Embodiments of the present invention will be described with reference to drawings.
The figure shows a first connection port 205 to which a user terminal 500 is connected, a first network 401 which connects a computer 100 operating as an information provision server and a computer 200 operating as an access apparatus via a LAN cable 900, a second connection port 605 to which a user terminal 500 is connected, a second network 402 which connects a computer 600 operating as an authentication server and a computer 700 operating as an information registration server or an information notification server via a LAN cable 900, and a computer 500 operating as a user terminal.
Though this system is provided with physically different two connection ports, that is, the first connection port 205 and the second connection port 605, it is not necessarily required to provide two connection ports, and such a configuration is also possible that one connection port is provided for the entire system.
Though
LAN connectors are used as the first connection port 205 and the second connection port 605. A modular plug 505 at the tip of the LAN cable of the user terminal 500 is inserted into these connection ports.
In this embodiment, an example is described in which these two networks 401 and 402 are constructed as LANs (local area networks) in one company in which multiple computer systems are installed. However, a network system for performing processing among multiple companies, which is constructed as the Internet or a WAN (wide area network), is also possible.
The first and second networks 401 and 402 are configured as networks independent from each other. The user terminal 500 is first connected to the second network 402 to perform authentication processing. By cutting connection with the second network 402 and then connecting to the first network 401 after the authentication processing is completed, information is provided from the information provision server in the first network 401.
As each of the computers 100, 200, 600 and 700, a computer system which is generally referred to as a personal computer or a workstation or a blade server can be used. In the system shown in
The computers 100, 200, 500, 600 and 700 are provided with a CPU (central processing unit), a RAM (random access memory), a hard disk, displays 102, 202, 502, 602 and 702 for displaying images and character strings on display screens 102a, 202a, 502a, 602a and 702a in response to an instruction from body sections 101, 201, 501, 601 and 701 in which a communication board and the like are included, keyboards 103, 203, 503, 603 and 703 for inputting a user instruction into computers 100, 200, 500, 600 and 700, mice 104, 204, 604 and 704 and a track pad 504 for, by specifying any position on the display screens 102a, 202a, 502a, 602a and 702a, inputting an instruction corresponding to an icon displayed at the position when the specification is performed.
Furthermore, on the appearance, the body sections 101, 201, 501, 601 and 701 are provided with MO mounting slots 101a, 201a, 501a, 601a and 701a and CD/DVD mounting slots 101b, 201b, 501b, 601b and 701b through which an MO (magneto-optical disk) and CD/DVD are mounted, respectively. Inside them, there is included an MO drive or a CD/DVD drive for driving and accessing an MO, a CD or a DVD mounted through the mounting slots 101a, 201a, 501a, 601a, 701a, 101b, 201b, 501b, 601b or 701b.
Here, the computer 100 will be representatively described. The computers 200, 500, 600 and 700 are basically have similar configuration.
The hardware configuration diagram in
As described with reference to
The communication board 119 is connected to the networks 401 and 402 (see
As shown in
The information provision system 10 has a first connection port 11 to which a user terminal 50 operated by a user 51 is connected, an information provision server 12 which provides information for the user terminal 50, an access apparatus 14 which permits or inhibits the use of the information provision server 12 by the user terminal 50, and a first network 13 which connects the access apparatus 14 and the information provision server 12.
Though
The authentication system 20 has a second connection port 21 to which the user terminal 50 is connected and which is physically different from the first connection port 11, an authentication server 22 which authenticates authorization of access to the information provision server 12 by the user 51 using the user terminal 50, an information registration server 24 which acquires and registers terminal information as well as notifies the terminal information to the information provision system 10 via the communication channel 30 and a second network 23 which connects the information provision server 12 and the information registration server 24.
Though a RADIUS (Remote Authentication Dial-In User Service) server, that is, a dial-up connection user authentication system of a client-server model is used as the authentication server 22 in this embodiment, the authentication server of the present invention is not limited to this RADIUS server. An authentication server adopting any method may be used if the authentication server is capable of authenticating the authorization of access to the information provision server of this network system.
The communication channel 30 is used for notifying the result of authentication by the authentication system 20 to the information provision system 10.
In this embodiment, the authentication system 20 is provided with the information registration server 24 which authenticates the user 51 operating the user terminal 50 connected to the second connection port 21 and, if the user 51 is a user validly authorized to access the information provision server 12, acquires, from the user terminal 50 connected to the second connection port 21 and authenticated by the authentication server 22 as a user validly authorized to make access, terminal information identifying the user terminal 50 and registers the terminal information as well as notifies the terminal information to the information provision system 10 via the communication channel 30.
