Embodiment
In order to improve the security of key storage and use, and then improving the security of authentication process itself, embodiments providing a kind of key storage device and using method thereof.
Below in conjunction with Figure of description, the preferred embodiments of the present invention are described, be to be understood that, preferred embodiment described herein is only for instruction and explanation of the present invention, be not intended to limit the present invention, and when not conflicting, the embodiment in the present invention and the feature in embodiment can combine mutually.
Embodiment one
As shown in Figure 1, be the structural representation of the key storage device that the embodiment of the present invention provides, comprise:
Security module 11, for storage key, described key is used for identifying user identity.
Computing module 12, for generating authentication information when needs carry out authentication.
Wherein, at least comprise in the authentication information that computing module 12 generates the double secret key seed information utilizing security module 11 to store carry out processing the process obtained after seed information, this seed information is arbitrary information that computer system can process, fix information as is known (such as name, fixing numeral etc.), random number, time, summary counter etc., as long as key can be used to carry out the information processed, the present invention does not limit this.Preferably, when specifically implementing, seed information can be the current time of key storage device.
Cipher key interaction module 13, for authentication information mutual with external device.
During concrete enforcement, cipher key interaction module 13 can comprise display sub-module 131 and/or communicator module 132, wherein:
Display sub-module 131 may be used for the authentication information showing computing module 12 generation, and external device can carry out authentication by the authentication information obtaining this display.Preferably, the authentication information that display sub-module 131 shows can be graphic code, this graphic code can be one-dimension code (bar code) and Quick Response Code, wherein, Quick Response Code comprises standard two-dimensional code and non-standard Quick Response Code (the i.e. Quick Response Code of some distortion, as circular two-dimensional code, color 2 D code etc.), the present invention does not limit this.Like this, the authentication information that external device can be shown by scanning display sub-module 131 obtains this authentication information.
Communicator module 132, may be used for establishing a communications link with external device, and by the communication connection of setting up, the authentication information that computing module 12 generates is transferred to external device.Preferably, communicator module 132, can be, but not limited to for establishing a communications link according to following either type and described external device: earphone interface, bluetooth, infrared, NFC (near-field communication), WIFI (Wireless Fidelity), USB (USB (universal serial bus)) or OTG (data transmission interface).
During concrete enforcement, the double secret key seed information that computing module 12 can be, but not limited to utilize security module 11 to store in accordance with the following methods processes: the double secret key seed information utilizing security module 11 to store is encrypted, sign or Hash operation obtains corresponding cryptographic hash.Concrete, the double secret key seed information that computing module 12 can utilize security module 11 to store is encrypted and obtains cipher-text information corresponding to this seed information; Or the double secret key seed information that computing module also can utilize security module 11 to store carries out signing and obtains the seed information after signing, Hash operation can also be carried out to seed information and obtain corresponding cryptographic hash.
Based on same inventive concept, a kind of using method of key storage device is additionally provided in the embodiment of the present invention, the principle of dealing with problems due to said method is similar to key storage device, and therefore the enforcement of said method see the enforcement of key storage device, can repeat part and repeat no more.
Embodiment two
Based on the above-mentioned key storage device provided, the embodiment of the present invention additionally provides a kind of using method of its correspondence, as shown in Figure 2, can comprise the following steps:
S21, computing module generate authentication information when needs carry out authentication.
Wherein, at least comprise in authentication information the double secret key seed information utilizing described security module to store carry out processing the process obtained after seed information, this seed information is arbitrary information that computer system can process.
S22, cipher key interaction module after described computing module generates described authentication information, described authentication information mutual with external device.
During concrete enforcement, in step S22, cipher key interaction module can adopt following either type and the mutual authentication information of external device:
The authentication information that the display sub-module display computing module that mode one, cipher key interaction module comprise generates.
The communicator module that mode two, cipher key interaction module comprise and external device establish a communications link, and by the communication connection of setting up, the authentication information that computing module generates are transferred to external device.
