WO2019020051A1 - 一种安全认证的方法及装置 - Google Patents
一种安全认证的方法及装置 Download PDFInfo
- Publication number
- WO2019020051A1 WO2019020051A1 PCT/CN2018/097027 CN2018097027W WO2019020051A1 WO 2019020051 A1 WO2019020051 A1 WO 2019020051A1 CN 2018097027 W CN2018097027 W CN 2018097027W WO 2019020051 A1 WO2019020051 A1 WO 2019020051A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- authentication message
- server
- password
- password authentication
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Definitions
- the present disclosure relates to the field of network security technologies, and in particular, to a method and apparatus for security authentication.
- the security certification mainly uses the following two methods:
- the first way is: the password shared by the client and the server as a security authentication credential for secure authentication by the shared password.
- the client receives the response message carrying the password sent by the server, determines that the local password is the same as the password included in the received response message, and determines that the server authentication is successful; the server receives the response message sent by the client and carries the password, and determines the local When the password is the same as the password contained in the received response message, the client authentication is successful.
- the password has a leak problem.
- an illegal molecule can illegally obtain a user's password through malware and a compromise system.
- an illegal person obtains the user's password, he or she can communicate with the user through secure authentication.
- the communication between the illegal elements and the users will bring privacy leakage or financial loss to the users, and the communication security of the users cannot be guaranteed.
- the second way is to combine the Secure Transport Layer Protocol (TLS) with password authentication for security authentication.
- TLS Secure Transport Layer Protocol
- a secure TLS link is established with the server, and then the server authenticates the client by using the password on the TLS link.
- the present disclosure provides a method and device for secure authentication, which is used to ensure the correctness of the identity of the two parties, avoid network leakage during the communication process, and network attacks such as malicious information tampering, improve the reliability of the network authentication, and ensure the communication security of the user. .
- a method of secure authentication includes:
- a response authentication message including a server certificate and a digital signature value returned by the received request authentication message, where the server certificate includes a public key of the server, and the digital signature value is obtained based on the request authentication message and the password authentication message;
- the digital signature value included in the response authentication message is verified to obtain a security authentication result.
- determining that the password authentication result indicates that the password authentication is successful sending a request authentication message to the server, specifically:
- Determining that the password authentication result indicates that the password authentication succeeds sending a request authentication message to the server, triggering the server to perform the following steps: hashing the password authentication message and the request authentication message, obtaining the first hash value, and based on the local private key, The first hash value is digitally signed to obtain a digital signature value requesting the authentication message.
- the server-based public key is used to verify the digital signature value included in the response authentication message, and obtain the security authentication result, which specifically includes:
- the security authentication result is obtained based on the comparison result between the digital signature value and the verification digital signature value.
- a method of secure authentication includes:
- the received request authentication message and the password authentication message are digitally signed according to the local private key, and the digital signature value is obtained, specifically:
- the first hash value is digitally signed based on the private key to obtain a digital signature value requesting the authentication message.
- the response authentication message including the local server certificate and the digital signature value is sent to the client, and the triggering client verifies the digital signature value based on the public key of the server included in the server certificate, and obtains a security authentication result.
- the key and the second hash value are obtained by using a preset digital signature verification algorithm, obtaining a verification digital signature value, and obtaining a security authentication result based on a comparison result between the digital signature value and the verification digital signature value.
- a method of secure authentication includes:
- Determining that the password authentication result indicates that the password authentication is successful sending a request authentication message to the server, and receiving a response authentication message including a server certificate returned by the server based on the request authentication message, where the server certificate includes the public key of the server;
- the receiving server returns a verification random number based on the encrypted value, and obtains a security authentication result based on the comparison result of the random number and the verification random number, wherein the verification random number is obtained by decrypting the encrypted value by the private key.
- the locally obtained random number, the password authentication message, and the request authentication message are encrypted according to the public key of the received server, and the encrypted value is obtained, which specifically includes:
- the random number and the hash value are encrypted based on the public key to obtain an encrypted value.
- a method of secure authentication includes:
- the encrypted value is decrypted based on the local private key, and the verification random number is obtained, and the verification random number is sent to the client, and the client is triggered to obtain the security authentication result based on the comparison result of the random number and the verification random number.
- the response authentication message that includes the local server certificate is sent to the client according to the request authentication message, and specifically includes:
- a device for secure authentication includes:
- An obtaining unit configured to perform password authentication with the server based on the password authentication message of the transmission, to obtain a password authentication result
- a sending unit configured to determine that the password authentication result indicates that the password authentication is successful, and send a request authentication message to the server;
- a receiving unit configured to receive, by the server, a response authentication message including a server certificate and a digital signature value returned by the received request authentication message, where the server certificate includes a public key of the server, and the digital signature value is obtained based on the request authentication message and the password authentication message.
- the authentication unit is configured to verify the digital signature value included in the response authentication message based on the public key of the server, and obtain a security authentication result.
- a device for secure authentication includes:
- a receiving unit configured to receive a request authentication message sent by the client based on a password authentication result indicating that the password authentication succeeds, wherein the password authentication result is obtained by performing password authentication based on the transmitted password authentication message;
- a signature unit configured to digitally sign the received request authentication message and the password authentication message based on the local private key, to obtain a digital signature value
- the sending unit is configured to send a response authentication message including the local server certificate and the digital signature value to the client, and trigger the client to verify the digital signature value based on the public key of the server included in the server certificate and obtain a security authentication result.
- a device for secure authentication includes:
- An obtaining unit configured to perform password authentication with the server based on the password authentication message of the transmission, to obtain a password authentication result
- the requesting unit is configured to: when the password authentication result is successful, the password authentication is successful, and the request authentication message is sent to the server, and the response authentication message including the server certificate returned by the server based on the request authentication message is received, where the server certificate includes the public key of the server;
- the encryption unit is configured to encrypt the locally obtained random number, the password authentication message, and the request authentication message based on the received public key of the server, obtain an encrypted value, and send the encrypted value to the server;
- the authentication unit is configured to receive the verification random number returned by the server based on the encrypted value, and obtain a security authentication result based on the comparison result of the random number and the verification random number, wherein the verification random number is obtained by decrypting the encrypted value by using the private key.
- a device for secure authentication includes:
- a first receiving unit configured to receive a request authentication message sent by the client based on a password authentication result indicating that the password authentication succeeds, wherein the password authentication result is obtained by performing password authentication based on the transmitted password authentication message;
- a sending unit configured to send, according to the request authentication message, a response authentication message including a local server certificate to the client;
- a second receiving unit configured to receive an encrypted value sent by the client based on the response authentication message, where the encrypted value is to encrypt the locally obtained random number, the password authentication message, and the request authentication message based on the public key of the server included in the server certificate. acquired;
- the authentication unit is configured to decrypt the encrypted value based on the local private key, obtain the verification random number, and send the verification random number to the client, and trigger the client to obtain the security authentication result based on the comparison result of the random number and the verification random number.
- an electronic device includes: one or more processors;
- one or more computer readable mediums on which a program for secure authentication is stored wherein when the program is executed by one or more processors, causing the communication device to perform any of the first aspects described above Methods.
- an electronic device includes: one or more processors;
- a twelfth aspect the one or more computer readable mediums on which are stored a program for secure authentication, wherein when the program is executed by one or more processors, causing the communication device to perform any of the above second aspects The method of the item.
- an electronic device comprising: one or more processors;
- a fourteenth aspect one or more computer readable mediums on which a program for secure authentication is stored, wherein when the program is executed by one or more processors, causing the communication device to perform any of the above third aspects The method of the item.
- an electronic device comprising: one or more processors;
- one or more computer readable mediums on which a program for secure authentication is stored wherein when the program is executed by one or more processors, causing the communication device to perform any of the above fourth aspects The method of the item.
- password authentication is first performed with the server, and then all the interactive messages are digitally signed by the server, the client performs digital signature verification, or the client performs local key on the local random number and all interactive messages. Encryption and verification of the random number returned by the server, security authentication, so that you can combine the password authentication with the digital signature, or combine the password authentication with the public key encryption to ensure the communication parties.
- security authentication so that you can combine the password authentication with the digital signature, or combine the password authentication with the public key encryption to ensure the communication parties
- the correctness of the identity avoids network attacks such as message leakage and malicious information tampering during communication, improves the reliability of network authentication, and ensures the communication security of users.
- FIG. 1 is a flow chart of a method for secure authentication in some embodiments of the present disclosure
- FIG. 2 is a flow chart of a method for secure authentication in some embodiments of the present disclosure
- FIG. 3 is a schematic structural diagram 1 of an apparatus for secure authentication in some embodiments of the present disclosure
- FIG. 4 is a schematic structural diagram 2 of an apparatus for secure authentication in some embodiments of the present disclosure.
- FIG. 5 is a schematic structural diagram 3 of an apparatus for security authentication according to some embodiments of the present disclosure.
- FIG. 6 is a schematic structural diagram 4 of an apparatus for secure authentication in some embodiments of the present disclosure.
