用户信息,用户信息包括手机号。Step S103: the service system sends a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes a mobile phone number.

可以理解为,业务系统组装携带手机号的第二数据短信;请求短信网关将第二数据短信发送至SIM卡。短信网关下发第二数据短信至该手机号对应的SIM卡,第二数据短信为下行短信。It can be understood that the business system assembles the second data SMS carrying the mobile phone number and requests the SMS gateway to send the second data SMS to the SIM card. The SMS gateway sends the second data SMS to the SIM card corresponding to the mobile phone number, and the second data SMS is a downlink SMS.

在一些实施例中,第二数据短信包括应用命令报文,应用命令报文包括手机号。In some embodiments, the second data SMS includes an application command message, and the application command message includes a mobile phone number.

示例性的,图4所示为第二数据短信的结构,第二数据短信的结构为下行短信格式,该下行短信格式包括短信消息头、应用命令安全字段和应用命令报文。图5所示为第二数据短信的应用命令报文的结构,应用命令报文包括main_Ver(即下行短信主版本号,1B)、Flag(即下行短信标识,1B)、APP-DATA(下行短信应用数据)和MAC地址,表3是下行短信应用数据APP-DATA字段定义的示意,如表3所示:Exemplarily, FIG4 shows the structure of the second data message, and the structure of the second data message is a downlink message format, and the downlink message format includes a message header, an application command security field, and an application command message. FIG5 shows the structure of the application command message of the second data message, and the application command message includes main_Ver (i.e., the downlink message main version number, 1B), Flag (i.e., the downlink message identifier, 1B), APP-DATA (downlink message application data), and MAC address. Table 3 is a schematic diagram of the definition of the downlink message application data APP-DATA field, as shown in Table 3:

表3
Table 3

其中,表3中的“XX”分别表示下行短信应用数据字段的长度(如表3中的长度)、手机号长度、手机号的值可变。Among them, "XX" in Table 3 respectively represents the length of the downlink SMS application data field (such as the length in Table 3), the length of the mobile phone number, and the variable value of the mobile phone number.

步骤S104,SIM卡接收业务系统通过短信网关发送的第二数据短信,基于第二数据短信,获取并存储用户信息。Step S104: The SIM card receives a second data SMS sent by the service system through the SMS gateway, and obtains and stores user information based on the second data SMS.

作为一种实现方式,SIM卡接收短信网关转发的业务系统发送的第二数据短信;解密第二数据短信,获取应用命令报文中的短信内容;解析短信内容,获取并存储用户信息。As an implementation method, the SIM card receives a second data SMS sent by a service system forwarded by an SMS gateway; decrypts the second data SMS to obtain SMS content in an application command message; and parses the SMS content to obtain and store user information.

可以理解为,SIM卡接收短信网关转发的业务系统发送的第二数据短信,对第二数据短信进行消息认证码校验,校验通过后解密第二数据短信,获取第二数据短信的内容,并解析该内容,提取手机号等用户信息,并将用户信息写入存储。It can be understood that the SIM card receives the second data SMS sent by the business system forwarded by the SMS gateway, performs a message authentication code verification on the second data SMS, decrypts the second data SMS after the verification passes, obtains the content of the second data SMS, parses the content, extracts user information such as the mobile phone number, and writes the user information into the storage.

可选的,SIM卡将用户信息存储于SIM卡的安全存储空间。Optionally, the SIM card stores the user information in a secure storage space of the SIM card.

步骤S105,第一终端向专网发送内网应用访问请求,其中,内网应用访问请求指示访问业务系统。Step S105: The first terminal sends an intranet application access request to the private network, wherein the intranet application access request indicates access to a business system.

需要说明的是,终端与专网对应,例如,在业务系统属于5G专网的内网应用时,第一终端为5G终端。It should be noted that the terminal corresponds to the private network. For example, when the business system belongs to the intranet application of the 5G private network, the first terminal is the 5G terminal.

在一些实施例中,第一终端向专网发送内网应用访问请求之前,还包括:第一终端向专网发送接入请求,接入请求指示专网验证第一终端的权限。In some embodiments, before the first terminal sends an intranet application access request to the private network, it also includes: the first terminal sends an access request to the private network, and the access request instructs the private network to verify the authority of the first terminal.

可以理解为,终端用户通过第一终端接入专网,运营商的核心网通过分配专网互联网协议(IP,Internet Protocol)地址,实现专网的一次鉴权。鉴权通过后,第一终端向专网发送内网应用访问请求,在请求访问企业内网应用时则会触发终端用户的身份认证核验。It can be understood that the terminal user accesses the private network through the first terminal, and the operator's core network implements one-time authentication of the private network by allocating the private network Internet Protocol (IP) address. After the authentication is passed, the first terminal sends an intranet application access request to the private network, and the terminal user's identity authentication verification will be triggered when requesting to access the enterprise intranet application.

在一些实施例中,第一终端接收SIM卡发送的监听入网事件注册请求,以便SIM卡监听到第一终端针对专网首次入网鉴权通过事件后,触发卡信息上报操作。In some embodiments, the first terminal receives a registration request for monitoring network access events sent by the SIM card, so that after the SIM card monitors an event that the first terminal passes the first network access authentication for the private network, a card information reporting operation is triggered.

步骤S106,网关设备拦截第一终端向专网发送的内网应用访问请求,重定向身份认证链接至第一终端。Step S106: The gateway device intercepts the intranet application access request sent by the first terminal to the private network, and redirects the identity authentication link to the first terminal.

可以理解为,网关设备拦截专网流量发起重定向请求。可选的,网关设备的接入网关模块拦截专网流量发起重定向请求。It can be understood that the gateway device intercepts the private network traffic and initiates the redirection request. Optionally, the access gateway module of the gateway device intercepts the private network traffic and initiates the redirection request.

示例性的,第一终端发送的内网应用访问请求的网络流量经交换机/路由器镜像到网关设备的接入网关模块,接入网关模块接收到交换机/路由器的镜像内网应用访问请求,发送传输控制协议(TCP,Transmission Control Protocol)重置(RESET)阻断包至交换机/路由器,并重定向身份认证链接(接入网关8081端口统一资源定位符(URL,Uniform Resource Locator))至第一终端。Exemplarily, the network traffic of the intranet application access request sent by the first terminal is mirrored to the access gateway module of the gateway device via the switch/router. The access gateway module receives the mirrored intranet application access request of the switch/router, sends a transmission control protocol (TCP, Transmission Control Protocol) reset (RESET) blocking packet to the switch/router, and redirects the authentication link (access gateway 8081 port uniform resource locator (URL, Uniform Resource Locator)) to the first terminal.

步骤S107,第一终端接收网关设备重定向的身份认证链接,并基于身份认证链接,向SIM卡发送第一指令,其中,第一指令指示获取用户信息。 Step S107: The first terminal receives the identity authentication link redirected by the gateway device, and sends a first instruction to the SIM card based on the identity authentication link, wherein the first instruction instructs obtaining user information.

可以理解为,第一终端向专网发送内网应用访问请求时,网关设备拦截第一终端向专网发送的内网应用访问请求,重定向身份认证链接至第一终端。It can be understood that when the first terminal sends an intranet application access request to the private network, the gateway device intercepts the intranet application access request sent by the first terminal to the private network and redirects the identity authentication link to the first terminal.

可以理解为,第一终端接收到身份认证链接之后,向SIM卡获取用户信息密文。It can be understood that after receiving the identity authentication link, the first terminal obtains the user information ciphertext from the SIM card.

可选的,第一指令为APDU指令,即第一终端向SIM卡发送APDU指令,APDU指令指示获取用户信息。Optionally, the first instruction is an APDU instruction, that is, the first terminal sends an APDU instruction to the SIM card, and the APDU instruction instructs obtaining user information.

步骤S108,SIM卡接收第一终端发送的第一指令,将用户信息发送至第一终端。Step S108: The SIM card receives the first instruction sent by the first terminal, and sends the user information to the first terminal.

可以理解为,用户通过第一终端接入专网,请求企业内网应用,则会触发用户身份核验。第一终端则向其内配置的SIM卡发送的第一指令请求获取之前SIM卡存储的用户信息。It can be understood that when a user accesses a private network through a first terminal and requests an enterprise intranet application, user identity verification will be triggered. The first terminal then sends a first instruction request to the SIM card configured therein to obtain user information previously stored in the SIM card.

作为一种实现方式,SIM卡建立与第一终端之间的安全访问通道;读取存储的用户信息,并加密用户信息,得到用户信息密文;将用户信息密文通过安全访问通道发送至第一终端。As an implementation method, the SIM card establishes a secure access channel with the first terminal; reads the stored user information, encrypts the user information, and obtains the user information ciphertext; and sends the user information ciphertext to the first terminal through the secure access channel.

可选地,SIM卡接收第一指令之后,读取保存在安全存储空间中的用户信息,通过卡内预置密钥对用户信息进行加密,得到用户信息密文。可选的,该密钥为SIM卡制卡过程预置,仅与业务系统共享,以保证数据安全性。Optionally, after receiving the first instruction, the SIM card reads the user information stored in the secure storage space, encrypts the user information using a key preset in the card, and obtains the user information ciphertext. Optionally, the key is preset during the SIM card manufacturing process and is only shared with the business system to ensure data security.

