Field of Invention The present invention relates to the technical field of authenticating network transaction trustworthiness.
Description of Related Arts
With the quick development of Internet and the continuous progress of computer science and technology, network transaction based on Internet is vigorously and rapidly developed, and this not only provides continuous power for the development of Chinese economy, but also brings great convenience to the living of vast people. More and more people carry out business activities through network transactions and payment modes, and the development prospect of network transaction is very wide.
However, since network transaction and payment platforms have emerged for a short time, the security system of network payment is not prefect, the problem of the trustworthiness of network transaction processes and behaviors becomes increasingly outstanding, and it has already gradually been a bottleneck problem confronted by the development of the network transaction. The problem of trustworthiness in the network transaction mainly comprises two aspects, wherein one is the user identity trustworthiness problem, i.e., whether the identity of the user participating in the network transaction is legal or not; and the other is the software trustworthiness problem, i.e., whether behaviors of software of all transaction parties in the network transaction and behaviors of interaction between software are expectable or not. Aiming at the two classes of problems, at present, E-commerce enterprises generally adopt the solutions of digital certificates and patch update or version upgrade of software. As investigated and surveyed, by taking a large network payment platform company in China as an example, the current solution strategies have obvious defects in industrial application, wherein one is that, after account passwords of a user are stolen, transactions performed by hackers through a stolen user account cannot be recognized and the problem of user identity trustworthiness which jeopardizes user benefits occurs; and the other is that unexpected behaviors met during system operation cannot be found and processed in time. A main cause of these defects is that there is a lack of a system for authenticating network transaction trustworthiness to monitor and manage all transaction parties and transaction behaviors.
Aiming at the problems that network transaction user identity trustworthiness and software behavior trustworthiness of all transaction parties cannot be guaranteed at present and the situation that there is a lack in effectively monitoring and managing network transaction trustworthiness, the present invention provides a solution to the problem of authentication of user identity trustworthiness and software behavior trustworthiness by adopting user behavior certificates and software behavior certificates.
Network transaction trustworthiness authentication is realized by establishing a fourth-party authentication center and a security client for network transactions, deploying software monitors on an E-commerce website and a payment platform to form a network transaction trustworthiness authentication system platform, and formulating authentication protocols for network transaction trustworthiness authentication. In a network transaction trustworthiness authentication system, the fourth-party authentication center is mainly responsible for managing user behavior and software behavior certificates and authenticating trustworthiness of software behaviors; the security client is mainly responsible for acquiring user netsurfing logs in real time, authenticating trustworthiness of user behaviors and simultaneously acquiring and uploading client software behaviors in a network transaction to the fourth-party authentication center; and the software behavior monitors are responsible for acquiring and uploading software behaviors of an E-merchant and the payment platform in the network transaction to the fourth-party authentication center in real time.
The technical solution provided by the present invention is as follow:
A network transaction trustworthiness authentication system is characterized in that a bottom layer of the network transaction trustworthiness authentication system supports two mainstream operating systems, i.e., Windows and Linux, has a very good cross-platform ability and provides a good support for application development of an upper layer; three basic management modules, i.e., respectively a communication management module, a certificate management module and a database management module at a comparatively low layer are above the support of the bottom layer. The communication management module is mainly responsible for packaging a network communication function according to a specific demand of the system, providing communication services such as data exchange for the upper layer and providing the communication services to a fourth party in a network transaction for calling to perform data exchange; the certificate management module is responsible for performing uniform management to a software behavior certificate, a user behavior certificate and a digital certificate, including operations such as searching, updating and issuance of certificates; the database management module is mainly responsible for updating and maintaining a database and improving data access efficiency. A fourth-party authentication domain of the network transaction trustworthiness authentication system is above the basic management modules and mainly has functions of monitoring and authenticating a network transaction process, performing digital authentication to three transaction parties, verifying trustworthiness of user identity through the user behavior certificate and verifying trustworthiness of a network transaction behavior of the three transaction parties through the software behavior certificate. The fourth-party authentication domain is divided into three sub-parts i.e., the digital certificate, the user behavior certificate and the software behavior certificate to perform triple authentication to the network transaction process. Other three domains, i.e., a user domain, an E-merchant domain and a third-party payment domain of the network transaction trustworthiness authentication system are above the fourth-party authentication domain. The user domain is mainly responsible for uploading the user digital certificate, verifying the user identity through the user behavior certificate as well as acquiring and uploading a client software behavior in the transaction process. The E-merchant domain and the third-party payment domain mainly have functions of uploading digital certificates thereof, as well as acquiring and uploading software behaviors.
A network transaction trustworthiness authentication method is characterized in that the network transaction trustworthiness authentication method comprises the following steps:
1) when a network transaction occurs, uploading, by a user, a digital certificate to perform digital authentication by logging into a security client, and simultaneously uploading, by an E-merchant and a third-party payment platform, digital certificates thereof to perform corresponding digital authentication;
2) after the digital authentication passes, downloading, by the user, a behavior certificate through a user behavior certificate downloading module, and formally entering, by the three parties, a transaction process;
3) in the transaction process, acquiring, by the security client, a user behavior in real time through a user behavior acquisition module, providing the user behavior to a user behavior authentication module, and authenticating trustworthiness of a current user access behavior according to the user behavior certificate downloaded from a fourth-party authentication center. If authentication passes, continuously acquiring a user access behavior and performing authentication; if the authentication fails, uploading a detailed authentication result to the authentication center, and performing, by the authentication center, examination and judgment; simultaneously, acquiring a client software behavior in real time through a software behavior acquisition module, and uploading, by a communication interaction module, the client software behavior to the authentication center; also acquiring, by the E-merchant and the third-party payment platform, software behaviors thereof in real time through software behavior monitoring modules, and uploading, by communication interaction modules, the software behaviors to the authentication center; if software behavior authentication passes, sending, by the authentication center, feedback information, continuously performing the transaction process, and continuously performing real-time acquisition and monitoring to software behaviors of the three parties; and if the authentication fails, giving, by the authentication center, a broadcast notice about that abnormality occurs in the transaction process to the three parties of the transaction, and terminating the transaction;
4) after the transaction is completed, uploading, by the security client, a new access log to the authentication center through a user access log uploading module; sending, by the authentication center, feedback information after receiving the new access log, and exiting, by the user, the security client; and
5) then calling, by the authentication center, a user behavior certificate mining module through a certificate management module to mine the new user access log, and updating the behavior certificate of the user.
When a new E-merchant or a new third-party payment platform is added, firstly auditing is performed thereto and a digital certificate is issued after the auditing passes; and then a corresponding software behavior certificate thereof is mined by analyzing a website source code thereof, is uploaded to the authentication center and is uniformly managed by a behavior certificate management module.
The present invention monitors and authenticates the trustworthiness of the user identity and software behaviors in the network transaction process by adopting the fourth-party authentication center. For this purpose, the present invention establishes system architecture of a four-party network transaction trustworthiness authentication system, and performs triple authentication, i.e., digital authentication, user behavior authentication and software behavior authentication to the network transaction process to guarantee the trustworthiness and security of the network transaction. The present invention has very good extensibility, transportability and universality, configuration and deployment are flexible and convenient to perform, and no third-party software support is needed.
As illustrated in
As illustrated in
Number | Date | Country | Kind |
---|---|---|---|
201410499859.1 | Sep 2014 | CN | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CN2014/095897 | 12/31/2014 | WO | 00 |