- the authentication method is to perform security authentication by combining password and digital signature, or by password and public key encryption.
- the first method is: combining password and digital signature to perform security authentication; the second method is: combining password with public key encryption. Way, for security certification.
- FIG. 1 is a flowchart of a first method in some embodiments of the present disclosure
- a specific combination of a password and a digital signature is used as follows:
- Step 100 The client performs password authentication with the server based on the transmitted password authentication message, and obtains the password authentication result.
- the password authentication message includes the specified password.
- the client and the server perform password authentication by using a shared designated password.
- the server and the client authenticate each other through a plurality of password authentication messages to obtain a password authentication result.
- the number of password authentication messages is related to the password protocol of the application, and can be adjusted according to the actual application scenario.
- Step 101 The client determines that the password authentication is successful when the password is consistent according to the password authentication result.
- the client and the server pass the password authentication to initially determine that the authentication is successful, and in the subsequent process, the digital signature can be used for re-authentication.
- Step 102 The client sends a request authentication message to the server.
- Step 103 The server hashes all the password authentication messages and the received request authentication message to obtain a first hash value.
- the server obtains all the messages exchanged between the client and the server, that is, the request authentication message, and all the interactive password authentication messages.
- the server hashes all the obtained messages to obtain the first hash value.
- Step 104 The server digitally signs the first hash value based on the local private key to obtain a digital signature value. .
- Step 105 The server sends the digital signature value and the server certificate to the client.
- the server certificate sent by the server includes the public key of the server, which can be used for digitally signing or encrypting the data.
- the so-called server certificate is issued by a third-party trusted institution certification center, relying on the Public Key Infrastructure (PKI) technology, the user's public key and other identification information of the user (such as name, e -mail, ID number, etc.) bundled together to digitally sign or encrypt data with the included public key to improve network security.
- PKI Public Key Infrastructure
- PKI is a universal security infrastructure that implements and provides security services using asymmetric cryptographic algorithm principles and technologies. It is a standard-based public key cryptography technology for online e-commerce and e-government development.
- PKI technology is an infrastructure that provides network information security services using public key theory and technology.
- the PKI management platform can provide all the keys and certificate management required by users in the network that need to use cryptographic services such as encryption and digital signature. Users can use the security services provided by the PKI platform for secure communication.
- Step 106 The client verifies the received digital signature value based on the public key included in the receiving server certificate, and obtains a security authentication result.
- the client receives the server certificate and the digital signature value sent by the server.
- the client obtains all password authentication messages that interact with the server, and performs a hash operation on the request authentication message and all password authentication messages to obtain a second hash value.
- the client inputs the public key and the second hash value into the digital signature verification algorithm to obtain the verified digital signature value
- the client obtains the security authentication result based on the comparison result between the digital signature value and the verification digital signature value.
- the client determines that the digital signature value is the same as the verification digital signature value, the client determines that the security authentication is successful, otherwise, the security authentication fails.
- the password can be combined with the digital signature, and the client and the server are initially authenticated by the password, and then re-authenticated by the digital signature, thereby ensuring the correctness of the identity of the communicating parties and avoiding communication during communication. Leakage and information tampering have improved network security.
- FIG. 2 is a flowchart of a second method in some embodiments of the present disclosure
- a password and a public key encryption are combined, and the specific process of the security authentication is as follows:
- Step 200 The client performs password authentication with the server based on the transmitted password authentication message to obtain a password authentication result.
- the password authentication message includes the specified password.
- the client and the server perform password authentication by using a shared designated password.
- the server and the client authenticate each other through a plurality of password authentication messages to obtain a password authentication result.
- the number of password authentication messages is related to the password protocol of the application, and can be adjusted according to the actual application scenario.
- Step 201 The client determines that the password authentication is successful when the password is consistent according to the password authentication result.
- the client and the server pass the password authentication to initially determine that the authentication is successful, and in the subsequent process, the digital signature can be used for re-authentication.
- Step 202 The client sends a request authentication message to the server.
- Step 203 The server sends a response authentication message including the server certificate to the client based on the received request authentication message.
- the server certificate contains the server's public key, which can be used to digitally sign or encrypt the data.
- the so-called server certificate is issued by a third-party trusted institution certification center, relying on the Public Key Infrastructure (KPI) technology, the user's public key and other identification information of the user (such as name, e -mail, ID number, etc.) bundled together to digitally sign or encrypt data with the included public key to improve network security.
- KPI Public Key Infrastructure
- PKI is a universal security infrastructure that implements and provides security services using asymmetric cryptographic algorithm principles and technologies. It is a standard-based public key cryptography technology for online e-commerce and e-government development.
- PKI technology is an infrastructure that provides network information security services using public key theory and technology.
- the PKI management platform can provide all the keys and certificate management required by users in the network that need to use cryptographic services such as encryption and digital signature. Users can use the security services provided by the PKI platform for secure communication.
- Step 204 The client determines to obtain a local random number when receiving the public key included in the server certificate.
- the client receives a response authentication message sent by the server.
- the client then obtains the digital certificate contained in the response authentication message and the server's public key and server name contained in the digital certificate.
- the client determines that when the public key is received, it acquires a random number generated locally.
- Step 205 The client performs a hash operation on the request authentication message and all the password authentication messages to obtain a hash value.
- the client obtains all the messages exchanged between the client and the server, that is, the request authentication message, and all the interactive password authentication messages.
- the client then hashes all messages that get the interaction and gets a hash value.
- Step 206 The client encrypts the obtained random number and the hash value by using a public key to obtain an encrypted value.
- Step 207 The client sends the encrypted value to the server.
- Step 208 The server decrypts the received encrypted value based on the local private key to obtain a verification random number.
- Step 209 The server returns the verification random number to the client.
- Step 210 The client obtains the security authentication result based on the local random number and the received verification random number comparison result.
- the client obtains a comparison result between the local random number and the received verification random number.
- the client determines that the local random number is the same as the verification random number, and determines that the security authentication is successful. Otherwise, the security authentication fails.
- passwords can be authenticated to the client and the server by combining the password with the public key encryption, and then re-authenticated by public key encryption, which ensures the correctness of the identity of the communicating parties and avoids communication. Communication leaks and information tampering in the process have improved network security.
- security authentication is performed by means of a combination of a password and a digital signature, and a combination of a password and a public key encryption. Even if an illegal molecule acquires a corresponding password, it cannot be encrypted by a digital signature or a public key. Authenticate again.
- the hash value is obtained by hashing all the interaction messages between the client and the server, and the hash value can be changed in real time as the interaction message changes, so that the illegal molecule can be prevented from passing through the acquired one.
- the transmitted valid message is used for replay attacks, which further improves network security.
- the re-authentication based on the original password authentication system can be compatible with the original password authentication system, without requiring substantial modification of the system, reducing the research and development costs and the use cost, and improving the practicability.
- an electronic device includes: one or more processors;
- one or more computer readable media having stored thereon a program for secure authentication, wherein when the program is executed by one or more processors, the communication device can perform the above-described first embodiment Each step in the process.
- an electronic device includes: one or more processors;
- one or more computer readable media having stored thereon a program for secure authentication, wherein when the program is executed by one or more processors, the communication device can perform the second embodiment described above Each step in the process.
- FIG. 3 a schematic structural diagram of a device for security authentication, in some embodiments of the present disclosure, the device for security authentication specifically includes:
- the obtaining unit 30 is configured to perform password authentication with the server based on the transmitted password authentication message to obtain a password authentication result;
- the sending unit 31 is configured to: when determining that the password authentication result indicates that the password authentication is successful, send a request authentication message to the server;
- the receiving unit 32 is configured to receive, by the server, a response authentication message including a server certificate and a digital signature value returned by the received request authentication message, where the server certificate includes a public key of the server, and the digital signature value is based on the request authentication message and the password authentication message. acquired;
- the authentication unit 33 is configured to verify the digital signature value included in the response authentication message based on the public key of the server to obtain a security authentication result.
- the sending unit 31 is specifically configured to:
- Determining that the password authentication result indicates that the password authentication succeeds sending a request authentication message to the server, triggering the server to perform the following steps: hashing the password authentication message and the request authentication message, obtaining the first hash value, and based on the local private key, The first hash value is digitally signed to obtain a digital signature value requesting the authentication message.
- the authentication unit 33 is specifically configured to:
- the security authentication result is obtained based on the comparison result between the digital signature value and the verification digital signature value.
- FIG. 4 a schematic structural diagram of a device for security authentication, in some embodiments of the present disclosure, the device for security authentication specifically includes:
- the receiving unit 40 is configured to receive a request authentication message that is sent by the client based on a password authentication result indicating successful password authentication, where the password authentication result is obtained by performing password authentication based on the transmitted password authentication message;
- the signing unit 41 is configured to digitally sign the received request authentication message and the password authentication message based on the local private key to obtain a digital signature value
- the sending unit 42 is configured to send a response authentication message including a local server certificate and a digital signature value to the client, and trigger the client to verify the digital signature value based on the public key of the server included in the server certificate and obtain a security authentication result. .