Furthermore, the information registration server 24 of this embodiment measures the time elapsing after the notification and, after a predetermined time elapse, notifies inhibition instruction information instructing inhibition of use of the information provision server 12 by the user terminal 50, to the information provision system 10 via the communication channel 30 as well as deletes the record of the terminal information about the user terminal 50. Meanwhile, the information provision system 10 is provided with the access apparatus 14 which permits the use of the information provision server 12 by the user terminal 50 if the user terminal 50 connected to the first connection port 11 is a user terminal corresponding to the terminal information notified from the authentication system 20 via the communication channel 30, and in response to the notification of inhibition instruction information from the authentication system 20, inhibits the use of the information provision server 12 by a user terminal identified by the inhibition instruction information.
Next, the operation of the network system 1 of this embodiment will be described.
Here, description will be made, referring to
The user 51 (see
In this embodiment, the authentication processing is performed so that the identity of the user is authenticated with the use of the RADIUS authentication procedure by the authentication server 22. However, the identity of the user may be authenticated by any method. For example, the identity may be checked by the receptionist based on information such as the visitor's name and company name.
In this embodiment, after the authentication processing by the authentication server 22 is completed, the MAC address of the user terminal 50 is read by the authentication server 22 as terminal information identifying the user terminal 50 (step S12 in
The access apparatus 14 is basically in the access refusal state, and it permits access by a user terminal from which access restriction is to be released only when it receives the notification to release the access restriction, from the information registration server 24.
In this embodiment, use permission time information is held in the information registration server 24 based on the time when a user visits, and the access restriction is released and re-imposed based on the use permission time information.
After the authentication processing by the authentication system 20 ends, the user 51 cuts the LAN connection between the second connection port 21 of the second network 23 and the user terminal, moves to the visiting place (a meeting room or a reception room) and makes LAN connection between the connection port 11 of the first network 13 and the user terminal to start the use of the first network 13.
As described above, the access apparatus 14 compares the terminal information received from the information registration server 24 with the terminal information received from the user terminal 50 with each other, and, if they correspond to each other, then it enables the use by the user terminal 50. Due to the above configuration, when using the first network 13 with the user terminal 50, the user 51 can use the information provision system 10 without making special settings or performing special operations at the visiting place (step S13 in
As shown in
As described above, the authentication processing is not performed in the information provision system 10 on the first network 13 but performed by the authentication system 20 on the second network 23, in this network system 1. Thus, a user authenticated by the authentication system 20 can use the information provision server 12 in the first network 13.
In the above description, the case of using the MAC address of the user terminal 50 as the terminal information is shown as an example. However, information based on the IP address (unique identification information allocated to a computer or a piece of communication equipment connected to an IP network such as the Internet and an intranet) of the user terminal 50 may be used instead of the MAC address. Additionally, any information can be used as the terminal information as appropriate if the information can identify a user terminal to be authenticated or information specific to the user terminal.
Such configuration is also possible that, when it is desired to lengthen the time to use the user terminal 50, authentication can be performed on the first network 13 as far as the authentication is re-authentication. In this case, however, it is necessary that the authentication sever and the information registration server also exist on the first network 13, and that synchronization of data must be taken with the second network 23, which is the original authentication network.
As described above, in this network system 1 of the first embodiment, the authentication processing is not performed on the first network 13, and only a user authenticated on the second network 23 can use the information provision server 12 in the first network 13.
Next, a second embodiment of the present invention will be described.
This network system 2 of the second embodiment corresponds to the second network system of the present invention accompanied by outbound authentication.
As shown in
The information provision system 60 has a first connection port 61 to which a user terminal 50 operated by a user 51 is connected, an information provision server 62 which provides information for the user terminal 50 and a first network 63 which connects the first connection port 61 and the information provision server 62.
The authentication system 70 has a second connection port 71 to which the user terminal 50 is connected and which is physically different from the first connection port 61, an authentication server 72 which authenticates authorization of access to the information provision server 62 by the user 51 using the user terminal 50 and a second network 73 which connects the second connection port 71 and the authentication server 72.