步骤S109,第一终端接收SIM卡发送的用户信息,并通过网关设备向业务系统发送第一信息;其中,第一信息包括用户信息。Step S109: The first terminal receives the user information sent by the SIM card, and sends first information to the service system through the gateway device; wherein the first information includes the user information.

在本实施例中,第一信息中的“信息”也可以是消息、信令、指令等名称。In this embodiment, the "information" in the first information may also be a name such as a message, a signaling, or an instruction.

需要说明的是,第一信息中的用户信息为用户信息密文。It should be noted that the user information in the first information is ciphertext of the user information.

作为一种实现方式,第一终端接收SIM卡发送的用户信息密文,并发送包括用户信息密文的代理身份认证请求,通过访问身份认证链接接入网关设备,将代理身份认证请求发送至网关设备的控制中心;其中,代理身份认证请求指示网关设备将用户信息透传至业务系统。As an implementation method, the first terminal receives the user information ciphertext sent by the SIM card, and sends a proxy identity authentication request including the user information ciphertext, accesses the gateway device through an access identity authentication link, and sends the proxy identity authentication request to the control center of the gateway device; wherein the proxy identity authentication request instructs the gateway device to transparently transmit the user information to the business system.

可以理解为,第一终端接收用户信息密文之后,通过网关设备将用户信息密文透传给业务系统。It can be understood that after the first terminal receives the user information ciphertext, it transparently transmits the user information ciphertext to the business system through the gateway device.

步骤S110,网关设备接收第一终端发送的第一信息,并将第一信息发送至业务系统。Step S110: The gateway device receives first information sent by the first terminal, and sends the first information to the service system.

作为一种实现方式,网关设备接收第一终端发送的代理身份认证请求,将用户信息发送至业务系统;其中,代理身份认证请求指示网关设备将用户信息发送至业务系统,代理身份认证请求包括第一信息。As an implementation method, the gateway device receives a proxy identity authentication request sent by the first terminal and sends the user information to the business system; wherein the proxy identity authentication request instructs the gateway device to send the user information to the business system, and the proxy identity authentication request includes the first information.

在一些实施例中,网关设备的控制中心接收第一终端通过身份认证链接发送的代理身份认证请求,将用户信息透传至业务系统。In some embodiments, the control center of the gateway device receives the proxy identity authentication request sent by the first terminal through the identity authentication link, and transparently transmits the user information to the business system.

需要说明的是,第一信息包括用户信息密文。It should be noted that the first information includes ciphertext of user information.

作为一种实现方式,控制中心接收代理身份认证请求,并将用户信息密文封装成通用认证接口协议报文;将通用认证接口协议报文发送至企业内网的业务系统的身份认证平台。由于传输过程中,全程为密文,保障了用户信息的安全传输。As an implementation method, the control center receives the proxy authentication request and encapsulates the user information ciphertext into a general authentication interface protocol message; and sends the general authentication interface protocol message to the identity authentication platform of the business system of the enterprise intranet. Since the entire transmission process is encrypted, the secure transmission of user information is guaranteed.

步骤S111,业务系统接收SIM卡所在的第一终端通过网关设备发送的第一信息,并基于第一信息中的用户信息对第一终端用户进行身份认证。Step S111: The service system receives first information sent by a first terminal where a SIM card is located through a gateway device, and performs identity authentication on a user of the first terminal based on user information in the first information.

也就是说,业务系统接收用户信息,并基于用户信息对第一终端用户进行身份认证。That is, the business system receives the user information and performs identity authentication on the first terminal user based on the user information.

作为一种实现方式,业务系统的身份认证平台解析接收到的通用认证接口协议报文,获取用户信息密文;通过本地私钥解密,获取用户信息;将用户信息与本地管理员配置的用户信息白名单进行比对,校验通过,方能访问,即授权该第一终端用户访问业务系统。As an implementation method, the identity authentication platform of the business system parses the received general authentication interface protocol message to obtain the user information ciphertext; decrypts it through the local private key to obtain the user information; compares the user information with the user information whitelist configured by the local administrator, and only allows access after verification, that is, authorizes the first terminal user to access the business system.

通过实施本实施例,通过SIM卡上报卡信息至专网内的业务系统,将业务系统返回的用户信息存储于SIM卡;当SIM卡所在的第一终端请求访问业务系统时,网关设备重定向身份认证,第一终端则将存储于SIM卡的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。业务系统通过SIM卡和短信网关实现用户信息的采集及绑定,无需界面搜集用户信息,体验佳。通过SIM卡硬介质层面对用户信息进行加密,全程密文传输,实现安全认证。通过网关设备重定向进行用户身份信息校验,可覆盖全终端,易于推广。By implementing this embodiment, the card information is reported to the business system in the private network through the SIM card, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the gateway device redirects the identity authentication, and the first terminal sends the user information stored in the SIM card to the business system for identity authentication. The private network user side can independently manage the access rights of users to access the business system through the private network, and realize the identity authentication control on the private network enterprise side. The business system collects and binds user information through the SIM card and the SMS gateway, without the need for an interface to collect user information, and provides a good experience. User information is encrypted at the hard medium layer of the SIM card, and encrypted text is transmitted throughout the process to achieve secure authentication. User identity information verification is performed through gateway device redirection, which can cover all terminals and is easy to promote.

在上述实施例的基础上,图6是根据另一示例性实施例示出的一种专网安全认证方法的流程图。该方法应用于SIM卡。如图6所示,该专网安全认证方法可以包括如下步骤。Based on the above embodiment, FIG6 is a flow chart of a private network security authentication method according to another exemplary embodiment. The method is applied to a SIM card. As shown in FIG6, the private network security authentication method may include the following steps.

步骤S601,响应于触发卡信息上报操作,通过短信网关向业务系统发送第一数据短信,其中,第一数据短信包括卡信息。 Step S601, in response to triggering a card information reporting operation, sending a first data SMS to a business system through an SMS gateway, wherein the first data SMS includes card information.

步骤S602,接收业务系统通过短信网关发送的第二数据短信,基于第二数据短信,获取并存储用户信息;其中,用户信息包括手机号。Step S602, receiving a second data SMS sent by the business system through the SMS gateway, and acquiring and storing user information based on the second data SMS; wherein the user information includes a mobile phone number.

步骤S603,接收SIM卡所在的第一终端发送的第一指令,将用户信息发送至第一终端,以使第一终端基于用户信息请求业务系统对第一终端用户进行身份认证;其中,第一指令指示获取用户信息。Step S603, receiving a first instruction sent by the first terminal where the SIM card is located, and sending user information to the first terminal, so that the first terminal requests the service system to perform identity authentication on the first terminal user based on the user information; wherein the first instruction instructs obtaining user information.

将用户信息发送至第一终端,以便第一终端通过网关设备将用户信息发送至业务系统,以请求业务系统对第一终端用户进行身份认证。The user information is sent to the first terminal, so that the first terminal sends the user information to the business system through the gateway device to request the business system to perform identity authentication on the first terminal user.

需要说明的是,在本申请的实施例中,步骤S601-步骤S603的实现过程可参见本申请图1所示的实施例中对应步骤的实现过程的描述,在此不再赘述。It should be noted that in the embodiment of the present application, the implementation process of steps S601 to S603 can refer to the description of the implementation process of the corresponding steps in the embodiment shown in FIG. 1 of the present application, and will not be repeated here.

通过实施本实施例,通过SIM卡上报卡信息至专网内的业务系统,并将业务系统返回的用户信息存储于SIM卡;当SIM卡所在的第一终端请求访问业务系统时,第一终端则将存储于SIM卡的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。业务系统通过SIM卡和短信网关实现用户信息的采集及绑定,无需界面搜集用户信息,体验佳。通过SIM卡硬介质层面对用户信息进行加密,全程密文传输,实现安全认证。By implementing this embodiment, the card information is reported to the business system in the private network through the SIM card, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the first terminal sends the user information stored in the SIM card to the business system for identity authentication. The private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized. The business system collects and binds user information through the SIM card and the SMS gateway, without the need for an interface to collect user information, and provides a good experience. User information is encrypted at the hard medium layer of the SIM card, and encrypted text is transmitted throughout the process to achieve secure authentication.

在上述任一实施例的基础上,图7是根据又一示例性实施例示出的一种专网安全认证方法的流程图。该方法应用于第一终端,第一终端包括SIM卡;如图7所示,该专网安全认证方法可以包括如下步骤。Based on any of the above embodiments, Figure 7 is a flow chart of a private network security authentication method according to another exemplary embodiment. The method is applied to a first terminal, and the first terminal includes a SIM card; as shown in Figure 7, the private network security authentication method may include the following steps.

步骤S701,向专网发送内网应用访问请求,其中,内网应用访问请求指示访问业务系统。Step S701: Send an intranet application access request to a private network, wherein the intranet application access request indicates access to a business system.

第一终端向专网发送内网应用访问请求,其中,内网应用访问请求指示访问业务系统。The first terminal sends an intranet application access request to the private network, wherein the intranet application access request indicates access to a business system.

步骤S702,接收网关设备重定向的身份认证链接,并基于身份认证链接,向SIM卡发送第一指令。Step S702: receiving an identity authentication link redirected by a gateway device, and sending a first instruction to the SIM card based on the identity authentication link.