- the signature unit 41 is specifically configured to:
- the first hash value is digitally signed based on the private key to obtain a digital signature value requesting the authentication message.
- the response authentication message including the local server certificate and the digital signature value is sent to the client, and the triggering client verifies the digital signature value based on the public key of the server included in the server certificate and obtains the security authentication result.
- the sending unit 42 is specifically configured to:
- the key and the second hash value are obtained by using a preset digital signature verification algorithm, obtaining a verification digital signature value, and obtaining a security authentication result based on a comparison result between the digital signature value and the verification digital signature value.
- FIG. 5 a schematic structural diagram of a device for security authentication, in some embodiments of the present disclosure, the device for security authentication specifically includes:
- the obtaining unit 50 is configured to perform password authentication with the server based on the transmitted password authentication message to obtain a password authentication result;
- the requesting unit 51 is configured to: when the password authentication result indicates that the password authentication is successful, send a request authentication message to the server, and receive a response authentication message that includes a server certificate returned by the server according to the request authentication message, where the server certificate includes the public key of the server ;
- the encryption unit 52 is configured to encrypt the locally obtained random number, the password authentication message, and the request authentication message based on the received public key of the server, obtain an encrypted value, and send the encrypted value to the server;
- the authentication unit 53 is configured to receive a verification random number returned by the server based on the encrypted value, and obtain a security authentication result according to the comparison result of the random number and the verification random number, where the verification random number is obtained by decrypting the encrypted value by using the private key. .
- the encryption unit 52 is specifically configured to: when the encrypted value is obtained by encrypting the locally obtained random number, the password authentication message, and the request authentication message based on the public key of the received server.
- the random number and the hash value are encrypted based on the public key to obtain an encrypted value.
- the device for security authentication specifically includes:
- the first receiving unit 60 is configured to receive a request authentication message sent by the client based on a password authentication result indicating that the password authentication succeeds, where the password authentication result is obtained by performing password authentication based on the transmitted password authentication message;
- the sending unit 61 is configured to send, according to the request authentication message, a response authentication message including a local server certificate to the client;
- the second receiving unit 62 is configured to receive an encrypted value that is sent by the client based on the response authentication message, where the encrypted value is based on the locally obtained random number, the password authentication message, and the request authentication message, based on the public key of the server included in the server certificate. Obtained by encryption;
- the authentication unit 63 is configured to decrypt the encrypted value based on the local private key, obtain the verification random number, and send the verification random number to the client, and trigger the client to obtain the security authentication result based on the comparison result of the random number and the verification random number.
- the sending unit 61 is specifically configured to:
- password authentication is first performed with the server, then all the interactive messages are digitally signed by the server, the client performs digital signature verification, or the local random number and all interactive messages are sent by the client. Secure the public key encryption and verify the random number returned by the server, so that you can combine password authentication with digital signature, or combine password authentication with public key encryption.
- the correctness of the identity of both parties to the communication avoids network attacks such as message leakage and malicious information tampering during the communication process, improves the reliability of network authentication, and ensures the communication security of the user.
- embodiments of some embodiments of the present disclosure may be provided as a method, system, or computer program product.
- some embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware aspects.