This authentication system 70 authenticates the user 51 operating the user terminal 50 connected to the second connection port 71 and, if the user 51 is a user validly authorized to access the information provision server 62, delivers key information for encryption to the user terminal 50. Furthermore, the information provision system 60 is provided with an access apparatus 64 which, if information for accessing the information provision server 62 which has been sent from the user terminal 50 connected to the first connection port 61 is encrypted information properly encrypted by the key information, enables the information provision server 62 to be used by the user terminal 50 by decrypting the encrypted information and communicating it to the information provision server 62, and discards the information if it is invalid information.
Furthermore, in this embodiment, the authentication system 70 is provided with an information notification server 75 which holds key information for encryption and delivers the key information to the authentication server 72 in response to a request from the authentication server 72 which authenticates whether a user is validly authorized to make access. The authentication server 72 is adapted to receive the key information from the information notification server 75 and notify information to permit the use of the information provision system 60, which is accompanied by the key information, to the user terminal 50 which is connected to the second connection port 71 and which has been authenticated as a user validly authorized to make access.
Next, the operation of the network system 2 of this embodiment will be described.
Here, description will be made, referring to
The user 51 (see
In this embodiment, the authentication processing is performed so that the identity of the user is authenticated with the use of the RADIUS authentication procedure by the authentication server 72. However, the identity of the user may be authenticated in any method. For example, the identity may be checked by the receptionist based on information such as the visitor's name and the company name.
In this embodiment, after the authentication processing by the authentication server 72 is completed, the information notification server 75 delivers the key information for encryption to the user terminal 50 (step S22 in
After the authentication processing by the authentication system 70 ends and the user 51 receives the key information for encryption from the authentication server 72, the user 51 cuts the LAN connection with the second connection port 71 of the second network 73, moves to a visiting place (a meeting room or a reception room), and makes LAN connection with the first connection port 61 of the first network 63 to start the use of the first network 63 (step 23 in
Thus, the user 51 can use the information provision system 60 in the first network 63 without making special settings or performing special operations at this visiting place. However, the user has to perform an operation of making settings for the user terminal 50 in advance so that he can use the key information for encryption delivered from the information notification server 75. Specifically, this setting operation means to store the key information for encryption in a key information holding section 50g of the user terminal 50, as shown below. What kind of setting operation is actually required depends on the access control function on the network side. In this embodiment, description will be made on the case where a method of converting a destination MAC address to key information for encryption is used.
In this embodiment, information to be encrypted is, for example, a destination MAC address described in the Ethernet (registered trademark) header of each packet in the TCP/IP (Transmission Control Protocol/Internet Protocol).
As shown in
As shown in
Next, the flow of the authentication processing in the second embodiment will be described.
As shown Part (a) of
After the user terminal 50 receives a MAC address from the access apparatus 64, the FCS calculation section 50f (see
Next, the destination MAC address 40a is encrypted by the destination MAC address encryption section 50e with the use of the key information for encryption described before (step S32 in
Next, the processing at the PHY layer (the first layer (physical layer) of the OSI reference model) is performed (step S33 in
The Ethernet (registered trademark) frame 42 sent from the user terminal 50 in this way is inputted from the receiving I/F section 64a of the access apparatus 64 (see
Here, if a user terminal 50 which does not have proper key information for encryption sends improper key information for encryption to the access apparatus 64, then it is not sent to the information provision server 62 (see
Even if a user terminal 50 which does not have proper key information for encryption happens to send key information for encryption which includes an encrypted destination MAC address to the access apparatus 64, the frame is discarded as an error frame because the FCS of the Ethernet (registered trademark) frame is not correctly calculated (step S24 in
Next, a third embodiment of the present invention will be described.
As described above, a method of performing authentication by converting a destination MAC address to key information is adopted in the second embodiment. Additionally, as another authentication method, an authentication method can be adopted in which only access by a frame or packet with particular information added is permitted, with the use of a method of adding particular information to the IP header option or the VLAN (Virtual LAN) tag of an Ethernet (registered trademark) frame or a method of adding particular information in XML to a packet to perform communication.
Description will be made below on the authentication method of adding particular information to the IP header option of an Ethernet (registered trademark) frame as a third embodiment.
This network system 3 of the third embodiment corresponds to the third network system of the present invention accompanied by outbound authentication.
As shown in
The authentication system 85 authenticates the user 51 operating the user terminal 50 connected to the second connection port 86 and, if the user 51 is a user validly authorized to access the information provision servers 82, delivers classification information about access authorization according to the classification of the user 51, to the user terminal 50. The information provision system 80 is provided with access apparatuses 84_1, 84_2 and 84_3 which are connected to the first connection port 81 and which receive information accompanied by the classification information, and cause the information to pass or discard the information based on the classification information accompanying the information. The access by the user terminal 50 is controlled by these access apparatuses 84_1, 84_2 and 84_3.