其中,第一指令指示获取用户信息,用户信息为业务系统基于SIM卡上报的卡信息发送至SIM卡的,用户信息包括手机号。The first instruction instructs to obtain user information, where the user information is sent to the SIM card by the service system based on the card information reported by the SIM card, and the user information includes a mobile phone number.

步骤S703,接收SIM卡发送的用户信息,并通过网关设备向业务系统发送第一信息,以及基于第一信息中的用户信息请求业务系统对第一终端用户进行身份认证。Step S703: receiving user information sent by the SIM card, sending first information to the service system through the gateway device, and requesting the service system to perform identity authentication on the first terminal user based on the user information in the first information.

需要说明的是,在本申请的实施例中,步骤S701-步骤S703的实现过程可参见本申请图1所示的实施例中对应步骤的实现过程的描述,在此不再赘述。It should be noted that in the embodiment of the present application, the implementation process of steps S701 to S703 can refer to the description of the implementation process of the corresponding steps in the embodiment shown in FIG. 1 of the present application, and will not be repeated here.

通过实施本实施例,通过SIM卡上报卡信息至专网内的业务系统,将业务系统返回的用户信息存储于SIM卡;当SIM卡所在的第一终端请求访问业务系统时,网关设备重定向身份认证,第一终端则将存储于SIM卡的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。By implementing this embodiment, the card information is reported to the business system in the private network through the SIM card, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the gateway device redirects the identity authentication, and the first terminal sends the user information stored in the SIM card to the business system for identity authentication. The private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized.

在上述任一实施例的基础上,图8是根据又一示例性实施例示出的一种专网安全认证方法的流程图。该方法应用于网关设备;如图8所示,该专网安全认证方法可以包括如下步骤。Based on any of the above embodiments, Fig. 8 is a flow chart of a private network security authentication method according to another exemplary embodiment. The method is applied to a gateway device; as shown in Fig. 8, the private network security authentication method may include the following steps.

步骤S801,拦截第一终端向专网发送的内网应用访问请求,重定向身份认证链接至第一终端;其中,第一终端包括SIM卡,内网应用访问请求指示访问业务系统。Step S801, intercepting an intranet application access request sent by a first terminal to a private network, and redirecting an identity authentication link to the first terminal; wherein the first terminal includes a SIM card, and the intranet application access request indicates access to a service system.

步骤S802,接收第一终端发送的第一信息,并将第一信息发送至业务系统,其中,第一信息包括用户信息,用户信息为业务系统基于SIM卡上报的卡信息发送至SIM卡的,用户信息包括手机号,用户信息用于第一终端请求业务系统对第一终端用户进行身份认证。Step S802, receiving the first information sent by the first terminal, and sending the first information to the business system, wherein the first information includes user information, the user information is sent to the SIM card by the business system based on the card information reported by the SIM card, the user information includes the mobile phone number, and the user information is used by the first terminal to request the business system to authenticate the first terminal user.

需要说明的是,在本申请的实施例中,步骤S801-步骤S802的实现过程可参见本申请图1所示的实施例中对应步骤的实现过程的描述,在此不再赘述。It should be noted that in the embodiment of the present application, the implementation process of step S801-step S802 can refer to the description of the implementation process of the corresponding steps in the embodiment shown in Figure 1 of the present application, and will not be repeated here.

通过实施本实施例,当SIM卡所在的第一终端请求访问业务系统时,网关设备重定向身份认证,第一终端则将存储于SIM卡的业务系统基于SIM卡上报的卡信息返回的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。通过网关设备重定向进行用户身份信息校验,可覆盖全终端,易于推广。By implementing this embodiment, when the first terminal where the SIM card is located requests to access the service system, the gateway device redirects the identity authentication, and the first terminal sends the user information returned by the service system stored in the SIM card based on the card information reported by the SIM card to the service system for identity authentication. The private network user side can independently manage the access rights of users to access the service system through the private network, and the identity authentication control on the private network enterprise side is realized. By redirecting the user identity information through the gateway device, it can cover all terminals and is easy to promote.

在上述任一实施例的基础上,图9是根据又一示例性实施例示出的一种专网安全认证方法的流程图。该方法应用于专网内的业务系统;如图9所示,该专网安全认证方法可以包括如下步骤。Based on any of the above embodiments, Figure 9 is a flow chart of a private network security authentication method according to another exemplary embodiment. The method is applied to a service system in a private network; as shown in Figure 9, the private network security authentication method may include the following steps.

步骤S901,接收SIM卡通过短信网关发送的第一数据短信,其中,第一数据短信包括卡信息。 Step S901: receiving a first data SMS sent by a SIM card via a SMS gateway, wherein the first data SMS includes card information.

步骤S902,基于第一数据短信,获取SIM卡对应的手机号和卡信息,并记录卡信息与手机号的绑定关系。Step S902: based on the first data SMS, obtain the mobile phone number and card information corresponding to the SIM card, and record the binding relationship between the card information and the mobile phone number.

步骤S903,通过短信网关向SIM卡发送第二数据短信,其中,第二数据短信包括用户信息,用户信息包括手机号。Step S903: Send a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes a mobile phone number.

步骤S904,接收SIM卡所在的第一终端通过网关设备发送的第一信息,并基于第一信息中的用户信息对第一终端用户进行身份认证。Step S904: receiving first information sent by the first terminal where the SIM card is located through the gateway device, and performing identity authentication on the first terminal user based on the user information in the first information.

需要说明的是,在本申请的实施例中,步骤S901-步骤S904的实现过程可参见本申请图1所示的实施例中对应步骤的实现过程的描述,在此不再赘述。It should be noted that in the embodiment of the present application, the implementation process of step S901 to step S904 can refer to the description of the implementation process of the corresponding steps in the embodiment shown in Figure 1 of the present application, and will not be repeated here.

通过实施本实施例,通过SIM卡上报卡信息至专网内的业务系统,业务系统返回用户信息至SIM卡;当SIM卡所在的第一终端请求访问业务系统时,第一终端则将存储于SIM卡的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。业务系统通过SIM卡和短信网关实现用户信息的采集及绑定,无需界面搜集用户信息,体验佳。By implementing this embodiment, the card information is reported to the business system in the private network through the SIM card, and the business system returns the user information to the SIM card; when the first terminal where the SIM card is located requests to access the business system, the first terminal sends the user information stored in the SIM card to the business system for identity authentication. The private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized. The business system collects and binds user information through the SIM card and the SMS gateway, without the need for an interface to collect user information, and provides a good experience.

在上述任一实施例的基础上,图10是根据一示例性实施例示出的一种专网安全认证装置的框图,该装置配置于SIM卡。参照图10,该专网安全认证装置可以包括:卡信息上报模块1001和第一收发模块1002。Based on any of the above embodiments, FIG10 is a block diagram of a private network security authentication device according to an exemplary embodiment, and the device is configured in a SIM card. Referring to FIG10 , the private network security authentication device may include: a card information reporting module 1001 and a first transceiver module 1002 .

具体地,卡信息上报模块1001,被配置为响应于触发卡信息上报操作,通过短信网关向业务系统发送第一数据短信,其中,第一数据短信包括卡信息;Specifically, the card information reporting module 1001 is configured to send a first data SMS to the business system through the SMS gateway in response to triggering the card information reporting operation, wherein the first data SMS includes the card information;

卡信息上报模块1001,还被配置为接收业务系统通过短信网关发送的第二数据短信,基于第二数据短信,获取并存储用户信息;其中,用户信息包括手机号;The card information reporting module 1001 is further configured to receive a second data SMS sent by the business system through the SMS gateway, and obtain and store user information based on the second data SMS; wherein the user information includes a mobile phone number;

第一收发模块1002,被配置为接收SIM卡所在的第一终端发送的第一指令,将用户信息发送至第一终端,以使第一终端基于用户信息请求业务系统对第一终端用户进行身份认证;其中,第一指令指示获取用户信息。The first transceiver module 1002 is configured to receive a first instruction sent by a first terminal where the SIM card is located, and send user information to the first terminal so that the first terminal requests the service system to perform identity authentication on the first terminal user based on the user information; wherein the first instruction indicates obtaining user information.

在一些实现方式中,卡信息上报模块1001,还被配置为:In some implementations, the card information reporting module 1001 is further configured to:

响应于触发卡信息上报操作之前,向第一终端注册监听入网事件;In response to triggering the card information reporting operation, registering with the first terminal to monitor network access events;

监听到第一终端首次入网鉴权通过事件,触发卡信息上报操作。An event that the first terminal passes the first network access authentication is monitored, triggering a card information reporting operation.

在一些实现方式中,卡信息上报模块1001,被配置为:In some implementations, the card information reporting module 1001 is configured to:

读取卡信息,并将卡信息组装于第一数据短信的响应数据包中;通过短信网关向业务系统发送第一数据短信的响应数据包。Read the card information and assemble the card information into a response data packet of the first data SMS; send the response data packet of the first data SMS to the business system through the SMS gateway.