- some embodiments of the present disclosure may employ computer program products embodied on one or more computer usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer usable program code embodied therein. form.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本公开公开了一种安全认证的方法及装置,该方法为基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;确定所述口令认证结果表征口令认证成功时,向所述服务器发送请求认证消息;通过服务器对所有的交互消息进行数字签名,客户端进行数字签名验证的方式,或者,通过客户端对本地的随机数、所有交互消息进行公钥加密,并对服务器返回的随机数进行验证的方式,进行安全认证。
Description
相关申请的交叉引用
本公开主张在2017年7月28日在中国提交的中国专利申请号No.201710632863.4的优先权,其全部内容通过引用包含于此。
本公开涉及网络安全技术领域,尤其涉及一种安全认证的方法及装置。
随着互联网技术的发展,网络攻击也日益严重,用户在使用互联网进行通信、交易等操作时,存在信息泄露,交易信息被恶意篡改等问题。用户的网络安全受到了极大的威胁,这给用户带来了极大的不便。
相关技术下,通常通过安全认证的方式,保证通信的安全。其中,安全认证主要采用以下两种方式:
第一种方式为:客户端与服务器将共享的口令,作为安全认证凭证,以通过共享的口令进行安全认证。
具体的,客户端接收服务器发送的携带口令的响应消息,确定本地的口令与接收的响应消息中包含的口令相同时,确定服务器认证成功;服务器接收客户端发送的携带口令的响应消息,确定本地的口令与接收的响应消息中包含的口令相同时,确客户端认证成功。
但是,采用这种方式,口令存在泄漏的问题,例如,非法分子可以通过恶意软件和攻破系统等方式非法获取用户的口令。当非法分子获取用户的口令后,就可以通过安全认证,与用户进行通信。显然,非法分子与用户通信,会给用户带来隐私泄露或者金融损失等问题,无法保证用户的通信安全。
第二种方式为:将安全传输层协议(Transport Layer Security,TLS)与口令认证相结合,进行安全认证。
具体的,首先,客户端使用服务器证书对服务器进行认证后,与服务器建立安全的TLS链路,然后,服务器在上述TLS链路上使用口令对客户端进行认证。
但是,采用这种方式,需要对已经部署的口令认证系统进行完全替换和修改,这浪费了已有的认证系统资源,提高了认证系统的使用成本,不具备实用性。
发明内容
本公开提供一种安全认证的方法及装置,用于保证通信双方的身份的正确性,避免通信过程中的消息泄露以及恶意信息篡改等网络攻击,提高网络认证的可靠度,保障用户的通信安全。
本公开提供的具体技术方案如下:
第一方面,一种安全认证的方法,包括:
基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;
确定口令认证结果表征口令认证成功时,向服务器发送请求认证消息;
接收服务器基于接收的请求认证消息返回的包含服务器证书和数字签名值的响应认证消息,其中,服务器证书包含服务器的公钥,数字签名值是基于请求认证消息和口令认证消息获得的;
基于服务器的公钥,对响应认证消息中包含的数字签名值进行验证,获得安全认证结果。
可选的,确定口令认证结果表征口令认证成功时,向服务器发送请求认证消息,具体包括:
确定口令认证结果表征口令认证成功时,向服务器发送请求认证消息,触发服务器执行以下步骤:对口令认证消息和请求认证消息进行散列运算,获得第一哈希值,并基于本地的私钥,对第一哈希值进行数字签名,获得请求认证消息的数字签名值。
可选的,基于服务器的公钥,对响应认证消息中包含的数字签名值进行验证,获得安全认证结果,具体包括:
对口令认证消息和请求认证消息进行散列运算,获得第二哈希值;
基于公钥和第二哈希值,采用预设的数字签名验证算法,获得验证数字签名值;
基于数字签名值与验证数字签名值的比较结果,获得安全认证结果。
第二方面,一种安全认证的方法,包括:
接收客户端基于表征口令认证成功的口令认证结果发送的请求认证消息,其中,口令认证结果是基于传输的口令认证消息进行口令认证获得的;
基于本地的私钥,对接收的请求认证消息和口令认证消息进行数字签名,获得数字签名值;
将包含本地的服务器证书和数字签名值的响应认证消息,发送至客户端,触发客户端基于服务器证书中包含的服务器的公钥对数字签名值进行验证并获得安全认证结果。
可选的,基于本地的私钥,对接收的请求认证消息和口令认证消息进行数字签名,获得数字签名值,具体包括:
对口令认证消息和请求认证消息进行散列运算,获得第一哈希值;
基于私钥,对第一哈希值进行数字签名,获得请求认证消息的数字签名值。
可选的,将包含本地的服务器证书和数字签名值的响应认证消息,发送至客户端,触发客户端基于服务器证书中包含的服务器的公钥对数字签名值进行验证并获得安全认证结果,具体包括:
将包含本地的服务器证书和数字签名值的响应认证消息,发送至客户端,触发客户端执行以下步骤:对口令认证消息和请求认证消息进行散列运算,获得第二哈希值,并基于公钥和第二哈希值,采用预设的数字签名验证算法,获得验证数字签名值,以及基于数字签名值与验证数字签名值的比较结果,获得安全认证结果。
第三方面,一种安全认证的方法,包括:
基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;
确定口令认证结果表征口令认证成功时,向服务器发送请求认证消息,并接收服务器基于请求认证消息返回的包含服务器证书的响应认证消息,其中,服务器证书中包含服务器的公钥;
基于接收的服务器的公钥,对本地获取的随机数、口令认证消息和请求认证消息进行加密,获得加密值,并将加密值发送至服务器;
接收服务器基于加密值返回的验证随机数,并基于随机数和验证随机数 的比较结果,获得安全认证结果,其中,验证随机数是通过私钥对加密值进行解密获得的。
可选的,基于接收的服务器的公钥,对本地获取的随机数、口令认证消息和请求认证消息进行加密,获得加密值,具体包括:
确定接收到响应认证消息中包含的公钥时,获取本地生成的一个随机数;
对口令认证消息和请求认证消息进行散列运算,获得哈希值;
基于公钥,对随机数和哈希值进行加密,获得加密值。
第四方面,一种安全认证的方法,包括:
接收客户端基于表征口令认证成功的口令认证结果发送的请求认证消息,其中,口令认证结果是基于传输的口令认证消息进行口令认证获得的;
基于请求认证消息,向客户端发送包含本地的服务器证书的响应认证消息;
接收客户端基于响应认证消息发送的加密值,其中,加密值是基于服务器证书中包含的服务器的公钥对本地获取的随机数、口令认证消息和请求认证消息进行加密获得的;
基于本地的私钥对加密值进行解密,获得验证随机数,并将验证随机数发送至客户端,触发客户端基于随机数和验证随机数的比较结果获得安全认证结果。
可选的,基于请求认证消息,向客户端发送包含本地的服务器证书的响应认证消息,具体包括:
基于请求认证消息,向客户端发送包含本地的服务器证书的响应认证消息,触发客户端执行以下步骤:对口令认证消息和请求认证消息进行散列运算获得哈希值,并基于公钥对本地生成的随机数和哈希值进行加密,获得加密值。
第五方面,一种安全认证的装置,包括:
获得单元,用于基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;
发送单元,用于确定口令认证结果表征口令认证成功时,向服务器发送请求认证消息;
接收单元,用于接收服务器基于接收的请求认证消息返回的包含服务器证书和数字签名值的响应认证消息,其中,服务器证书包含服务器的公钥,数字签名值是基于请求认证消息和口令认证消息获得的;
认证单元,用于基于服务器的公钥,对响应认证消息中包含的数字签名值进行验证,获得安全认证结果。
第六方面,一种安全认证的装置,包括:
接收单元,用于接收客户端基于表征口令认证成功的口令认证结果发送的请求认证消息,其中,口令认证结果是基于传输的口令认证消息进行口令认证获得的;
签名单元,用于基于本地的私钥,对接收的请求认证消息和口令认证消息进行数字签名,获得数字签名值;
发送单元,用于将包含本地的服务器证书和数字签名值的响应认证消息,发送至客户端,触发客户端基于服务器证书中包含的服务器的公钥对数字签名值进行验证并获得安全认证结果。
第七方面,一种安全认证的装置,包括:
获得单元,用于基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;
请求单元,用于确定口令认证结果表征口令认证成功时,向服务器发送请求认证消息,并接收服务器基于请求认证消息返回的包含服务器证书的响应认证消息,其中,服务器证书中包含服务器的公钥;
加密单元,用于基于接收的服务器的公钥,对本地获取的随机数、口令认证消息和请求认证消息进行加密,获得加密值,并将加密值发送至服务器;
认证单元,用于接收服务器基于加密值返回的验证随机数,并基于随机数和验证随机数的比较结果,获得安全认证结果,其中,验证随机数是通过私钥对加密值进行解密获得的。
第八方面,一种安全认证的装置,包括:
第一接收单元,用于接收客户端基于表征口令认证成功的口令认证结果发送的请求认证消息,其中,口令认证结果是基于传输的口令认证消息进行口令认证获得的;
发送单元,用于基于请求认证消息,向客户端发送包含本地的服务器证书的响应认证消息;
第二接收单元,用于接收客户端基于响应认证消息发送的加密值,其中,加密值是基于服务器证书中包含的服务器的公钥对本地获取的随机数、口令认证消息和请求认证消息进行加密获得的;
认证单元,用于基于本地的私钥对加密值进行解密,获得验证随机数,并将验证随机数发送至客户端,触发客户端基于随机数和验证随机数的比较结果获得安全认证结果。
第九方面,一种电子设备,包括:一个或多个处理器;以及
一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,实现上述第一方面中任一项的方法的步骤。
第十方面,一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,使得通信设备执行上述第一方面中任一项的方法。
第十一方面,一种电子设备,包括:一个或多个处理器;以及
一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,实现上述第二方面中任一项的方法的步骤。
第十二方面,一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,使得通信设备执行上述第二方面中任一项的方法。
第十三方面,一种电子设备,包括:一个或多个处理器;以及
一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,实现上述第三方面中任一项的方法的步骤。
第十四方面,一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,使得通信设备执行上述第三方面中任一项的方法。
第十五方面,一种电子设备,包括:一个或多个处理器;以及
一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,实现上述第四方面中任一项的方法的步骤。
第十六方面,一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,使得通信设备执行上述第四方面中任一项的方法。
本公开中,先与服务器进行口令认证,然后,通过服务器对所有的交互消息进行数字签名,客户端进行数字签名验证的方式,或者,通过客户端对本地的随机数、所有交互消息进行公钥加密,并对服务器返回的随机数进行验证的方式,进行安全认证,这样,就可以通过将口令认证与数字签名相结合,或者,将口令认证与公钥加密相结合的方式,保证了通信双方的身份的正确性,避免了通信过程中的消息泄露以及恶意信息篡改等网络攻击,提高了网络认证的可靠度,保障了用户的通信安全。