This network system 3 is hierarchically configured by three access apparatuses, three sub-networks and three information provision servers as described above. This is because the three access apparatuses 84_1, 84_2 and 84_3 receive information accompanied by classification information, and cause the information to pass or discard the information based on the classification information accompanying the information. For example, it is conceivable that the first access apparatus 84_1 permits a user with the first-rank classification information (for example, a general visitor) to access the information provision server 82_1 requiring the first-stage confidentiality and the second access apparatus 84_2 permits a user with the second-rank classification information (for example, an employee of the company) to access the information provision server 82_2 requiring the second-stage confidentiality so that authorization of access by the user terminal 50 can be controlled according to the classification of the user.
Though
This access apparatus 84 has a transmission channel control section 84a, a tag confirmation section 84b, a tag processing section 84c, a policy recording section 84d, a policy input section 84e, a packet processing section 84f, a transmission channel control section 84g and the like.
As shown in
This user attribute 93 is information given by the authentication server 87 when the identity of the user 51 is authenticated by the authentication system 85. For example, “1” is given as the user attribute 93 if the user is a general visitor, and “2” is given as the user attribute 93 if the user is an employee of the company. The user attribute 93 is referred to when packet processing (see
The user attribute 93 corresponds to an example of the classification information stated in the present invention.
Next, the authentication processing and the processing performed after authentication in the third embodiment will be described.
By the user 51 (see
In this embodiment, the authentication processing is performed so that the identity of the user is authenticated with the use of the RADIUS authentication procedure. However, the identity of the user may be authenticated in any method. For example, the identity may be checked by the receptionist based on information such as the visitor's name and company name.
In this embodiment, there is provided a user database in which information about attributes of users who use this information provision system 80 is recorded. The authentication system 85 uses this user database to authenticate the user 51 operating a user terminal 50 connected to the second connection port 86. If the user 51 is a user validly authorized to access the information provision server 82, as a result of the authentication processing, then an information notification server 89 provided for the authentication system 85 sets classification information about access authorization according to the classification of the user 51 for the user terminal 50 based on the user database and notifies it to the user terminal 50 (step S42 in
The notified information is the user attribute 93 in the IP header option 92 shown in
After the authentication processing by the authentication system 85 ends and the user 51 receives the user attribute 93 to the user terminal 50 as classification information from information notification server 89, the user 51 cuts the LAN connection with the second connection port 86, moves to a visiting place (a meeting room or a reception room), makes LAN connection with the first connection port 81 and sends the user attribute 93 (see
The access apparatus 84 confirms the user attribute 93 (see
As shown in
The tag processing section 84c determines how it performs processing as the access apparatus 84 with reference to the behavior 90c by checking the user attribute 93 sent from the user terminal 50 against the user attribute 90b held in the policy table 90. Based on the determination, the packet processing section 84f causes the sent packet to pass or discards the packet (S44 in
For example, description will be made on the case where a user attribute “1” is handed to a user terminal 50, for a user classified as “a general visitor” in the authentication system 85 (see
Since the user attribute corresponds to the user attribute 90b of the record 90_1, access to the first information provision server 82_1 which provides a Web access [http] application is permitted. However, the user attribute “1” 2.0 of this user does not correspond to the user attribute 90b of the record 90_2. Therefore, access to the second and third information provision servers 82_2 and 82_3 is refused in accordance with the condition of the record 90_3.
As described above, by adding classification information according to on the classification of a user, to the IP header option, it is possible to control the use of each sub-network on the first network according to the classification of users.
In this third embodiment also, the user 51 can use the information provision server 82 within the first network 83 without making special settings or performing special operations at a visiting place after being authenticated within the second network 88.
As shown in the above three embodiments, by separating a first network including an information provision system and a second network including an authentication system from each other, it is possible to use the information provision system without making special settings or performing special operations within the first network. As a result, both of the first and second networks can be simple network systems, and thereby, processing on the first network can be performed lightly. When a new authentication method appears, it is possible to increase the security level of the entire network system only by changing the authentication method in the second network to the new authentication method without making any change in the first network. Furthermore, the problem of the prior-art inbound authentication, that is, a trouble caused due to equipment difference is not eliminated, and an integrated equipment-independent authentication system can be realized.
Number | Date | Country | Kind |
---|---|---|---|
2006-225806 | Aug 2006 | JP | national |