在一些实现方式中,卡信息上报模块1001,被配置为:In some implementations, the card information reporting module 1001 is configured to:

接收短信网关转发的业务系统发送的第二数据短信;其中,第二数据短信包括应用命令报文,应用命令报文包括用户信息;Receive a second data SMS sent by the service system forwarded by the SMS gateway; wherein the second data SMS includes an application command message, and the application command message includes user information;

解密第二数据短信,获取应用命令报文中的短信内容;Decrypt the second data SMS message to obtain SMS content in the application command message;

解析短信内容,获取并存储用户信息。Parse SMS content, obtain and store user information.

在一些实现方式中,第一收发模块1002,被配置为:In some implementations, the first transceiver module 1002 is configured to:

建立与第一终端之间的安全访问通道;Establishing a secure access channel with the first terminal;

读取用户信息;并加密用户信息,得到用户信息密文;Read user information; and encrypt the user information to obtain the ciphertext of the user information;

将用户信息密文通过安全访问通道发送至第一终端。The user information ciphertext is sent to the first terminal through a secure access channel.

在一些实现方式中,响应数据包包括卡应用主版本号、安全参数标识、应用响应数据包和MAC地址,应用响应数据包包括卡信息,安全参数标识包括加密标识和环境标识。In some implementations, the response data packet includes the card application major version number, the security parameter identifier, the application response data packet and the MAC address, the application response data packet includes the card information, and the security parameter identifier includes the encryption identifier and the environment identifier.

在一些实现方式中,卡信息上报模块1001,被配置为:In some implementations, the card information reporting module 1001 is configured to:

将用户信息存储于SIM卡的安全存储空间。Store user information in the secure storage space of the SIM card.

关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the device in the above embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment of the method, and will not be elaborated here.

通过实施本实施例,通过SIM卡上报卡信息至专网内的业务系统,并将业务系统返回的用户信息存储于SIM卡;当SIM卡所在的第一终端请求访问业务系统时,第一终端则将存储于SIM卡的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。业务系统通过SIM卡和短信网关实现用户信息 的采集及绑定,无需界面搜集用户信息,体验佳。通过SIM卡硬介质层面对用户信息进行加密,全程密文传输,实现安全认证。By implementing this embodiment, the card information is reported to the business system in the private network through the SIM card, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the first terminal sends the user information stored in the SIM card to the business system for identity authentication. The private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control of the private network enterprise side is realized. The business system realizes user information through the SIM card and SMS gateway The user information is collected and bound without the need for an interface, providing a better experience. User information is encrypted through the hard medium layer of the SIM card, and the entire process is encrypted to achieve secure authentication.

在上述任一实施例的基础上,图11是根据另一示例性实施例示出的一种专网安全认证装置的框图,该装置配置于第一终端,第一终端包括SIM卡。参照图11,该专网安全认证装置可以包括:第二收发模块1101。Based on any of the above embodiments, FIG11 is a block diagram of a private network security authentication device according to another exemplary embodiment, the device is configured in a first terminal, and the first terminal includes a SIM card. Referring to FIG11 , the private network security authentication device may include: a second transceiver module 1101 .

具体地,第二收发模块1101,被配置为向专网发送内网应用访问请求,其中,内网应用访问请求指示访问业务系统;Specifically, the second transceiver module 1101 is configured to send an intranet application access request to the private network, wherein the intranet application access request indicates access to the business system;

第二收发模块1101,还被配置为接收网关设备重定向的身份认证链接,并基于身份认证链接,向SIM卡发送第一指令,其中,第一指令指示获取用户信息,用户信息为业务系统基于SIM卡上报的卡信息发送至SIM卡的,用户信息包括手机号;The second transceiver module 1101 is further configured to receive an identity authentication link redirected by the gateway device, and send a first instruction to the SIM card based on the identity authentication link, wherein the first instruction instructs to obtain user information, the user information is sent to the SIM card by the service system based on the card information reported by the SIM card, and the user information includes a mobile phone number;

第二收发模块1101,还被配置为接收SIM卡发送的用户信息,并通过网关设备向业务系统发送第一信息,以及基于第一信息中的用户信息请求业务系统对第一终端用户进行身份认证。The second transceiver module 1101 is further configured to receive user information sent by the SIM card, send first information to the service system through the gateway device, and request the service system to perform identity authentication on the first terminal user based on the user information in the first information.

在一些实现方式中,第二收发模块1101,还被配置为:In some implementations, the second transceiver module 1101 is further configured to:

第一终端向专网发送内网应用访问请求之前,向专网发送接入请求,接入请求指示专网验证第一终端的权限。Before sending an intranet application access request to the private network, the first terminal sends an access request to the private network, where the access request instructs the private network to verify the authority of the first terminal.

在一些实现方式中,第二收发模块1101,还被配置为:In some implementations, the second transceiver module 1101 is further configured to:

接收SIM卡发送的监听入网事件注册请求。Receive the registration request for monitoring network access events sent by the SIM card.

关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the device in the above embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment of the method, and will not be elaborated here.

通过实施本实施例,通过SIM卡上报卡信息至专网内的业务系统,将业务系统返回的用户信息存储于SIM卡;当SIM卡所在的第一终端请求访问业务系统时,网关设备重定向身份认证,第一终端则将存储于SIM卡的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。By implementing this embodiment, the card information is reported to the business system in the private network through the SIM card, and the user information returned by the business system is stored in the SIM card; when the first terminal where the SIM card is located requests to access the business system, the gateway device redirects the identity authentication, and the first terminal sends the user information stored in the SIM card to the business system for identity authentication. The private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized.

在上述任一实施例的基础上,图12是根据又一示例性实施例示出的一种专网安全认证装置的框图,该装置配置于网关设备。参照图12,该专网安全认证装置可以包括:接入网关模块1201和控制中心模块1202。Based on any of the above embodiments, FIG12 is a block diagram of a private network security authentication device according to another exemplary embodiment, and the device is configured in a gateway device. Referring to FIG12 , the private network security authentication device may include: an access gateway module 1201 and a control center module 1202 .

具体地,接入网关模块1201,被配置为拦截第一终端向专网发送的内网应用访问请求,重定向身份认证链接至第一终端;其中,第一终端包括SIM卡,内网应用访问请求指示访问业务系统;Specifically, the access gateway module 1201 is configured to intercept an intranet application access request sent by the first terminal to the private network, and redirect the identity authentication link to the first terminal; wherein the first terminal includes a SIM card, and the intranet application access request indicates access to the service system;

控制中心模块1202,被配置为接收第一终端发送的第一信息,并将第一信息发送至业务系统,其中,第一信息包括用户信息,用户信息为业务系统基于SIM卡上报的卡信息发送至SIM卡的,用户信息包括手机号,用户信息用于第一终端请求业务系统对第一终端用户进行身份认证。The control center module 1202 is configured to receive the first information sent by the first terminal and send the first information to the business system, wherein the first information includes user information, and the user information is sent to the SIM card by the business system based on the card information reported by the SIM card. The user information includes a mobile phone number, and the user information is used by the first terminal to request the business system to authenticate the identity of the first terminal user.

关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the device in the above embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment of the method, and will not be elaborated here.

通过实施本实施例,当SIM卡所在的第一终端请求访问业务系统时,网关设备重定向身份认证,第一终端则将存储于SIM卡的业务系统基于SIM卡上报的卡信息返回的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。通过网关设备重定向进行用户身份信息校验,可覆盖全终端,易于推广。By implementing this embodiment, when the first terminal where the SIM card is located requests to access the service system, the gateway device redirects the identity authentication, and the first terminal sends the user information returned by the service system stored in the SIM card based on the card information reported by the SIM card to the service system for identity authentication. The private network user side can independently manage the access rights of users to access the service system through the private network, and the identity authentication control on the private network enterprise side is realized. By redirecting the user identity information through the gateway device, it can cover all terminals and is easy to promote.

在上述任一实施例的基础上,图13是根据又一示例性实施例示出的一种专网安全认证装置的框图,该装置配置于专网内的业务系统。参照图13,该专网安全认证装置可以包括:第三收发模块1301、处理模块1302和身份认证模块1303。Based on any of the above embodiments, FIG13 is a block diagram of a private network security authentication device according to another exemplary embodiment, and the device is configured in a service system in a private network. Referring to FIG13 , the private network security authentication device may include: a third transceiver module 1301, a processing module 1302, and an identity authentication module 1303.

具体地,第三收发模块1301,被配置为接收SIM卡通过短信网关发送的第一数据短信,其中,第一数据短信包括卡信息。Specifically, the third transceiver module 1301 is configured to receive a first data SMS sent by the SIM card through the SMS gateway, wherein the first data SMS includes card information.

处理模块1302,被配置为基于第一数据短信,获取SIM卡对应的手机号和卡信息,并记录卡信息与手机号的绑定关系。The processing module 1302 is configured to obtain the mobile phone number and card information corresponding to the SIM card based on the first data SMS, and record the binding relationship between the card information and the mobile phone number.

第三收发模块1301,还被配置为通过短信网关向SIM卡发送第二数据短信,其中,第二数据短信包括用户信息,用户信息包括手机号。The third transceiver module 1301 is further configured to send a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes a mobile phone number.

身份认证模块1303,被配置为接收SIM卡所在的第一终端通过网关设备发送的第一信息,并基于第一信息中的用户信息对第一终端用户进行身份认证。 The identity authentication module 1303 is configured to receive first information sent by the first terminal where the SIM card is located through the gateway device, and perform identity authentication on the first terminal user based on the user information in the first information.