图1为本公开一些实施例中安全认证的方法的流程图;
图2为本公开一些实施例中安全认证的方法的流程图;
图3为本公开一些实施例中安全认证的装置的结构示意图一;
图4为本公开一些实施例中安全认证的装置的结构示意图二;
图5为本公开一些实施例中安全认证的装置的结构示意图三;
图6为本公开一些实施例中安全认证的装置的结构示意图四。
下面将结合本公开一些实施例中的附图,对本公开一些实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分实施例,并不是全部的实施例。基于本公开一些实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
为了保证通信双方的身份的正确性,避免通信过程中的消息泄露以及恶 意信息篡改等网络攻击,提高网络认证的可靠度,保障用户的通信安全,本公开一些实施例中,设计了一种安全认证的方法,该方法为通过口令与数字签名相结合的方式进行安全认证,或通过口令与公钥加密的方式进行安全认证。
以下结合说明书附图对本公开的一些实施例进行说明,应当理解,此处所描述的优选实施例仅用于说明和解释本发明,并不用于限定本发明,并且在不冲突的情况下,本公开中的实施例及实施例中的特征可以相互组合。
本公开一些实施例中采用了两种方法进行安全认证,第一种方法为:将口令与数字签名相结合的方式,进行安全认证;第二种方法为:将口令与公钥加密相结合的方式,进行安全认证。
参阅图1所示,为本公开一些实施例中第一种方法的流程图,本公开一些实施例中,采用口令与数字签名相结合的方式,对安全认证的具体流程如下:
步骤100:客户端基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果。
具体的,执行步骤100时,口令认证消息中包含指定口令。其中,客户端与服务器之间通过共享的指定口令,进行口令认证。
实际应用中,服务器和客户端之间通过若干口令认证消息进行相互认证,,获得口令认证结果。
其中,口令认证消息的数目与应用的口令协议有关,可以根据实际应用场景进行相应的调整。
步骤101:客户端基于口令认证结果,确定口令一致时,判定口令认证成功。
这样,客户端与服务器通过口令认证,初步确定认证成功,在后续的过程中,就可以通过数字签名进行再次认证。
步骤102:客户端向服务器发送请求认证消息。
步骤103:服务器对所有的口令认证消息和接收的请求认证消息进行散列运算,获得第一哈希值。
具体的,首先,服务器获得上述客户端与服务器之间交互的所有消息, 即请求认证消息,以及所有交互的口令认证消息。
然后,服务器对获取的所有消息进行散列运算,获得第一哈希值。
这样,就可以将客户端与服务器之间所有的交互的消息进行绑定,获得相应的哈希值。其中,由于每一次获得的哈希值都是由所有已经交互的消息共同确定的,因此,哈希值随交互的消息的变化而实时变化,这可以避免非法分子通过一个已经传输过的有效消息进行不断传输造成的重放攻击。
步骤104:服务器基于本地的私钥,对第一哈希值进行数字签名,获得数字签名值。。
步骤105:服务器将数字签名值和服务器证书发送至客户端。
具体的,执行步骤105时,服务器发送的服务器证书中包含服务器的公钥,可用于对数据进行数字签名或加密。
其中,所谓服务器证书是通过第三方的可信任机构认证中心颁发的,依赖于公钥基础设施((Public Key Infrastructure,PKI)技术,把用户的公钥和用户的其他标识信息(如名称、e-mail、身份证号等)捆绑在一起,用于通过包含的公钥对数据进行数字签名或加密,提高网络安全。
PKI是一个用非对称密码算法原理和技术来实现并提供安全服务的具有通用性的安全基础设施,是一种遵循标准的利用公钥加密技术为网上电子商务、电子政务的开展,提供一整套安全的基础平台。PKI技术就是利用公钥理论和技术建立的提供网络信息安全服务的基础设施。PKI管理平台能够为网络中所有需要采用加密和数字签名等密码服务的用户提供所需的密钥和证书管理,用户可以利用PKI平台提供的安全服务进行安全通信。
步骤106:客户端基于接收服务器证书中包含的公钥,对接收的数字签名值进行验证,获得安全认证结果。
具体的,首先,客户端接收服务器发送的服务器证书和数字签名值。
然后,客户端获取与服务器交互的所有口令认证消息,并对请求认证消息,以及所有口令认证消息,进行散列运算,获得第二哈希值。
接着,客户端将公钥和第二哈希值,输入数字签名验证算法,获得验证数字签名值、
最后,客户端基于数字签名值与验证数字签名值的比较结果,获得安全 认证结果,客户端确定数字签名值与验证数字签名值相同时,判定安全认证成功,否则,判定安全认证失败。
这样,就可以将口令与数字签名相结合,对客户端和服务器先通过口令进行初步认证,然后通过数字签名进行再次认证,从而保证了通信双方的身份的正确性,避免了通信过程中的通信泄露以及信息篡改,提高了网络安全。
参阅图2所示,为本公开一些实施例中第二种方法的流程图,本公开一些实施例中,采用口令与公钥加密相结合,对安全认证的具体流程如下:
步骤200:客户端基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果。
具体的,执行步骤200时,口令认证消息中包含指定口令。其中,客户端与服务器之间通过共享的指定口令,进行口令认证。
实际应用中,服务器和客户端之间通过若干口令认证消息进行相互认证,,获得口令认证结果。
其中,口令认证消息的数目与应用的口令协议有关,可以根据实际应用场景进行相应的调整。
步骤201:客户端基于口令认证结果,确定口令一致时,判定口令认证成功。
这样,客户端与服务器通过口令认证,初步确定认证成功,在后续的过程中,就可以通过数字签名进行再次认证。
步骤202:客户端向服务器发送请求认证消息。
步骤203:服务器基于接收的请求认证消息,向客户端发送包含服务器证书的响应认证消息。
具体的,服务器证书中包含服务器的公钥,可用于对数据进行数字签名或加密。
其中,所谓服务器证书是通过第三方的可信任机构认证中心颁发的,依赖于公钥基础设施((Public Key Infrastructure,KPI)技术,把用户的公钥和用户的其他标识信息(如名称、e-mail、身份证号等)捆绑在一起,用于通过包含的公钥对数据进行数字签名或加密,提高网络安全。
PKI是一个用非对称密码算法原理和技术来实现并提供安全服务的具有 通用性的安全基础设施,是一种遵循标准的利用公钥加密技术为网上电子商务、电子政务的开展,提供一整套安全的基础平台。PKI技术就是利用公钥理论和技术建立的提供网络信息安全服务的基础设施。PKI管理平台能够为网络中所有需要采用加密和数字签名等密码服务的用户提供所需的密钥和证书管理,用户可以利用PKI平台提供的安全服务进行安全通信。
步骤204:客户端确定接收到服务器证书中包含的公钥时,获取本地的一个随机数。
具体,首先,客户端接收服务器发送的响应认证消息。
然后,客户端获取响应认证消息中包含的数字证书,以及数字证书中包含的服务器的公钥和服务器名称。
最后,客户端确定接收到公钥时,获取本地随机的产生一个随机数。
步骤205:客户端对请求认证消息,以及所有的口令认证消息,进行散列运算,获得哈希值。
具体的,首先,客户端获得上述客户端与服务器之间交互的所有消息,即请求认证消息,以及所有交互的口令认证消息。
然后,客户端对获取交互的所有消息进行散列运算,获得哈希值。
这样,就可以将客户端与服务器之间所有的交互的消息进行绑定,获得相应的哈希值。由于每一次获得的哈希值都是由所有已经交互的消息共同确定的,因此,哈希值会随着交互的消息的变化而实时变化,这可以避免非法分子通过一个已经传输过的有效消息进行不断传输造成的重放攻击。
步骤206:客户端通过公钥,对获取的随机数和哈希值进行加密,获得加密值。
步骤207:客户端将加密值发送至服务器。
步骤208:服务器基于本地的私钥,对接收的加密值进行解密,获得验证随机数。
步骤209:服务器将验证随机数返回至客户端。
步骤210:客户端基于本地的随机数和接收的验证随机数比较结果,获得安全认证结果。
具体的,首先,客户端获取本地的随机数和接收的验证随机数的比较结 果。
然后,客户端基于获取的比较结果,确定本地的随机数与验证随机数相同时,判定安全认证成功,否则,判定安全认证失败。
这样,就可以通过将口令与公钥加密相结合的方式,对客户端和服务器进行口令进行口令认证,然后通过公钥加密进行再次认证,这保证了通信双方的身份的正确性,避免了通信过程中的通信泄露以及信息篡改,提高了网络安全。
本公开一些实施例中,通过口令与数字签名相结合的方式,以及通过口令与公钥加密相结合的方式进行安全认证,即使非法分子获取相应的口令,也无法通过数字签名或公钥加密的再次认证。
进一步地,通过对客户端与服务器之间所有的交互消息进行散列运算获得相应的哈希值,由于哈希值可以随交互消息的变化而实时变化,这样,可以防止非法分子通过获取的一个传输过的有效消息进行重放攻击,进一步提高了网络安全。
最后,在原有的口令认证系统的基础上进行再次认证,可以兼容原有的口令认证系统,不需要对系统进行大幅度的修改,降低了研发成本和使用成本,提高了实用性。
本公开一些实施例中,一种电子设备,包括:一个或多个处理器;以及
一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,实现上述实施例一中的各个步骤。
本公开一些实施例中,一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,使得通信设备可以执行上述实施例一中的各个步骤。
本公开一些实施例中,一种电子设备,包括:一个或多个处理器;以及
一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,实现上述实施例二中的各个步骤。
本公开一些实施例中,一个或多个计算机可读介质,可读介质上存储有用于安全认证的程序,其中,程序被一个或多个处理器执行时,使得通信设备可以执行上述实施例二中的各个步骤。
基于上述实施例,参阅图3所示,安全认证的装置的结构示意图,本公开一些实施例中,安全认证的装置具体包括:
获得单元30,用于基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;
发送单元31,用于确定口令认证结果表征口令认证成功时,向服务器发送请求认证消息;
接收单元32,用于接收服务器基于接收的请求认证消息返回的包含服务器证书和数字签名值的响应认证消息,其中,服务器证书包含服务器的公钥,数字签名值是基于请求认证消息和口令认证消息获得的;
认证单元33,用于基于服务器的公钥,对响应认证消息中包含的数字签名值进行验证,获得安全认证结果。
可选的,在确定口令认证结果表征口令认证成功时,向服务器发送请求认证消息时,发送单元31具体用于:
确定口令认证结果表征口令认证成功时,向服务器发送请求认证消息,触发服务器执行以下步骤:对口令认证消息和请求认证消息进行散列运算,获得第一哈希值,并基于本地的私钥,对第一哈希值进行数字签名,获得请求认证消息的数字签名值。
可选的,在基于服务器的公钥,对响应认证消息中包含的数字签名值进行验证,获得安全认证结果时,认证单元33具体用于:
对口令认证消息和请求认证消息进行散列运算,获得第二哈希值;
基于公钥和第二哈希值,采用预设的数字签名验证算法,获得验证数字签名值;
基于数字签名值与验证数字签名值的比较结果,获得安全认证结果。
基于上述实施例,参阅图4所示,安全认证的装置的结构示意图,本公开一些实施例中,安全认证的装置具体包括:
接收单元40,用于接收客户端基于表征口令认证成功的口令认证结果发送的请求认证消息,其中,口令认证结果是基于传输的口令认证消息进行口令认证获得的;
签名单元41,用于基于本地的私钥,对接收的请求认证消息和口令认证 消息进行数字签名,获得数字签名值;