During concrete enforcement, the key storage device that the embodiment of the present invention provides can be applied to following three kinds of application scenarioss needing to carry out authentication, and it is corresponding three kinds of different embodiments respectively, are described respectively below.
Embodiment three
The first embodiment,
As shown in Figure 3, be the structural representation of the first application system of key storage device that the embodiment of the present invention provides, comprise key storage device and Authentication server, wherein:
Key storage device, for generating subscriber authentication information when needs carry out authentication, wherein, subscriber authentication information at least comprises the seed information after utilizing the double secret key seed information stored to carry out processing the process obtained;
Authentication server, for the authentication request that receiving terminal apparatus sends, carry the seed information after process in authentication request, the seed information wherein after process is that terminal device obtains from the subscriber authentication information that key storage device obtains; From the key that self stores, search the key that the double secret key that stores in key storage device is answered; Utilize the seed information after the key recovery and/or verification process found; Determine one's identity to verify whether pass through according to reduction result or the result.
For convenience of explanation, take seed information as the current time of key storage device be example.Like this, when Authentication server is interposed between within prefixed time interval scope between may be used between the current time and the current time of self of the key storage device determining to restore, determines one's identity and be verified; When can also be used for determining to being verified of the current time of key storage device, determine one's identity and be verified.
Preferably, the authentication information that key storage device generates can be, but not limited to as graphic code, when needs carry out authentication, key storage device can generate this graphic code in accordance with the following methods: the double secret key seed information that computing module utilizes security module to prestore carries out processing the seed information after obtaining process.Seed information (cipher-text information obtained above or the seed information of having signed or cryptographic hash) after computing module utilizes process is generated a graphic code and is shown by display sub-module.Like this, terminal device can by scanning the graphic code of display sub-module display thus the seed information after obtaining the process comprised in this graphic code.Seed information after the process obtained is carried in authentication request the Authentication server sending to network side by terminal device, Authentication server is searched the key corresponding to key that this key storage device stores and also is used the seed information after the key recovery and/or verification process found from the key self stored, and determines one's identity to verify whether pass through according to reduction result or the result.
Preferably, when specifically implementing, the authentication system that the embodiment of the present invention provides can adopt symmetric key encryption system, also can adopt asymmetric-key encryption system.If adopt symmetric key encryption system, the key that security module stores is identical with the key that Authentication server stores.If adopt asymmetric-key encryption system, can be each key storage device stochastic generation one group of PKI and private key, the security module of key storage device stores private key, Authentication server storage of public keys.Compared to symmetric key encryption mechanism, asymmetric-key encryption mechanism can improve the security of authentication system further, and in this case, even if Authentication server is invaded, assailant also cannot forge user and log in.
Concrete, when using asymmetric-key encryption technology, if key storage device uses private key to sign to seed information, then the seed information that the PKI that Authentication server stores may be used for having signed is verified; If key storage device uses private key to be encrypted seed information, then the PKI that Authentication server stores may be used for being decrypted the seed information of encryption, obtains seed information.If use symetric key cryptography, if key storage device uses the double secret key seed information stored to sign, then the seed information that the key that Authentication server stores may be used for having signed is verified; If key storage device use store double secret key seed information be encrypted, then Authentication server store key both may be used for encryption seed information be decrypted obtain seed information after verify again, also can not reduce and directly verify ciphertext; If key storage device uses hash algorithm to carry out Hash operation to seed information and obtains cryptographic hash, then the cryptographic hash that Authentication server may be used for obtaining is verified.
Take seed information as the current time of key storage device be example, if the time interval (as being set to the extremely short time interval) within prefixed time interval scope between the current time of the key storage device that reduction obtains and the current time of Authentication server, determine one's identity and be verified, otherwise the checking that determines one's identity is not passed through; Or when determining being verified of the current time of key storage device, determine one's identity and be verified, otherwise the checking that determines one's identity is not passed through.
In said method, Authentication server, after the authentication request receiving terminal device, needs to search all keys stored from self seed information after the key recovery and/or verification process that the double secret key that stores in key storage device answers.Concrete, Authentication server can attempt each key that self stores successively, can to reduce and/or till seed information after verification process until it.