关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the device in the above embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment of the method, and will not be elaborated here.

通过实施本实施例,通过SIM卡上报卡信息至专网内的业务系统,业务系统返回用户信息至SIM卡;当SIM卡所在的第一终端请求访问业务系统时,第一终端则将存储于SIM卡的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。业务系统通过SIM卡和短信网关实现用户信息的采集及绑定,无需界面搜集用户信息,体验佳。By implementing this embodiment, the card information is reported to the business system in the private network through the SIM card, and the business system returns the user information to the SIM card; when the first terminal where the SIM card is located requests to access the business system, the first terminal sends the user information stored in the SIM card to the business system for identity authentication. The private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized. The business system collects and binds user information through the SIM card and the SMS gateway, without the need for an interface to collect user information, and provides a good experience.

在上述任一实施例的基础上,图14是根据一示例性实施例示出的一种专网安全认证系统的框图,参照图14,该专网安全认证系统可以包括:SIM卡1401,SIM卡所在的第一终端(如5G终端)1402、短信网关1403、网关设备1404和业务系统1405。Based on any of the above embodiments, Figure 14 is a block diagram of a private network security authentication system according to an exemplary embodiment. Referring to Figure 14, the private network security authentication system may include: a SIM card 1401, a first terminal (such as a 5G terminal) where the SIM card is located 1402, a SMS gateway 1403, a gateway device 1404 and a business system 1405.

具体地,SIM卡1401,被配置为执行图6所示的专网安全认证方法;Specifically, the SIM card 1401 is configured to execute the private network security authentication method shown in FIG6 ;

SIM卡所在的第一终端1402,被配置为执行图7所示的专网安全认证方法;The first terminal 1402 where the SIM card is located is configured to execute the private network security authentication method shown in FIG7 ;

网关设备1404,被配置为执行图8所示的专网安全认证方法;The gateway device 1404 is configured to execute the private network security authentication method shown in FIG8 ;

业务系统1405,被配置为执行图9所示的专网安全认证方法。The business system 1405 is configured to execute the private network security authentication method shown in FIG. 9 .

通过实施本实施例,通过SIM卡上报卡信息至专网内的业务系统,业务系统返回用户信息至SIM卡;当SIM卡所在的第一终端请求访问业务系统时,第一终端则将存储于SIM卡的用户信息发送至业务系统进行身份认证。实现了专网用户侧自主管理用户通过专网访问业务系统的准入权限,实现了专网企业侧的身份认证管控。业务系统通过SIM卡和短信网关实现用户信息的采集及绑定,无需界面搜集用户信息,体验佳。By implementing this embodiment, the card information is reported to the business system in the private network through the SIM card, and the business system returns the user information to the SIM card; when the first terminal where the SIM card is located requests to access the business system, the first terminal sends the user information stored in the SIM card to the business system for identity authentication. The private network user side can independently manage the access rights of users to access the business system through the private network, and the identity authentication control on the private network enterprise side is realized. The business system collects and binds user information through the SIM card and the SMS gateway, without the need for an interface to collect user information, and provides a good experience.

根据本申请的实施例,本申请还提供了一种电子设备和一种可读存储介质。According to an embodiment of the present application, the present application also provides an electronic device and a readable storage medium.

图15是根据一示例性实施例示出的一种电子设备的框图,该电子设备是用于实现专网安全认证的方法的电子设备。电子设备旨在表示各种形式的数字计算机,诸如,膝上型计算机、台式计算机、工作台、个人数字助理、服务器、刀片式服务器、大型计算机、和其它适合的计算机。电子设备还可以表示各种形式的移动装置,诸如,个人数字处理、蜂窝电话、智能电话、可穿戴设备和其它类似的计算装置。本文所示的部件、它们的连接和关系、以及它们的功能仅仅作为示例,并且不意在限制本文中描述的和/或者要求的本申请的实现。Figure 15 is a block diagram of an electronic device shown according to an exemplary embodiment, which is an electronic device for implementing a method for private network security authentication. The electronic device is intended to represent various forms of digital computers, such as laptop computers, desktop computers, workbenches, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers. The electronic device can also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices and other similar computing devices. The components shown herein, their connections and relationships, and their functions are merely examples and are not intended to limit the implementation of the present application described and/or required herein.

如图15所示,该电子设备包括:一个或多个处理器1501、存储器1502,以及用于连接各部件的接口,包括高速接口和低速接口。各个部件利用不同的总线互相连接,并且可以被安装在公共主板上或者根据需要以其它方式安装。处理器可以对在电子设备内执行的指令进行处理,包括存储在存储器中或者存储器上以在外部输入/输出装置(诸如,耦合至接口的显示设备)上显示图形用户界面(GUI,Graphical User Interface)的图形信息的指令。在其它实施方式中,若需要,可以将多个处理器和/或多条总线与多个存储器一起使用。同样,可以连接多个电子设备,各个设备提供部分必要的操作(例如,作为服务器阵列、一组刀片式服务器、或者多处理器系统)。图15中以一个处理器1501为例。As shown in Figure 15, the electronic device includes: one or more processors 1501, a memory 1502, and interfaces for connecting various components, including high-speed interfaces and low-speed interfaces. The various components are connected to each other using different buses and can be installed on a common motherboard or installed in other ways as needed. The processor can process instructions executed in the electronic device, including instructions stored in or on the memory to display graphical information of a graphical user interface (GUI, Graphical User Interface) on an external input/output device (such as a display device coupled to the interface). In other embodiments, if necessary, multiple processors and/or multiple buses can be used with multiple memories. Similarly, multiple electronic devices can be connected, and each device provides some necessary operations (for example, as a server array, a group of blade servers, or a multi-processor system). Figure 15 takes a processor 1501 as an example.

存储器1502即为本申请所提供的非瞬时计算机可读存储介质。其中,所述存储器1502存储有可由至少一个处理器1501执行的指令,以使所述至少一个处理器1501执行本申请所提供的专网安全认证的方法。本申请的非瞬时计算机可读存储介质存储计算机指令,该计算机指令被配置为使计算机执行本申请所提供的专网安全认证的方法。The memory 1502 is the non-transitory computer-readable storage medium provided in the present application. The memory 1502 stores instructions executable by at least one processor 1501, so that the at least one processor 1501 performs the method for private network security authentication provided in the present application. The non-transitory computer-readable storage medium of the present application stores computer instructions, which are configured to enable a computer to perform the method for private network security authentication provided in the present application.

存储器1502作为一种非瞬时计算机可读存储介质,可用于存储非瞬时软件程序、非瞬时计算机可执行程序以及模块,如本申请实施例中的专网安全认证的方法对应的程序指令/模块(例如,附图12所示的接入网关模块1201和控制中心模块1202)。处理器1501通过运行存储在存储器1502中的非瞬时软件程序、指令以及模块,从而执行服务器的各种功能应用以及数据处理,即实现上述方法实施例中的专网安全认证的方法。The memory 1502, as a non-transient computer-readable storage medium, can be used to store non-transient software programs, non-transient computer executable programs and modules, such as the program instructions/modules corresponding to the method for private network security authentication in the embodiment of the present application (for example, the access gateway module 1201 and the control center module 1202 shown in FIG. 12). The processor 1501 executes various functional applications and data processing of the server by running the non-transient software programs, instructions and modules stored in the memory 1502, that is, implements the method for private network security authentication in the above method embodiment.

存储器1502可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储根据专网安全认证的电子设备的使用所创建的数据等。此外,存储器1502可以包括高速随机存取存储器,还可以包括非瞬时存储器,例如至少一个磁盘存储器件、闪存器件、或其他非瞬时固态存储器件。在一些实施例中,存储器1502可选包括相对于处理器1501远程设置的远程存储器,这些远程存储器可以通过网络连接至专网安全认证的 电子设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory 1502 may include a program storage area and a data storage area, wherein the program storage area may store an operating system and at least one application required for a function; the data storage area may store data created based on the use of the electronic device with private network security authentication, etc. In addition, the memory 1502 may include a high-speed random access memory, and may also include a non-transient memory, such as at least one disk storage device, a flash memory device, or other non-transient solid-state storage device. In some embodiments, the memory 1502 may optionally include a remote memory remotely located relative to the processor 1501, and these remote memories may be connected to the private network security authentication through a network. Electronic devices. Examples of the above network include, but are not limited to, the Internet, corporate intranets, local area networks, mobile communication networks, and combinations thereof.

专网安全认证的电子设备还可以包括:输入装置1503和输出装置1504。处理器1501、存储器1502、输入装置1503和输出装置1504可以通过总线或者其他方式连接,图15中以通过总线连接为例。The electronic device for private network security authentication may further include: an input device 1503 and an output device 1504. The processor 1501, the memory 1502, the input device 1503 and the output device 1504 may be connected via a bus or other means, and FIG15 takes the bus connection as an example.