发送单元42,用于将包含本地的服务器证书和数字签名值的响应认证消息,发送至客户端,触发客户端基于服务器证书中包含的服务器的公钥对数字签名值进行验证并获得安全认证结果。
可选的,在基于本地的私钥,对接收的请求认证消息和口令认证消息进行数字签名,获得数字签名值时,签名单元41具体用于:
对口令认证消息和请求认证消息进行散列运算,获得第一哈希值;
基于私钥,对第一哈希值进行数字签名,获得请求认证消息的数字签名值。
可选的,在将包含本地的服务器证书和数字签名值的响应认证消息,发送至客户端,触发客户端基于服务器证书中包含的服务器的公钥对数字签名值进行验证并获得安全认证结果时,发送单元42具体用于:
将包含本地的服务器证书和数字签名值的响应认证消息,发送至客户端,触发客户端执行以下步骤:对口令认证消息和请求认证消息进行散列运算,获得第二哈希值,并基于公钥和第二哈希值,采用预设的数字签名验证算法,获得验证数字签名值,以及基于数字签名值与验证数字签名值的比较结果,获得安全认证结果。
基于上述实施例,参阅图5所示,安全认证的装置的结构示意图,本公开一些实施例中,安全认证的装置具体包括:
获得单元50,用于基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;
请求单元51,用于确定口令认证结果表征口令认证成功时,向服务器发送请求认证消息,并接收服务器基于请求认证消息返回的包含服务器证书的响应认证消息,其中,服务器证书中包含服务器的公钥;
加密单元52,用于基于接收的服务器的公钥,对本地获取的随机数、口令认证消息和请求认证消息进行加密,获得加密值,并将加密值发送至服务器;
认证单元53,用于接收服务器基于加密值返回的验证随机数,并基于随机数和验证随机数的比较结果,获得安全认证结果,其中,验证随机数是通 过私钥对加密值进行解密获得的。
可选的,在基于接收的服务器的公钥,对本地获取的随机数、口令认证消息和请求认证消息进行加密,获得加密值时,加密单元52具体用于:
确定接收到响应认证消息中包含的公钥时,获取本地生成的一个随机数;
对口令认证消息和请求认证消息进行散列运算,获得哈希值;
基于公钥,对随机数和哈希值进行加密,获得加密值。
基于上述实施例,参阅图6所示,安全认证的装置的结构示意图,本公开一些实施例中,安全认证的装置具体包括:
第一接收单元60,用于接收客户端基于表征口令认证成功的口令认证结果发送的请求认证消息,其中,口令认证结果是基于传输的口令认证消息进行口令认证获得的;
发送单元61,用于基于请求认证消息,向客户端发送包含本地的服务器证书的响应认证消息;
第二接收单元62,用于接收客户端基于响应认证消息发送的加密值,其中,加密值是基于服务器证书中包含的服务器的公钥对本地获取的随机数、口令认证消息和请求认证消息进行加密获得的;
认证单元63,用于基于本地的私钥对加密值进行解密,获得验证随机数,并将验证随机数发送至客户端,触发客户端基于随机数和验证随机数的比较结果获得安全认证结果。
可选的,在基于请求认证消息,向客户端发送包含本地的服务器证书的响应认证消息时,发送单元61具体用于:
基于请求认证消息,向客户端发送包含本地的服务器证书的响应认证消息,触发客户端执行以下步骤:对口令认证消息和请求认证消息进行散列运算获得哈希值,并基于公钥对本地生成的随机数和哈希值进行加密,获得加密值。
本公开一些实施例中,先与服务器进行口令认证,然后,通过服务器对所有的交互消息进行数字签名,客户端进行数字签名验证的方式,或者,通过客户端对本地的随机数、所有交互消息进行公钥加密,并对服务器返回的随机数进行验证的方式,进行安全认证,这样,就可以通过将口令认证与数 字签名相结合,或者,将口令认证与公钥加密相结合的方式,保证了通信双方的身份的正确性,避免了通信过程中的消息泄露以及恶意信息篡改等网络攻击,提高了网络认证的可靠度,保障了用户的通信安全。
本领域内的技术人员应明白,本公开一些实施例中的实施例可提供为方法、系统、或计算机程序产品。因此,本公开一些实施例中可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开一些实施例中可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本公开一些实施例中是参照根据本公开一些实施例中实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
尽管已描述了本公开一些实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本公开一些实施例中范围的所有变更和修改。
显然,本领域的技术人员可以对本公开一些实施例中进行各种改动和变型而不脱离本公开一些实施例的精神和范围。这样,倘若本公开一些实施例的这些修改和变型属于本公开一些实施例中权利要求及其等同技术的范围之内,则本公开一些实施例中也意图包含这些改动和变型在内。
Claims (22)
- 一种安全认证的方法,包括:基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;确定所述口令认证结果表征口令认证成功时,向所述服务器发送请求认证消息;接收所述服务器基于接收的请求认证消息返回的包含服务器证书和数字签名值的响应认证消息,其中,所述服务器证书包含所述服务器的公钥,所述数字签名值是基于所述请求认证消息和所述口令认证消息获得的;基于所述服务器的公钥,对所述响应认证消息中包含的数字签名值进行验证,获得安全认证结果。
- 如权利要求1所述的方法,其中,确定所述口令认证结果表征口令认证成功时,向所述服务器发送请求认证消息,具体包括:确定所述口令认证结果表征口令认证成功时,向所述服务器发送请求认证消息,触发所述服务器执行以下步骤:对所述口令认证消息和所述请求认证消息进行散列运算,获得第一哈希值,并基于本地的私钥,对所述第一哈希值进行数字签名,获得所述请求认证消息的数字签名值。
- 如权利要求1或2所述的方法,其中,基于所述服务器的公钥,对所述响应认证消息中包含的数字签名值进行验证,获得安全认证结果,具体包括:对所述口令认证消息和所述请求认证消息进行散列运算,获得第二哈希值;基于所述公钥和所述第二哈希值,采用预设的数字签名验证算法,获得验证数字签名值;基于所述数字签名值与所述验证数字签名值的比较结果,获得安全认证结果。
- 一种安全认证的方法,包括:接收所述客户端基于表征口令认证成功的口令认证结果发送的请求认证消息,其中,所述口令认证结果是基于传输的口令认证消息进行口令认证获 得的;基于本地的私钥,对接收的请求认证消息和所述口令认证消息进行数字签名,获得数字签名值;将包含本地的服务器证书和所述数字签名值的响应认证消息,发送至所述客户端,触发所述客户端基于所述服务器证书中包含的服务器的公钥对所述数字签名值进行验证并获得安全认证结果。
- 如权利要求4所述的方法,其中,基于本地的私钥,对接收的请求认证消息和所述口令认证消息进行数字签名,获得数字签名值,具体包括:对所述口令认证消息和所述请求认证消息进行散列运算,获得第一哈希值;基于所述私钥,对所述第一哈希值进行数字签名,获得所述请求认证消息的数字签名值。
- 如权利要求4或5所述的方法,其中,将包含本地的服务器证书和所述数字签名值的响应认证消息,发送至所述客户端,触发所述客户端基于所述服务器证书中包含的服务器的公钥对所述数字签名值进行验证并获得安全认证结果,具体包括:将包含本地的服务器证书和所述数字签名值的响应认证消息,发送至所述客户端,触发所述客户端执行以下步骤:对所述口令认证消息和所述请求认证消息进行散列运算,获得第二哈希值,并基于所述公钥和所述第二哈希值,采用预设的数字签名验证算法,获得验证数字签名值,以及基于所述数字签名值与所述验证数字签名值的比较结果,获得安全认证结果。
- 一种安全认证的方法,包括:基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;确定所述口令认证结果表征口令认证成功时,向所述服务器发送请求认证消息,并接收所述服务器基于所述请求认证消息返回的包含服务器证书的响应认证消息,其中,所述服务器证书中包含所述服务器的公钥;基于接收的所述服务器的公钥,对本地获取的随机数、所述口令认证消息和所述请求认证消息进行加密,获得加密值,并将所述加密值发送至所述服务器;接收所述服务器基于所述加密值返回的验证随机数,并基于所述随机数和所述验证随机数的比较结果,获得安全认证结果,其中,所述验证随机数是通过私钥对所述加密值进行解密获得的。
- 如权利要求7所述的方法,其中,基于接收的所述服务器的公钥,对本地获取的随机数、所述口令认证消息和所述请求认证消息进行加密,获得加密值,具体包括:确定接收到所述响应认证消息中包含的公钥时,获取本地生成的一个随机数;对所述口令认证消息和所述请求认证消息进行散列运算,获得哈希值;基于所述公钥,对所述随机数和所述哈希值进行加密,获得加密值。
- 一种安全认证的方法,包括:接收所述客户端基于表征口令认证成功的口令认证结果发送的请求认证消息,其中,所述口令认证结果是基于传输的口令认证消息进行口令认证获得的;基于所述请求认证消息,向所述客户端发送包含本地的服务器证书的响应认证消息;接收所述客户端基于所述响应认证消息发送的加密值,其中,所述加密值是基于所述服务器证书中包含的服务器的公钥对本地获取的随机数、所述口令认证消息和所述请求认证消息进行加密获得的;基于本地的私钥对所述加密值进行解密,获得验证随机数,并将所述验证随机数发送至所述客户端,触发所述客户端基于所述随机数和所述验证随机数的比较结果获得安全认证结果。
- 如权利要求9所述的方法,其中,基于所述请求认证消息,向所述客户端发送包含本地的服务器证书的响应认证消息,具体包括:基于所述请求认证消息,向所述客户端发送包含本地的服务器证书的响应认证消息,触发所述客户端执行以下步骤:对所述口令认证消息和所述请求认证消息进行散列运算获得哈希值,并基于所述公钥对本地生成的随机数和所述哈希值进行加密,获得加密值。
- 一种安全认证的装置,包括:获得单元,用于基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;发送单元,用于确定所述口令认证结果表征口令认证成功时,向所述服务器发送请求认证消息;接收单元,用于接收所述服务器基于接收的请求认证消息返回的包含服务器证书和数字签名值的响应认证消息,其中,所述服务器证书包含所述服务器的公钥,所述数字签名值是基于所述请求认证消息和所述口令认证消息获得的;认证单元,用于基于所述服务器的公钥,对所述响应认证消息中包含的数字签名值进行验证,获得安全认证结果。
- 一种安全认证的装置,包括:接收单元,用于接收所述客户端基于表征口令认证成功的口令认证结果发送的请求认证消息,其中,所述口令认证结果是基于传输的口令认证消息进行口令认证获得的;签名单元,用于基于本地的私钥,对接收的请求认证消息和所述口令认证消息进行数字签名,获得数字签名值;发送单元,用于将包含本地的服务器证书和所述数字签名值的响应认证消息,发送至所述客户端,触发所述客户端基于所述服务器证书中包含的服务器的公钥对所述数字签名值进行验证并获得安全认证结果。
- 一种安全认证的装置,包括:获得单元,用于基于传输的口令认证消息,与服务器进行口令认证,获得口令认证结果;请求单元,用于确定所述口令认证结果表征口令认证成功时,向所述服务器发送请求认证消息,并接收所述服务器基于所述请求认证消息返回的包含服务器证书的响应认证消息,其中,所述服务器证书中包含所述服务器的公钥;加密单元,用于基于接收的所述服务器的公钥,对本地获取的随机数、所述口令认证消息和所述请求认证消息进行加密,获得加密值,并将所述加密值发送至所述服务器;认证单元,用于接收所述服务器基于所述加密值返回的验证随机数,并基于所述随机数和所述验证随机数的比较结果,获得安全认证结果,其中,所述验证随机数是通过私钥对所述加密值进行解密获得的。