Preferably, in order to improve the efficiency of the seed information after Authentication server reduction and/or verification process, in the embodiment of the present invention, the device identification of this key storage device can also be comprised in the authentication information that key storage device generates, like this, terminal device can obtain this device identification from authentication information, and be carried in authentication request and send to Authentication server in the lump together with the seed information after process, Authentication server can according to device identification from the device identification prestored with directly search key corresponding to this device identification the corresponding relation of key, it can be used as the key that the double secret key stored in key storage device is answered.
Embodiment four
Embodiment for a better understanding of the present invention, be described below in conjunction with the specific implementation process of information interaction flow process to embodiment of the present invention during authentication, for convenience of explanation, the embodiment of the present invention is accessed Web bank for user and is described, the flow process of user's logging in online banks as shown in Figure 4, can comprise the following steps:
S41, key storage device generate and show the Quick Response Code being used for user being carried out to authentication.
During concrete enforcement, user can access Web bank by following two kinds of modes:
Mode one,
User uses the terminal device access Web bank obtaining subscriber authentication information, and such as, user uses mobile phone access Web bank, uses this mobile phone to obtain the subscriber authentication information of key storage device generation simultaneously.In this case, the login page of the Web bank that user accesses needs to provide the application programming interfaces of the auth method encapsulation using the embodiment of the present invention to provide, when user needs logging in online banks by calling the authentication of this application programming interfaces triggered for user.
Mode two,
User uses the other-end device access Web bank beyond the terminal device obtaining subscriber authentication information, and such as user uses computer to access Web bank, uses the mobile phone of oneself to obtain the subscriber authentication information of key storage device generation.In this case, Web bank's login page needs the proving program embedding the auth method encapsulation that the embodiment of the present invention provides, and show with the form of graphic code (can be, but not limited to as Quick Response Code) at login page, when user needs logging in online banks, directly scanning this Quick Response Code just can the authentication of triggered for user.
After the authentication of triggered for user, user generates subscriber authentication information by triggering one's own key storage device (this equipment can for being supplied to user by bank when user registers bank account), concrete grammar see the description in above-described embodiment one, can repeat no more here.
Preferably, in order to avoid the risk that user's Lost Security Key memory device brings, in the embodiment of the present invention, key storage device can also identify user identity before generation subscriber authentication information, such as, can be identified by fingerprint, the codon pair user that also can be pre-set by user is identified, here do not limit, accordingly, key storage device can also comprise digital keys or fingerprint acquisition device.
The Quick Response Code that S42, terminal device scans key storage device generate, obtains the device identification of the current time information after process and key storage device.
During concrete enforcement, for mode one, the authentication application program that the auth method that it can directly call provides according to the embodiment of the present invention realizes scans the subscriber authentication information that key storage device generates.For mode two, user starts the authentication application program that the auth method provided according to the embodiment of the present invention installed in terminal device realizes voluntarily, scans the subscriber authentication information that key storage device generates.
S43, terminal device send authentication request to the Authentication server of network side.
Wherein, the device identification of the seed information after the process obtained and key storage device is carried in authentication request.In addition, terminal device also needs to carry the application identities of the internet, applications of user's access or Apply Names and the unique identification of this internet, applications in global scope in authentication request, this unique identification is the unique coding of an overall situation, and different internet, applications, different terminal devices, different time do not repeat.Preferably, this unique identification can be, but not limited to as UUID (Universally Unique Identifier, general unique identifier) or GUID (Globally Unique Identifier, Globally Unique Identifier), can certainly be adopt a mark in the global scope of similar techniques realization, be described for UUID for convenience of description.
If user is by above-mentioned first kind of way access internet, applications, then the UUID of the terminal device application identities or Apply Names and correspondence thereof that directly can obtain the current internet, applications of accessing of user sends to Authentication server in the lump; If user is by above-mentioned second way access internet, applications, then comprise UUID corresponding to the application identities of internet, applications or Apply Names and this internet, applications at the graphic code generating login page display, like this, terminal device just can obtain UUID corresponding to application identities or Apply Names and this internet, applications by this graphic code of scanning, sends to Authentication server in the lump with the device identification of the seed information after the process obtained in the Quick Response Code generated from key storage device and key storage device.