输入装置1503可接收输入的数字或字符信息,以及产生与专网安全认证的电子设备的用户设置以及功能控制有关的键信号输入,例如触摸屏、小键盘、鼠标、轨迹板、触摸板、指示杆、一个或者多个鼠标按钮、轨迹球、操纵杆等输入装置。输出装置1504可以包括显示设备、辅助照明装置(例如,发光二极管(LED,Light Emitting Diode))和触觉反馈装置(例如,振动电机)等。该显示设备可以包括但不限于液晶显示器(LCD,Liquid Crystal Display)、LED显示器和等离子体显示器。在一些实施方式中,显示设备可以是触摸屏。The input device 1503 can receive input digital or character information, and generate key signal input related to user settings and function control of the electronic device with private network security authentication, such as a touch screen, a keypad, a mouse, a track pad, a touch pad, an indicator rod, one or more mouse buttons, a trackball, a joystick and other input devices. The output device 1504 may include a display device, an auxiliary lighting device (e.g., a light emitting diode (LED)) and a tactile feedback device (e.g., a vibration motor). The display device may include, but is not limited to, a liquid crystal display (LCD), an LED display and a plasma display. In some embodiments, the display device may be a touch screen.

此处描述的系统和技术的各种实施方式可以在数字电子电路系统、集成电路系统、专用集成电路(ASIC,Application Specific Integrated Circuit)、计算机硬件、固件、软件、和/或它们的组合中实现。这些各种实施方式可以包括:实施在一个或者多个计算机程序中,该一个或者多个计算机程序可在包括至少一个可编程处理器的可编程系统上执行和/或解释,该可编程处理器可以是专用或者通用可编程处理器,可以从存储系统、至少一个输入装置、和至少一个输出装置接收数据和指令,并且将数据和指令传输至该存储系统、该至少一个输入装置、和该至少一个输出装置。Various implementations of the systems and techniques described herein can be implemented in digital electronic circuit systems, integrated circuit systems, application specific integrated circuits (ASICs), computer hardware, firmware, software, and/or combinations thereof. These various implementations can include: being implemented in one or more computer programs that can be executed and/or interpreted on a programmable system including at least one programmable processor, which can be a special purpose or general purpose programmable processor that can receive data and instructions from a storage system, at least one input device, and at least one output device, and transmit data and instructions to the storage system, the at least one input device, and the at least one output device.

这些计算程序(也称作程序、软件、软件应用、或者代码)包括可编程处理器的机器指令,并且可以利用高级过程和/或面向对象的编程语言、和/或汇编/机器语言来实施这些计算程序。如本文使用的,术语“机器可读介质”和“计算机可读介质”指的是用于将机器指令和/或数据提供给可编程处理器的任何计算机程序产品、设备、和/或装置(例如,磁盘、光盘、存储器、可编程逻辑装置(PLD,Programmable Logic Device)),包括,接收作为机器可读信号的机器指令的机器可读介质。术语“机器可读信号”指的是用于将机器指令和/或数据提供给可编程处理器的任何信号。These computer programs (also referred to as programs, software, software applications, or code) include machine instructions for programmable processors and can be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, device, and/or device (e.g., disk, optical disk, memory, programmable logic device (PLD)) for providing machine instructions and/or data to a programmable processor, including machine-readable media that receives machine instructions as machine-readable signals. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.

为了提供与用户的交互,可以在计算机上实施此处描述的系统和技术,该计算机具有:用于向用户显示信息的显示装置(例如,阴极射线管(CRT,Cathode Ray Tube)或者LCD监视器);以及键盘和指向装置(例如,鼠标或者轨迹球),用户可以通过该键盘和该指向装置来将输入提供给计算机。其它种类的装置还可以用于提供与用户的交互;例如,提供给用户的反馈可以是任何形式的传感反馈(例如,视觉反馈、听觉反馈、或者触觉反馈);并且可以用任何形式(包括声输入、语音输入或者、触觉输入)来接收来自用户的输入。To provide interaction with a user, the systems and techniques described herein can be implemented on a computer having: a display device (e.g., a cathode ray tube (CRT) or an LCD monitor) for displaying information to the user; and a keyboard and pointing device (e.g., a mouse or trackball) through which the user can provide input to the computer. Other types of devices can also be used to provide interaction with the user; for example, the feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user can be received in any form (including acoustic input, voice input, or tactile input).

可以将此处描述的系统和技术实施在包括后台部件的计算系统(例如,作为数据服务器)、或者包括中间件部件的计算系统(例如,应用服务器)、或者包括前端部件的计算系统(例如,具有图形用户界面或者网络浏览器的用户计算机,用户可以通过该图形用户界面或者该网络浏览器来与此处描述的系统和技术的实施方式交互)、或者包括这种后台部件、中间件部件、或者前端部件的任何组合的计算系统中。可以通过任何形式或者介质的数字数据通信(例如,通信网络)来将系统的部件相互连接。通信网络的示例包括:LAN、广域网(WAN,Wide Area Network)和互联网。The systems and techniques described herein may be implemented in a computing system that includes back-end components (e.g., as a data server), or a computing system that includes middleware components (e.g., an application server), or a computing system that includes front-end components (e.g., a user computer with a graphical user interface or a web browser through which a user can interact with implementations of the systems and techniques described herein), or a computing system that includes any combination of such back-end components, middleware components, or front-end components. The components of the system may be interconnected by any form or medium of digital data communication (e.g., a communications network). Examples of communications networks include: LANs, Wide Area Networks (WANs), and the Internet.

计算机系统可以包括客户端和服务器。客户端和服务器一般远离彼此并且通常通过通信网络进行交互。通过在相应的计算机上运行并且彼此具有客户端-服务器关系的计算机程序来产生客户端和服务器的关系。A computer system may include clients and servers. Clients and servers are generally remote from each other and usually interact through a communication network. The relationship of client and server is generated by computer programs running on respective computers and having a client-server relationship to each other.

在示例性实施例中,本申请实施例还提供了一种计算机程序产品,当计算机程序产品中的指令由电子设备的处理器1501执行时,使得电子设备的处理器1501能够执行上述专网安全认证方法。In an exemplary embodiment, the embodiment of the present application also provides a computer program product. When the instructions in the computer program product are executed by the processor 1501 of the electronic device, the processor 1501 of the electronic device can execute the above-mentioned private network security authentication method.

还需要说明的是,本申请中提及的示例性实施例,基于一系列的步骤或者装置描述一些方法或系统。但是,本申请不局限于上述步骤的顺序,也就是说,可以按照实施例中提及的顺序执行步骤,也可以不同于实施例中的顺序,或者若干步骤同时执行。It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, this application is not limited to the order of the above steps, that is, the steps can be performed in the order mentioned in the embodiment, or in a different order from the embodiment, or several steps can be performed simultaneously.

本领域技术人员在考虑说明书及实践这里公开的申请后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的。Those skilled in the art will readily appreciate other embodiments of the present application after considering the specification and practicing the application disclosed herein. The present application is intended to cover any variations, uses or adaptations of the present application, which follow the general principles of the present application and include common knowledge or customary technical means in the art that are not disclosed in the present application. The specification and examples are intended to be exemplary only.

应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求来限制。 It should be understood that the present application is not limited to the precise structures that have been described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present application is limited only by the appended claims.

Claims (20)