- 一种安全认证的装置,包括:第一接收单元,用于接收所述客户端基于表征口令认证成功的口令认证结果发送的请求认证消息,其中,所述口令认证结果是基于传输的口令认证消息进行口令认证获得的;发送单元,用于基于所述请求认证消息,向所述客户端发送包含本地的服务器证书的响应认证消息;第二接收单元,用于接收所述客户端基于所述响应认证消息发送的加密值,其中,所述加密值是基于所述服务器证书中包含的服务器的公钥对本地获取的随机数、所述口令认证消息和所述请求认证消息进行加密获得的;认证单元,用于基于本地的私钥对所述加密值进行解密,获得验证随机数,并将所述验证随机数发送至所述客户端,触发所述客户端基于所述随机数和所述验证随机数的比较结果获得安全认证结果。
- 一种电子设备,包括:一个或多个处理器;以及一个或多个计算机可读介质,所述可读介质上存储有用于安全认证的程序,其中,所述程序被所述一个或多个处理器执行时,实现如权利要求1~3中任意一项所述的方法的步骤。
- 一个或多个计算机可读介质,其中,所述可读介质上存储有用于安全认证的程序,其中,所述程序被一个或多个处理器执行时,使得通信设备执行如权利要求1至3中任一项所述的方法。
- 一种电子设备,包括:一个或多个处理器;以及一个或多个计算机可读介质,所述可读介质上存储有用于安全认证的程序,其中,所述程序被所述一个或多个处理器执行时,实现如权利要求4-6所述的方法的步骤。
- 一个或多个计算机可读介质,其中,所述可读介质上存储有用于安全认证的程序,其中,所述程序被一个或多个处理器执行时,使得通信设备执行如权利要求4-6所述的方法。
- 一种电子设备,包括:一个或多个处理器;以及一个或多个计算机可读介质,所述可读介质上存储有用于安全认证的程序,其中,所述程序被所述一个或多个处理器执行时,实现如权利要求7-8所述的方法的步骤。
- 一个或多个计算机可读介质,其中,所述可读介质上存储有用于安全认证的程序,其中,所述程序被一个或多个处理器执行时,使得通信设备执行如权利要求7-8所述的方法。
- 一种电子设备,包括:一个或多个处理器;以及一个或多个计算机可读介质,所述可读介质上存储有用于安全认证的程序,其中,所述程序被所述一个或多个处理器执行时,实现如权利要求9-10所述的方法的步骤。
- 一个或多个计算机可读介质,其中,所述可读介质上存储有用于安全认证的程序,其中,所述程序被一个或多个处理器执行时,使得通信设备执行如权利要求9-10所述的方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/632,910 US11799656B2 (en) | 2017-07-28 | 2018-07-25 | Security authentication method and device |
EP18839048.8A EP3661120B1 (en) | 2017-07-28 | 2018-07-25 | Method and apparatus for security authentication |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710632863.4 | 2017-07-28 | ||
CN201710632863.4A CN109309565B (zh) | 2017-07-28 | 2017-07-28 | 一种安全认证的方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019020051A1 true WO2019020051A1 (zh) | 2019-01-31 |
Family
ID=65039998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/097027 WO2019020051A1 (zh) | 2017-07-28 | 2018-07-25 | 一种安全认证的方法及装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US11799656B2 (zh) |
EP (1) | EP3661120B1 (zh) |
CN (1) | CN109309565B (zh) |
WO (1) | WO2019020051A1 (zh) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112887306A (zh) * | 2021-01-26 | 2021-06-01 | 浪潮云信息技术股份公司 | 一种自定义安全认证方法 |
CN113055340A (zh) * | 2019-12-26 | 2021-06-29 | 华为技术有限公司 | 鉴权方法及设备 |
CN113285934A (zh) * | 2021-05-14 | 2021-08-20 | 鼎铉商用密码测评技术(深圳)有限公司 | 基于数字签名的服务器密码机客户端ip检测方法及装置 |
CN113706880A (zh) * | 2021-07-30 | 2021-11-26 | 郑州信大捷安信息技术股份有限公司 | 一种基于车联网的车辆套牌检测系统及方法 |
CN115242543A (zh) * | 2022-08-04 | 2022-10-25 | 国网山东省电力公司日照供电公司 | 一种数据安全保护方法和数据安全保护装置 |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2580635A (en) * | 2019-01-18 | 2020-07-29 | Stratec Se | System for authentification |
EP3720082A1 (de) * | 2019-04-05 | 2020-10-07 | Siemens Aktiengesellschaft | Verfahren zum ausstellen einer kryptographisch geschützten authentizitätsbescheinigung für einen benutzer |
EP3745640A1 (en) * | 2019-05-31 | 2020-12-02 | Siemens Aktiengesellschaft | Establishing secure communication without local time information |
CN110890960B (zh) * | 2019-11-16 | 2023-04-18 | 杭州安恒信息技术股份有限公司 | 一种基于多重校验机制的数据重放攻击识别与防护方法 |
CN110855693A (zh) * | 2019-11-19 | 2020-02-28 | 武汉思普崚技术有限公司 | 一种基于cnn的网络认证方法及系统 |
CN110808836A (zh) * | 2019-11-19 | 2020-02-18 | 武汉思普崚技术有限公司 | 一种网络认证攻击预测方法及系统 |
CN111031074B (zh) * | 2020-01-09 | 2022-03-01 | 中国信息通信研究院 | 一种认证方法、服务器和客户端 |
US11336438B2 (en) * | 2020-03-31 | 2022-05-17 | EMC IP Holding Company LLC | Remote approval and execution of restricted operations |
CN111698204B (zh) * | 2020-04-28 | 2024-02-23 | 视联动力信息技术股份有限公司 | 一种双向身份认证的方法及装置 |
CN111753289A (zh) * | 2020-05-22 | 2020-10-09 | 北京海泰方圆科技股份有限公司 | 口令认证方法及装置、电子设备、计算机可读存储介质 |
CN112039848B (zh) * | 2020-08-05 | 2022-11-04 | 北京链飞未来科技有限公司 | 一种基于区块链公钥数字签名的Web认证方法、系统和装置 |
CN111931158A (zh) * | 2020-08-10 | 2020-11-13 | 深圳大趋智能科技有限公司 | 一种双向认证方法、终端以及服务器 |
US11722317B2 (en) * | 2020-12-22 | 2023-08-08 | Blackberry Limited | System and method for obtaining a signed certificate |
CN113556321A (zh) * | 2021-06-22 | 2021-10-26 | 杭州安恒信息技术股份有限公司 | 口令认证方法、系统、电子装置和存储介质 |
CN113609467B (zh) * | 2021-07-14 | 2024-05-10 | 海南视联通信技术有限公司 | 一种身份认证方法、装置、终端设备和存储介质 |
CN114095294B (zh) * | 2021-09-15 | 2023-06-16 | 珠海格力电器股份有限公司 | 智能设备的配网方法、装置、电子设备和存储介质 |
CN113852681B (zh) * | 2021-09-22 | 2024-07-12 | 深信服科技股份有限公司 | 一种网关认证方法、装置及安全网关设备 |
CN113904830B (zh) * | 2021-09-29 | 2023-11-10 | 北京天融信网络安全技术有限公司 | 一种spa认证的方法、装置、电子设备和可读存储介质 |
CN114157693A (zh) * | 2021-11-30 | 2022-03-08 | 四川虹美智能科技有限公司 | 通信设备的上电认证方法、通信模块和服务器 |
CN114745115A (zh) * | 2022-04-25 | 2022-07-12 | 北京市商汤科技开发有限公司 | 一种信息传输方法、装置、计算机设备及存储介质 |
CN115333748B (zh) * | 2022-07-26 | 2023-10-10 | 深圳市明源云科技有限公司 | 防伪造通信方法、系统、电子设备及计算机可读存储介质 |
CN115378602B (zh) * | 2022-07-28 | 2024-10-11 | 中国第一汽车股份有限公司 | 车辆身份认证方法、装置、车辆以及车辆身份认证系统 |
CN115632863B (zh) * | 2022-10-24 | 2023-06-06 | 贵州省通信产业服务有限公司 | 一种数据传输方法及系统 |
CN115473655B (zh) * | 2022-11-07 | 2023-01-10 | 南京易科腾信息技术有限公司 | 接入网络的终端认证方法、装置及存储介质 |
CN116015678A (zh) * | 2022-12-20 | 2023-04-25 | 四川阵风科技有限公司 | 基于三方联动的密码安全认证方法、系统及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009002963A1 (en) * | 2007-06-26 | 2008-12-31 | General Instrument Corporation | Method and apparatus for securing unlock password generation and distribution |
CN103795542A (zh) * | 2014-01-24 | 2014-05-14 | 中国工商银行股份有限公司 | 一种数字签名认证方法及装置 |
CN105933280A (zh) * | 2016-03-15 | 2016-09-07 | 天地融科技股份有限公司 | 身份认证方法和系统 |
CN106100848A (zh) * | 2016-06-14 | 2016-11-09 | 东北大学 | 基于智能手机和用户口令的双因子身份认证系统及方法 |