During concrete enforcement, terminal device can pass through the Authentication server transmission authentication request to network side such as cable network, wireless network and mobile communications network.
S44, Authentication server search corresponding key according to the device identification of carrying in authentication request.
S45, Authentication server utilize the current time information after the key recovery and/or verification process found.
S46, Authentication server carry out authentication.
During concrete enforcement, be encrypted as example with key storage device to current time, Authentication server compares current time and the current time of self of the key storage device restored, if the time interval is no more than the default time interval, determines to be verified, otherwise, determine that checking is not passed through.
S47, Authentication server send the result to providing the application server of internet, applications.
During concrete enforcement, Authentication server provides the result according to the application identities of carrying in authentication request or Apply Names to this application identities or application server corresponding to Apply Names, and carries the UUID of the internet, applications of user's current accessed in the result sent.
S48, application server send the response message of permission/denied access to terminal device.
During concrete enforcement, according to UUID, application server determines that user accesses terminal device and the application program of internet, applications, and sends the response message of permission/denied access to this terminal device according to the result.
In security system due to existing employing encryption mechanism, the security of asymmetric-key encryption technology has obtained abundant theoretical proof, and widely uses.But its topmost shortcoming is that key is oversize, the mankind cannot directly remember and input, and user needs usually by key storage in computer document or hardware device, imports during use, like this, just there is the risk of Key Exposure, and use very inconvenience.And in the embodiment of the present invention, because graphic code is as one machine automatic identification technology easily, can be used for representing and and be easily identified cipher-text information and transmits and then decipher.Which solve key in existing asymmetric-key encryption mechanism oversize, be not easy to the problem directly used.In addition, in the embodiment of the present invention, use separate hardware to generate graphic code, private key can be avoided to be stolen, to copy and to distort, and the internet, applications physical isolation used with user, fundamentally avoids the possibility suffering hacker attacks, has high security.Simultaneously, when using asymmetric-key encryption mechanism in the embodiment of the present invention, private key is stored in authorization information and generates in the security module of equipment, PKI is stored in Authentication server, even if Authentication server suffers hacker attacks, PKI is all revealed, and the identity that assailant also cannot forge any user is verified, thus does not form any threat.Finally, due to the length of key and intensity enough, therefore authorization information can be directly used to generate the device identification (can be its unique numbering) of equipment as user name, each cipher-text information to seed information encryption generation or the information of having signed carry out authentication as password, realize one-time pad, and password complexity is far away higher than the password that the common mankind are arranged, security and convenience improve all greatly.
The second embodiment,
As shown in Figure 5, be the structural representation of key storage device the second application system that the invention process provides, comprise key storage device, Authentication server and terminal device, wherein:
Terminal device, for when accessing internet, applications and needing to carry out authentication, generates equipment with authorization information and establishes a communications link; Generate after equipment is verified the authentication information that information generating device generates alternately by communication connection and the authorization information set up, to Authentication server transmission authentication request, in authentication request, carry authentication information; Authorization information generates equipment, for generating authentication information, and by the communication connection of setting up with terminal device and the mutual authentication information of terminal device, authentication information at least comprise utilize the first double secret key seed information stored to process after seed information after the process that obtains, seed information is arbitrary information that computer system can process; Authentication server, for after receiving authentication request, the seed information after the process comprised in the second key recovery that the first double secret key using self to store is answered and/or identity verification authorization information; Determine one's identity to verify whether pass through according to reduction result or the result.
During concrete enforcement, when user is when accessing internet, applications and needing to carry out authentication, the communication connection of setting up between terminal device and authorization information generation equipment can be triggered.Preferably, can be, but not limited between terminal device and authorization information generation equipment in the embodiment of the present invention adopt following either type to establish a communications link: earphone interface, bluetooth, infrared, NFC (near-field communication), WIFI (Wireless Fidelity), USB (USB (universal serial bus)) or OTG (data transmission interface) etc.