一种专网安全认证方法,所述方法应用于客户识别模块SIM卡,包括:A private network security authentication method, the method is applied to a user identification module SIM card, comprising: 响应于触发卡信息上报操作,通过短信网关向业务系统发送第一数据短信,其中,所述第一数据短信包括卡信息;In response to triggering the card information reporting operation, sending a first data SMS to the business system through the SMS gateway, wherein the first data SMS includes the card information; 接收所述业务系统通过所述短信网关发送的第二数据短信,基于所述第二数据短信,获取并存储用户信息;其中,所述用户信息包括手机号;Receiving a second data SMS sent by the business system through the SMS gateway, and acquiring and storing user information based on the second data SMS; wherein the user information includes a mobile phone number; 接收所述SIM卡所在的第一终端发送的第一指令,将所述用户信息发送至所述第一终端,以使所述第一终端基于所述用户信息请求所述业务系统对第一终端用户进行身份认证;其中,所述第一指令指示获取所述用户信息。Receive a first instruction sent by a first terminal where the SIM card is located, and send the user information to the first terminal, so that the first terminal requests the service system to perform identity authentication on the first terminal user based on the user information; wherein the first instruction instructs to obtain the user information. 根据权利要求1所述的方法,其中,所述响应于触发卡信息上报操作之前,包括:The method according to claim 1, wherein before the responding to triggering the card information reporting operation, the method comprises: 向所述第一终端注册监听入网事件;Registering with the first terminal to monitor network access events; 监听到所述第一终端首次入网鉴权通过事件,触发卡信息上报操作。An event that the first terminal passes the first network access authentication is monitored, triggering a card information reporting operation. 根据权利要求1所述的方法,其中,所述通过短信网关向业务系统发送第一数据短信,包括:The method according to claim 1, wherein sending the first data SMS to the business system through the SMS gateway comprises: 读取卡信息,并将所述卡信息组装于所述第一数据短信的响应数据包中;Reading card information, and assembling the card information into a response data packet of the first data SMS; 通过所述短信网关向所述业务系统发送所述第一数据短信的响应数据包。A response data packet of the first data SMS is sent to the business system through the SMS gateway. 根据权利要求1所述的方法,其中,所述接收所述业务系统通过所述短信网关发送的第二数据短信,基于所述第二数据短信,获取并存储用户信息,包括:The method according to claim 1, wherein the receiving a second data SMS sent by the business system through the SMS gateway, and acquiring and storing user information based on the second data SMS, comprises: 接收所述短信网关转发的所述业务系统发送的第二数据短信;其中,所述第二数据短信包括应用命令报文,所述应用命令报文包括所述用户信息;receiving a second data SMS sent by the business system and forwarded by the SMS gateway; wherein the second data SMS includes an application command message, and the application command message includes the user information; 解密所述第二数据短信,获取所述应用命令报文中的短信内容;Decrypting the second data SMS message to obtain SMS content in the application command message; 解析所述短信内容,获取并存储所述用户信息。Parse the text message content, obtain and store the user information. 根据权利要求1所述的方法,其中,所述将所述用户信息发送至所述第一终端,包括:The method according to claim 1, wherein sending the user information to the first terminal comprises: 建立与所述第一终端之间的安全访问通道;Establishing a secure access channel with the first terminal; 读取用户信息;并加密所述用户信息,得到用户信息密文;Reading user information; and encrypting the user information to obtain a ciphertext of the user information; 将所述用户信息密文通过所述安全访问通道发送至所述第一终端。The user information ciphertext is sent to the first terminal through the secure access channel. 根据权利要求3所述的方法,其中,所述响应数据包包括卡应用主版本号、安全参数标识、应用响应数据包和媒体访问控制MAC地址,所述应用响应数据包包括所述卡信息,所述安全参数标识包括加密标识和环境标识。The method according to claim 3, wherein the response data packet includes a card application major version number, a security parameter identifier, an application response data packet and a media access control MAC address, the application response data packet includes the card information, and the security parameter identifier includes an encryption identifier and an environment identifier. 根据权利要求4所述的方法,其中,所述存储所述用户信息,包括:The method according to claim 4, wherein storing the user information comprises: 将所述用户信息存储于所述SIM卡的安全存储空间。The user information is stored in the secure storage space of the SIM card. 一种专网安全认证方法,所述方法应用于第一终端,所述第一终端包括客户识别模块SIM卡;所述方法包括:A private network security authentication method, the method is applied to a first terminal, the first terminal includes a user identification module SIM card; the method includes: 向专网发送内网应用访问请求,其中,所述内网应用访问请求指示访问业务系统;Sending an intranet application access request to a private network, wherein the intranet application access request indicates access to a business system; 接收网关设备重定向的身份认证链接,并基于所述身份认证链接,向所述SIM卡发送第一指令,其中,所述第一指令指示获取用户信息,所述用户信息为所述业务系统基于所述SIM卡上报的卡信息发送至所述SIM卡的,所述用户信息包括手机号;Receive an identity authentication link redirected by a gateway device, and send a first instruction to the SIM card based on the identity authentication link, wherein the first instruction instructs to obtain user information, the user information is sent to the SIM card by the service system based on the card information reported by the SIM card, and the user information includes a mobile phone number; 接收所述SIM卡发送的所述用户信息,并通过所述网关设备向业务系统发送第一信息,以及基于所述第一信息中的用户信息请求所述业务系统对第一终端用户进行身份认证。The user information sent by the SIM card is received, and first information is sent to the service system through the gateway device, and based on the user information in the first information, the service system is requested to perform identity authentication on the first terminal user. 根据权利要求8所述的方法,其中,所述向专网发送内网应用访问请求之前,包括:The method according to claim 8, wherein before sending the intranet application access request to the private network, the method further comprises: 所述第一终端向专网发送接入请求,所述接入请求指示所述专网验证所述第一终端的权限。The first terminal sends an access request to the private network, where the access request instructs the private network to verify the authority of the first terminal. 根据权利要求8所述的方法,其中,所述方法还包括:The method according to claim 8, wherein the method further comprises: 接收所述SIM卡发送的监听入网事件注册请求。Receive a network access event monitoring registration request sent by the SIM card. 一种专网安全认证方法,所述方法应用于网关设备,包括:A private network security authentication method, the method is applied to a gateway device, comprising: 拦截第一终端向专网发送的内网应用访问请求,重定向身份认证链接至所述第一终端;其中,所述第一终端包括客户识别模块SIM卡,所述内网应用访问请求指示访问业务系统;Intercepting an intranet application access request sent by a first terminal to a private network, and redirecting an identity authentication link to the first terminal; wherein the first terminal includes a subscriber identity module SIM card, and the intranet application access request indicates access to a business system; 接收所述第一终端发送的第一信息,并将所述第一信息发送至所述业务系统,其中,所述第一 信息包括用户信息,所述用户信息为所述业务系统基于所述SIM卡上报的卡信息发送至所述SIM卡的,所述用户信息包括手机号,所述用户信息用于所述第一终端请求所述业务系统对第一终端用户进行身份认证。receiving first information sent by the first terminal, and sending the first information to the business system, wherein the first The information includes user information, which is sent to the SIM card by the service system based on the card information reported by the SIM card. The user information includes a mobile phone number, and the user information is used by the first terminal to request the service system to perform identity authentication on the first terminal user. 一种专网安全认证方法,所述方法应用于专网内的业务系统,包括:A private network security authentication method, the method is applied to a business system in a private network, comprising: 接收客户识别模块SIM卡通过短信网关发送的第一数据短信,其中,所述第一数据短信包括卡信息;Receiving a first data SMS sent by a subscriber identity module SIM card through a SMS gateway, wherein the first data SMS includes card information; 基于所述第一数据短信,获取所述SIM卡对应的手机号和所述卡信息,并记录所述卡信息与所述手机号的绑定关系;Based on the first data SMS, obtain the mobile phone number and the card information corresponding to the SIM card, and record the binding relationship between the card information and the mobile phone number; 通过所述短信网关向所述SIM卡发送第二数据短信,其中,所述第二数据短信包括用户信息,所述用户信息包括所述手机号;Sending a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes the mobile phone number; 接收所述SIM卡所在的第一终端通过网关设备发送的第一信息,并基于所述第一信息中的用户信息对第一终端用户进行身份认证。Receive first information sent by the first terminal where the SIM card is located through a gateway device, and perform identity authentication on the first terminal user based on the user information in the first information. 一种专网安全认证系统,包括客户识别模块SIM卡,所述SIM卡所在的第一终端、短信网关、网关设备和业务系统,A private network security authentication system includes a customer identification module SIM card, a first terminal where the SIM card is located, a short message gateway, a gateway device and a business system. 所述SIM卡,被配置为执行如权利要求1-7中任一项所述的专网安全认证方法;The SIM card is configured to execute the private network security authentication method according to any one of claims 1 to 7; 所述SIM卡所在的第一终端,被配置为执行如权利要求8-10中任一项所述的专网安全认证方法;The first terminal where the SIM card is located is configured to execute the private network security authentication method according to any one of claims 8 to 10; 所述网关设备,被配置为执行如权利要求11所述的专网安全认证方法;The gateway device is configured to execute the private network security authentication method according to claim 11; 所述业务系统,被配置为执行如权利要求12所述的专网安全认证方法。The business system is configured to execute the private network security authentication method as described in claim 12. 一种专网安全认证装置,所述装置配置于客户识别模块SIM卡,包括:A private network security authentication device, the device is configured in a user identification module SIM card, comprising: 卡信息上报模块,被配置为响应于触发卡信息上报操作,通过短信网关向业务系统发送第一数据短信,其中,所述第一数据短信包括卡信息;A card information reporting module, configured to send a first data SMS to a business system through a SMS gateway in response to triggering a card information reporting operation, wherein the first data SMS includes card information; 所述卡信息上报模块,还被配置为接收所述业务系统通过所述短信网关发送的第二数据短信,基于所述第二数据短信,获取并存储用户信息;其中,所述用户信息包括手机号;The card information reporting module is further configured to receive a second data SMS sent by the business system through the SMS gateway, and obtain and store user information based on the second data SMS; wherein the user information includes a mobile phone number; 第一收发模块,被配置为接收所述SIM卡所在的第一终端发送的第一指令,将所述用户信息发送至所述第一终端,以使所述第一终端基于所述用户信息请求所述业务系统对第一终端用户进行身份认证;其中,所述第一指令指示获取所述用户信息。The first transceiver module is configured to receive a first instruction sent by a first terminal where the SIM card is located, and send the user information to the first terminal, so that the first terminal requests the service system to perform identity authentication on the first terminal user based on the user information; wherein the first instruction instructs to obtain the user information. 一种专网安全认证装置,所述装置配置于第一终端,所述第一终端包括客户识别模块SIM卡,包括:A private network security authentication device, the device is configured in a first terminal, the first terminal includes a user identification module SIM card, including: 第二收发模块,被配置为向专网发送内网应用访问请求,其中,所述内网应用访问请求指示访问业务系统;A second transceiver module is configured to send an intranet application access request to the private network, wherein the intranet application access request indicates access to a business system; 所述第二收发模块,还被配置为接收网关设备重定向的身份认证链接,并基于所述身份认证链接,向所述SIM卡发送第一指令,其中,所述第一指令指示获取用户信息,所述用户信息为所述业务系统基于所述SIM卡上报的卡信息发送至所述SIM卡的,所述用户信息包括手机号;The second transceiver module is further configured to receive an identity authentication link redirected by a gateway device, and send a first instruction to the SIM card based on the identity authentication link, wherein the first instruction instructs to obtain user information, the user information is sent to the SIM card by the service system based on the card information reported by the SIM card, and the user information includes a mobile phone number; 所述第二收发模块,还被配置为接收所述SIM卡发送的所述用户信息,并通过所述网关设备向业务系统发送第一信息,以及基于所述第一信息中的用户信息请求所述业务系统对第一终端用户进行身份认证。The second transceiver module is further configured to receive the user information sent by the SIM card, send first information to the service system through the gateway device, and request the service system to perform identity authentication on the first terminal user based on the user information in the first information. 一种专网安全认证装置,所述装置配置于网关设备,包括:A private network security authentication device, the device is configured in a gateway device, comprising: 接入网关模块,被配置为拦截第一终端向专网发送的内网应用访问请求,重定向身份认证链接至所述第一终端;其中,所述第一终端包括客户识别模块SIM卡,所述内网应用访问请求指示访问业务系统;The access gateway module is configured to intercept an intranet application access request sent by the first terminal to the private network, and redirect the identity authentication link to the first terminal; wherein the first terminal includes a subscriber identity module SIM card, and the intranet application access request indicates access to a service system; 控制中心模块,被配置为接收所述第一终端发送的第一信息,并将所述第一信息发送至所述业务系统,其中,所述第一信息包括用户信息,所述用户信息为所述业务系统基于所述SIM卡上报的卡信息发送至所述SIM卡的,所述用户信息包括手机号,所述用户信息用于所述第一终端请求所述业务系统对第一终端用户进行身份认证。The control center module is configured to receive the first information sent by the first terminal and send the first information to the business system, wherein the first information includes user information, and the user information is sent to the SIM card by the business system based on the card information reported by the SIM card, and the user information includes a mobile phone number, and the user information is used by the first terminal to request the business system to authenticate the first terminal user. 一种专网安全认证装置,所述装置配置于专网内的业务系统,包括:A private network security authentication device, the device is configured in a business system in the private network, comprising: 第三收发模块,被配置为接收客户识别模块SIM卡通过短信网关发送的第一数据短信,其中,所述第一数据短信包括卡信息; A third transceiver module is configured to receive a first data SMS sent by a subscriber identity module SIM card through a SMS gateway, wherein the first data SMS includes card information; 处理模块,被配置为基于所述第一数据短信,获取所述SIM卡对应的手机号和所述卡信息,并记录所述卡信息与所述手机号的绑定关系;a processing module configured to obtain the mobile phone number and the card information corresponding to the SIM card based on the first data SMS, and record the binding relationship between the card information and the mobile phone number; 所述第三收发模块,还被配置为通过所述短信网关向所述SIM卡发送第二数据短信,其中,所述第二数据短信包括用户信息,所述用户信息包括所述手机号;The third transceiver module is further configured to send a second data SMS to the SIM card through the SMS gateway, wherein the second data SMS includes user information, and the user information includes the mobile phone number; 身份认证模块,被配置为接收所述SIM卡所在的第一终端通过网关设备发送的第一信息,并基于所述第一信息中的用户信息对第一终端用户进行身份认证。The identity authentication module is configured to receive first information sent by the first terminal where the SIM card is located through the gateway device, and perform identity authentication on the first terminal user based on the user information in the first information. 一种电子设备,包括:An electronic device, comprising: 至少一个处理器;以及at least one processor; and 与所述至少一个处理器通信连接的存储器;其中,a memory communicatively connected to the at least one processor; wherein, 所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行权利要求1至12中任一项所述的专网安全认证方法。The memory stores instructions that can be executed by the at least one processor, and the instructions are executed by the at least one processor so that the at least one processor can execute the private network security authentication method described in any one of claims 1 to 12. 一种存储有计算机指令的非瞬时计算机可读存储介质,所述计算机指令被配置为使所述计算机执行权利要求1至12中任一项所述的专网安全认证方法。A non-transitory computer-readable storage medium storing computer instructions, wherein the computer instructions are configured to cause the computer to execute the private network security authentication method according to any one of claims 1 to 12. 一种计算机程序产品,包括计算机指令,所述计算机指令被处理器执行时实现权利要求1至12中任一项所述的专网安全认证方法。 A computer program product comprises computer instructions, wherein when the computer instructions are executed by a processor, the private network security authentication method according to any one of claims 1 to 12 is implemented.
PCT/CN2024/115281 2023-08-30 2024-08-28 Private network security authentication method, apparatus and system, and electronic device, storage medium and computer program product Pending WO2025045112A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202311113791.4A CN117062075B (en) 2023-08-30 2023-08-30 Private network security authentication method, device and system
CN202311113791.4 2023-08-30