US20170070350A1 (en) * | 2015-09-03 | 2017-03-09 | Markany Inc. | Digital signature service system based on hash function and method thereof |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4892011B2 (ja) | 2007-02-07 | 2012-03-07 | 日本電信電話株式会社 | クライアント装置、鍵装置、サービス提供装置、ユーザ認証システム、ユーザ認証方法、プログラム、記録媒体 |
JP5132222B2 (ja) * | 2007-08-13 | 2013-01-30 | 株式会社東芝 | クライアント装置、サーバ装置及びプログラム |
CN101764690A (zh) * | 2008-12-24 | 2010-06-30 | 广东电子工业研究院有限公司 | 基于互联网的隐秘信息通信方法 |
CN101620705A (zh) * | 2009-08-07 | 2010-01-06 | 中国建设银行股份有限公司 | 一种用于网上银行的安全认证方法及系统 |
CN101997824B (zh) * | 2009-08-20 | 2016-08-10 | 中国移动通信集团公司 | 基于移动终端的身份认证方法及其装置和系统 |
CN101674304B (zh) * | 2009-10-15 | 2013-07-10 | 浙江师范大学 | 一种网络身份认证系统及方法 |
CN101958913B (zh) * | 2010-10-29 | 2013-05-08 | 四川长虹电器股份有限公司 | 基于动态口令和数字证书的双向身份认证方法 |
CN102026195B (zh) * | 2010-12-17 | 2013-05-15 | 北京交通大学 | 基于一次性口令的移动终端身份认证方法和系统 |
US9331856B1 (en) * | 2014-02-10 | 2016-05-03 | Symantec Corporation | Systems and methods for validating digital signatures |
CN105592031B (zh) * | 2014-11-25 | 2019-07-19 | 中国银联股份有限公司 | 基于身份认证的用户登陆方法及系统 |
CN104486343B (zh) * | 2014-12-18 | 2018-06-19 | 广东粤铁科技有限公司 | 一种双因子双向认证的方法及系统 |
CN104486087B (zh) * | 2014-12-23 | 2017-12-29 | 中山大学 | 一种基于远程硬件安全模块的数字签名方法 |
CN106161032B (zh) * | 2015-04-24 | 2019-03-19 | 华为技术有限公司 | 一种身份认证的方法及装置 |
US9668136B2 (en) * | 2015-09-25 | 2017-05-30 | Citrix Systems, Inc. | Using derived credentials for enrollment with enterprise mobile device management services |
CN105827412B (zh) * | 2016-03-14 | 2019-01-08 | 中金金融认证中心有限公司 | 认证方法、服务器及客户端 |
-
2017
- 2017-07-28 CN CN201710632863.4A patent/CN109309565B/zh active Active
-
2018
- 2018-07-25 WO PCT/CN2018/097027 patent/WO2019020051A1/zh active Application Filing
- 2018-07-25 US US16/632,910 patent/US11799656B2/en active Active
- 2018-07-25 EP EP18839048.8A patent/EP3661120B1/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009002963A1 (en) * | 2007-06-26 | 2008-12-31 | General Instrument Corporation | Method and apparatus for securing unlock password generation and distribution |
CN103795542A (zh) * | 2014-01-24 | 2014-05-14 | 中国工商银行股份有限公司 | 一种数字签名认证方法及装置 |
US20170070350A1 (en) * | 2015-09-03 | 2017-03-09 | Markany Inc. | Digital signature service system based on hash function and method thereof |
CN105933280A (zh) * | 2016-03-15 | 2016-09-07 | 天地融科技股份有限公司 | 身份认证方法和系统 |
CN106100848A (zh) * | 2016-06-14 | 2016-11-09 | 东北大学 | 基于智能手机和用户口令的双因子身份认证系统及方法 |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113055340A (zh) * | 2019-12-26 | 2021-06-29 | 华为技术有限公司 | 鉴权方法及设备 |
CN113055340B (zh) * | 2019-12-26 | 2023-09-26 | 华为技术有限公司 | 鉴权方法及设备 |
CN112887306A (zh) * | 2021-01-26 | 2021-06-01 | 浪潮云信息技术股份公司 | 一种自定义安全认证方法 |
CN113285934A (zh) * | 2021-05-14 | 2021-08-20 | 鼎铉商用密码测评技术(深圳)有限公司 | 基于数字签名的服务器密码机客户端ip检测方法及装置 |
CN113285934B (zh) * | 2021-05-14 | 2023-04-28 | 鼎铉商用密码测评技术(深圳)有限公司 | 基于数字签名的服务器密码机客户端ip检测方法及装置 |
CN113706880A (zh) * | 2021-07-30 | 2021-11-26 | 郑州信大捷安信息技术股份有限公司 | 一种基于车联网的车辆套牌检测系统及方法 |
CN115242543A (zh) * | 2022-08-04 | 2022-10-25 | 国网山东省电力公司日照供电公司 | 一种数据安全保护方法和数据安全保护装置 |
Also Published As
Publication number | Publication date |
---|---|
US11799656B2 (en) | 2023-10-24 |
US20200169406A1 (en) | 2020-05-28 |
EP3661120A4 (en) | 2021-04-14 |
EP3661120A1 (en) | 2020-06-03 |
EP3661120B1 (en) | 2023-04-05 |
CN109309565A (zh) | 2019-02-05 |
CN109309565B (zh) | 2021-08-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019020051A1 (zh) | 一种安全认证的方法及装置 | |
US11757662B2 (en) | Confidential authentication and provisioning | |
US11134075B2 (en) | Method and system for authenticated login using static or dynamic codes | |
CN109088889B (zh) | 一种ssl加解密方法、系统及计算机可读存储介质 | |
CN109728909B (zh) | 基于USBKey的身份认证方法和系统 | |
US9860064B2 (en) | Encrypted password transport across untrusted cloud network | |
US9231925B1 (en) | Network authentication method for secure electronic transactions | |
US8327143B2 (en) | Techniques to provide access point authentication for wireless network | |
US11102191B2 (en) | Enabling single sign-on authentication for accessing protected network services | |
US20170214664A1 (en) | Secure connections for low power devices | |
US20210006548A1 (en) | Method for authorizing access and apparatus using the method | |
JP2009541817A (ja) | システム間シングルサインオン | |
US9942042B1 (en) | Key containers for securely asserting user authentication | |
CN108809633B (zh) | 一种身份认证的方法、装置及系统 | |
JP6627043B2 (ja) | Ssl通信システム、クライアント、サーバ、ssl通信方法、コンピュータプログラム | |
WO2015158172A1 (zh) | 一种用户身份识别卡 | |
WO2016054905A1 (zh) | 一种数据处理方法 | |
CN108768613A (zh) | 一种基于多种加密算法的密文口令校验方法 | |
TWI526871B (zh) | Server, user device, and user device and server interaction method | |
WO2023284691A1 (zh) | 一种账户的开立方法、系统及装置 | |
WO2017107642A1 (zh) | 一种安全输入法的文本处理方法、装置和系统 | |
US20240283664A1 (en) | Authentication with Cloud-Based Secure Enclave | |
TWI746504B (zh) | 實現會話標識同步的方法及裝置 | |
KR20180059076A (ko) | 암호화된 트래픽 분석을 통한 내부 정보 유출 모니터링 시스템 및 방법 | |
CN116915473A (zh) | Sslvpn隧道建立方法、装置、系统、设备及介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18839048 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2018839048 Country of ref document: EP |