During concrete enforcement, after establishing a communications link, authorization information generates the authentication information that equipment self can be generated alternately by the communication connection of foundation and terminal device.During specific implementation, can be that terminal device initiatively reads from authorization information the authentication information that authorization information generates equipment generation, also initiatively the authentication information that self generates can be sent to terminal device for authorization information generates equipment.The embodiment of the present invention does not limit this.Wherein, authorization information generate in the authentication information that equipment generates at least comprise authorization information generate the first double secret key seed information that equipment utilization stores process after seed information after the process that obtains.
For convenience of explanation, be that to generate the current time of equipment be example to authorization information with seed information.Like this, when Authentication server may be used for being interposed between within prefixed time interval scope between the authorization information determining to restore generates between the current time of equipment and the current time of self, determine one's identity and be verified; When can also be used for determining to generate being verified of the current time of equipment to authorization information, determine one's identity and be verified.
When needs carry out authentication, authorization information generates equipment can generate authentication information in accordance with the following methods:
The key (i.e. the first key) that computing module utilizes security module to prestore processes seed information and obtains the seed information after processing.During concrete enforcement, the double secret key seed information that computing module can utilize security module to store is encrypted and obtains cipher-text information corresponding to this seed information; Or the double secret key seed information that computing module also can utilize security module to store carries out signing and obtains the seed information after signing, Hash operation can also be carried out to seed information and obtain corresponding cryptographic hash.
Seed information after the process that computing module obtains by communicator module is carried in authentication information and sends to terminal device, or also initiatively can be obtained the authentication information of the seed information after comprising process to communicator module by terminal device.Seed information after the process obtained is carried in authentication request the Authentication server sending to network side by terminal device, Authentication server is searched this authorization information and is generated the key (i.e. the second key) corresponding to key of device storage and the seed information after using the key recovery and/or verification process found from the key self stored, and determines one's identity to verify whether pass through according to reduction result or the result.
Preferably, when specifically implementing, the interactive authentication system that the embodiment of the present invention provides can adopt symmetric key encryption system, also can adopt asymmetric-key encryption system.If adopt symmetric key encryption system, the key that the security module that authorization information generates equipment stores is identical with the key that Authentication server stores.If adopt asymmetric-key encryption system, can generate equipment stochastic generation one group of PKI and private key for each authorization information, the security module that authorization information generates equipment stores private key, Authentication server storage of public keys.Compared to symmetric key encryption mechanism, asymmetric-key encryption mechanism can improve the security of authentication system further, and in this case, even if Authentication server is invaded, assailant also cannot forge user and log in.
During concrete enforcement, when using asymmetric-key encryption technology, sign to seed information if authorization information generates equipment use private key, then the seed information that the PKI that Authentication server stores may be used for having signed is verified; If authorization information generates equipment use private key and is encrypted seed information, then the PKI that Authentication server stores may be used for being decrypted the seed information of encryption, obtains seed information.If use symetric key cryptography, if the double secret key seed information that authorization information generates equipment use storage is signed, then the seed information that the key that Authentication server stores may be used for having signed is verified; If the double secret key seed information that authorization information generates equipment use storage is encrypted, then Authentication server store key both may be used for encryption seed information be decrypted obtain seed information after verify again, also can not reduce and directly verify ciphertext; If authorization information generation equipment use hash algorithm carries out Hash operation to seed information and obtains cryptographic hash, then the cryptographic hash that Authentication server may be used for obtaining is verified.
Be that to generate the current time of equipment be example to authorization information with seed information, if the authorization information that reduction obtains generates the time interval (as being set to the extremely short time interval) within prefixed time interval scope between the current time of equipment and the current time of Authentication server, determine one's identity and be verified, otherwise the checking that determines one's identity is not passed through; Or when determining to generate being verified of the current time of equipment to authorization information, determine one's identity and be verified, otherwise the checking that determines one's identity is not passed through.