Publications (1)

Publication Number Publication Date
WO2025045112A1 true WO2025045112A1 (en) 2025-03-06

Family

ID=88669172

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2024/115281 Pending WO2025045112A1 (en) 2023-08-30 2024-08-28 Private network security authentication method, apparatus and system, and electronic device, storage medium and computer program product

Country Status (2)

Country Link
CN (1) CN117062075B (en)
WO (1) WO2025045112A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117062075B (en) * 2023-08-30 2024-12-17 中移互联网有限公司 Private network security authentication method, device and system
CN119583111A (en) * 2024-11-11 2025-03-07 中移互联网有限公司 Intranet business data access method and related equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130133043A1 (en) * 2011-04-27 2013-05-23 International Business Machines Corporation Authentication in virtual private networks
CN105007579A (en) * 2014-04-24 2015-10-28 中国移动通信集团广东有限公司 Wireless local area network access authentication method and terminal
CN115361683A (en) * 2022-08-19 2022-11-18 中移互联网有限公司 A service access method, SIM card, server and service platform
CN115988496A (en) * 2022-12-19 2023-04-18 迈普通信技术股份有限公司 Access authentication method and device
CN117062075A (en) * 2023-08-30 2023-11-14 中移互联网有限公司 Private network security authentication method, device and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409880B (en) * 2007-10-09 2010-08-25 中国电信股份有限公司 System and method for account authentication and cryptogram management between communication networks
CN106096344A (en) * 2016-05-26 2016-11-09 南京酷派软件技术有限公司 Business performs method, business performs device and terminal
US10360366B1 (en) * 2017-09-15 2019-07-23 Symantec Corporation Systems and methods for providing two-factor authentication with an enterprise gateway when an authentication server is unavailable
CN110022536A (en) * 2018-01-08 2019-07-16 中国移动通信有限公司研究院 Verification information processing method, communication equipment, business platform and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130133043A1 (en) * 2011-04-27 2013-05-23 International Business Machines Corporation Authentication in virtual private networks
CN105007579A (en) * 2014-04-24 2015-10-28 中国移动通信集团广东有限公司 Wireless local area network access authentication method and terminal
CN115361683A (en) * 2022-08-19 2022-11-18 中移互联网有限公司 A service access method, SIM card, server and service platform
CN115988496A (en) * 2022-12-19 2023-04-18 迈普通信技术股份有限公司 Access authentication method and device
CN117062075A (en) * 2023-08-30 2023-11-14 中移互联网有限公司 Private network security authentication method, device and system

Also Published As

Publication number Publication date
CN117062075B (en) 2024-12-17
CN117062075A (en) 2023-11-14

Similar Documents

Publication Publication Date Title
US11303647B1 (en) Synthetic request injection to disambiguate bypassed login events for cloud policy enforcement
US11985168B2 (en) Synthetic request injection for secure access service edge (SASE) cloud architecture
US11178188B1 (en) Synthetic request injection to generate metadata for cloud policy enforcement
US11190550B1 (en) Synthetic request injection to improve object security posture for cloud security enforcement
US11271972B1 (en) Data flow logic for synthetic request injection for cloud security enforcement
US11888902B2 (en) Object metadata-based cloud policy enforcement using synthetic request injection
US12395534B2 (en) Cloud policy enforcement with synthetic request injection logic
US8606885B2 (en) Method and system of providing access point data associated with a network access point
CN108243143B (en) Web agent-based gatekeeper penetration method and system
JP2020519144A (en) Service capability disclosure facility (SCEF) based Internet of Things (IOT) communication method and system
CN106790420B (en) A kind of more session channel method for building up and system
WO2025045112A1 (en) Private network security authentication method, apparatus and system, and electronic device, storage medium and computer program product
US20250159017A1 (en) System and method for decentralized internet traffic filtering policy reporting
EP1665725B1 (en) Remote ipsec security association management
WO2021249512A1 (en) Secure communication method, related apparatus, and system
WO2015027931A1 (en) Method and system for realizing cross-domain remote command
CN114826692A (en) Information login system, method, electronic device and storage medium
CN104753774A (en) A Distributed Enterprise Integrated Access Gateway
WO2022012355A1 (en) Secure communication method, related apparatus, and system
WO2022226208A1 (en) Synthetic request injection to improve object security posture for cloud security enforcement
WO2022226202A1 (en) Synthetic request injection to retrieve object metadata for cloud policy enforcement
EP3200420B1 (en) Providing communications security to an end-to-end communication connection
US20250071557A1 (en) Systems and methods for end user authentication
US7400621B2 (en) Technique for achieving connectivity between telecommunication stations
WO2022226210A1 (en) Synthetic request injection for cloud policy enforcement

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 24858645

Country of ref document: EP

Kind code of ref document: A1