In said method, Authentication server, after the authentication request receiving terminal device, needs to search all keys stored from self seed information after the key recovery and/or verification process that the double secret key that stores in authorization information generation equipment answers.Concrete, Authentication server can attempt each key that self stores successively, can to reduce and/or till seed information after verification process until it.
Preferably, in order to improve the efficiency of the seed information after Authentication server reduction and/or verification process, in the embodiment of the present invention, authorization information generates equipment when generating authentication information, the device identification that this authorization information generates equipment can also be comprised, like this, terminal device can obtain this device identification from the authentication information received, and be carried in authentication request and send to Authentication server in the lump together with the seed information after process, Authentication server can according to device identification from the device identification prestored with directly search key corresponding to this device identification the corresponding relation of key, it can be used as the key that the double secret key stored in authorization information generation equipment is answered.
During concrete enforcement, terminal device can also be used for before sending authentication request to Authentication server, obtain the application identities of internet, applications that user accesses, and the application identities of acquisition is carried in authentication request sends to Authentication server.So that Authentication server is after obtaining authentication result, the authentication result obtained is informed to application server corresponding to this application identities.Concrete, Authentication server can from the application identities prestored with search application server identifier corresponding to described application identities the corresponding relation of application server identifier, according to the application server identifier found, authentication result is sent to the application server that this application server identifier is corresponding.
During concrete enforcement, because user may use the terminal device access internet, applications of carrying out authentication, also can by other terminal device access internet, applications, therefore, during the embodiment of the present invention is converged, terminal device can obtain the application identities of the internet, applications that user accesses according to any one in following two kinds of modes:
If when mode one user uses the terminal device carrying out authentication to access internet, applications, the interface that terminal device can provide by calling internet, applications obtains the application identities of this internet, applications; If when user uses other terminal device to access internet, applications, the graphic code (can be, but not limited to as Quick Response Code) that it can use this internet, applications of terminal device scans to provide obtains the application identities of this internet, applications.
During concrete enforcement, in order to improve the security of internet, applications access, terminal device is after setting up the communication connection between authorization information generation equipment, terminal device can also obtain the application identification code of the internet, applications that user accesses, and the application identification code of acquisition sent to authorization information to generate equipment, after this application identification code of the first double secret key that authorization information generation equipment utilization self stores processes, be carried in authentication information and sent to terminal device, terminal device is carried in authentication request sends to Authentication server by receiving the application identification code after process.During concrete enforcement, the mode that terminal device obtains application identification code is identical with the mode that above-mentioned terminal device obtains application identities, repeats no more here.
Preferably, application identification code is the unique coding of an overall situation, and different internet, applications, different terminal devices, different time do not repeat.Preferably, this application identification code can be, but not limited to as UUID (Universally Unique Identifier, general unique identifier) or GUID (Globally Unique Identifier, Globally Unique Identifier), can certainly be adopt a mark in the global scope of similar techniques realization, be described for UUID for convenience of description.
After the application identification code of Authentication server after receiving process, if authorization information generates equipment carried out encryption to this application identification code, then Authentication server the second secret key pair of needing to utilize self to store its be decrypted after send to corresponding application server in the lump with authentication result, according to the application identification code received, application server can determine that user accesses the terminal device of internet, applications, and send the response message of permission/denied access according to the authentication result that Authentication server sends to this terminal device.
Embodiment six
Embodiment for a better understanding of the present invention, be described below in conjunction with the specific implementation process of information interaction flow process to embodiment of the present invention during authentication, for convenience of explanation, the embodiment of the present invention is accessed Web bank for user and is described, the flow process of user's logging in online banks as shown in Figure 6, can comprise the following steps:
When S61, user access internet, applications, set up the communication connection between terminal device and authorization information generation equipment.
During concrete enforcement, user can access Web bank by following two kinds of modes:
Mode one,
User uses the terminal device access Web bank obtaining authentication information, and such as, user uses mobile phone access Web bank, uses this mobile phone to obtain the authentication information of authorization information generation equipment generation simultaneously.In this case, the login page of the Web bank that user accesses needs to provide the application programming interfaces of the auth method encapsulation using the embodiment of the present invention to provide, when user needs logging in online banks by calling the authentication of this application programming interfaces triggered for user.
Mode two,
User uses the other-end device access Web bank beyond the terminal device obtaining authentication information, and such as user uses computer to access Web bank, uses the mobile phone of oneself to obtain the authentication information that authorization information generates equipment generation.In this case, Web bank's login page needs the proving program embedding the auth method encapsulation that the embodiment of the present invention provides, and show with the form of graphic code (can be, but not limited to as Quick Response Code) at login page, when user needs logging in online banks, directly scanning this Quick Response Code just can the authentication of triggered for user.
S62, authorization information generate equipment and generate authentication information.
After the authentication of triggered for user, user generates equipment (this equipment can for being supplied to user by bank when user registers bank account) generate authentication information by triggering one's own authorization information, such as, the button trigger authentication information generating device that user is provided by authorization information generation equipment generates authentication information, the concrete grammar that authorization information generates equipment generation authentication information see the description in above-described embodiment one, can repeat no more here.
Preferably, the risk brought of equipment is generated in order to avoid user loses authorization information, in the embodiment of the present invention, authorization information generates equipment and can also identify user identity before generation authentication information, such as, can be identified by fingerprint, the codon pair user that also can be pre-set by user is identified, here do not limit, accordingly, authorization information generates equipment can also comprise digital keys or fingerprint acquisition device.
During concrete enforcement, step S62 also can perform prior to step S61, and namely authorization information generates equipment and first generates authentication information, then establishes a communications link with terminal device, and the two also can perform simultaneously, and the embodiment of the present invention does not limit this.
S63, authorization information generate equipment and the mutual authentication information self generated of terminal device.
During concrete enforcement, the double secret key seed information that authorization information generates equipment utilization self storage carries out processing the seed information after obtaining process, seed information after process and the device identification of self are carried in authentication information and send to terminal device, or also initiatively can be obtained the authentication information of the seed information after comprising process to communicator module by terminal device.
S64, terminal device send authentication request to the Authentication server of network side.
Wherein, the device identification of the seed information after the process obtained and authorization information generation equipment is carried in authentication request.
It should be noted that, terminal device can also obtain application identification code and the application identities of the internet, applications that user accesses, and is carried in authentication request and sends to Authentication server in the lump.
During concrete enforcement, terminal device can generate with authorization information the application identities obtaining the internet, applications that user accesses before equipment establishes a communications link, also can generating with authorization information the application identities obtaining the internet, applications that user accesses after equipment establishes a communications link, also after receiving authentication information, the application identities of the internet, applications that user accesses can be obtained again, as long as obtained before transmission authentication request, the present invention does not limit this.
Such as, if user is by above-mentioned first kind of way access internet, applications, then the UUID of the terminal device application identities or Apply Names and correspondence thereof that directly can obtain the current internet, applications of accessing of user sends to Authentication server in the lump; If user is by above-mentioned second way access internet, applications, then comprise UUID corresponding to the application identities of internet, applications or Apply Names and this internet, applications at the graphic code generating login page display, like this, terminal device just can obtain UUID corresponding to application identities or Apply Names and this internet, applications by this graphic code of scanning, and the device identification that the seed information after the process obtained in the Quick Response Code generated with the equipment that generates from authorization information and authorization information generate equipment sends to Authentication server in the lump.
Preferably, in order to improve the security of data transmission, the UUID of acquisition can send to authorization information to generate after equipment processes by terminal device, then sends to Authentication server, is tampered in transmitting procedure to prevent it.Be to be understood that, if UUID sends to authorization information to generate equipment when processing by terminal device, its need to obtain before establishing a communications link UUID and application identities or connect communicate after receive authentication information before obtain UUID and application identities.So that the UUID after process is carried in authentication information by authorization information generation equipment send to terminal device in the lump.
During concrete enforcement, terminal device can pass through the Authentication server transmission authentication request to network side such as cable network, wireless network and mobile communications network.
S65, Authentication server search corresponding key according to the device identification of carrying in authentication request.
S66, Authentication server utilize the current time information after the key recovery and/or verification process found.
S67, Authentication server carry out authentication.
During concrete enforcement, generate equipment with authorization information and example is encrypted as to current time, Authentication server compares current time and the current time of self that the authorization information restored generates equipment, if the time interval is no more than the default time interval, determine to be verified, otherwise, determine that checking is not passed through.
S68, Authentication server send the result to providing the application server of internet, applications.
During concrete enforcement, Authentication server provides the result according to the application identities of carrying in authentication request or Apply Names to this application identities or application server corresponding to Apply Names, and carries the UUID of the internet, applications of user's current accessed in the result sent.
S69, application server send the response message of permission/denied access to terminal device.
During concrete enforcement, according to UUID, application server determines that user accesses terminal device and the application program of internet, applications, and sends the response message of permission/denied access to this terminal device according to the result.
In security system due to existing employing encryption mechanism, the security of asymmetric-key encryption technology has obtained abundant theoretical proof, and widely uses.But its topmost shortcoming is that key is oversize, the mankind cannot directly remember and input, and user needs usually by key storage in computer document or hardware device, imports during use, like this, just there is the risk of Key Exposure, and use very inconvenience.And in the embodiment of the present invention, because graphic code is as one machine automatic identification technology easily, can be used for representing and and be easily identified cipher-text information and transmits and then decipher.Which solve key in existing asymmetric-key encryption mechanism oversize, be not easy to the problem directly used.In addition, in the embodiment of the present invention, use separate hardware to generate authentication information, private key can be avoided to be stolen, to copy and to distort, there is high security.Simultaneously, when using asymmetric-key encryption mechanism in the embodiment of the present invention, private key is stored in authorization information and generates in the security module of equipment, PKI is stored in Authentication server, even if Authentication server suffers hacker attacks, PKI is all revealed, and the identity that assailant also cannot forge any user is verified, thus does not form any threat.Finally, due to the length of key and intensity enough, therefore authorization information can be directly used to generate the device identification (can be its unique numbering) of equipment as user name, each cipher-text information to seed information encryption generation or the information of having signed carry out authentication as password, realize one-time pad, and password complexity is far away higher than the password that the common mankind are arranged, security and convenience improve all greatly.
The third embodiment,
The authentication system that the embodiment of the present invention provides can also be used for enterprise's gate control system, namely enterprise only needs installation diagram code scanner device (can be such as camera), and be equipped with a key storage device for each employee, the subscriber authentication information that can be generated by scanning key storage device when entering is verified it, by then allowing to enter, meanwhile, the information such as an opening time can also be recorded.
During concrete enforcement, the authentication system that the embodiment of the present invention provides can provide a key storage device for different internet, applications, also independent key storage device can be provided for internet, applications such as Web bank, the on-line payment etc. that safety requirements is high, now, corresponding relation between the device identification of the key storage device that the application identities that Authentication server needs to safeguard internet, applications is corresponding with it and key, to provide authentication to different internet, applications.
It should be noted that, the terminal device related in the embodiment of the present invention can be the mobile terminal devices such as mobile phone, panel computer, PDA (personal digital assistant), intelligent watch, also can be the equipment such as PC (PC), as long as be provided with camera head or scanister, the terminal device obtaining the graphic code that key storage device generates can be scanned.
In addition, the internet, applications related in the embodiment of the present invention comprises the website, application client etc. that can be conducted interviews by internet/mobile Internet.
Therefore, relative to traditional auth method, the auth method security that the embodiment of the present invention provides is higher, achieves password and the one-time pad of high complexity, avoids the risk that password is stolen.And the auth method that the embodiment of the present invention provides, more convenient and quicker, user is without the need to memory and input various different username and password, and direct scintigram shape code can complete authentication process itself fast.
6 pure digi-tal that the password arranged due to the Password Length in the auth method that the embodiment of the present invention provides and strength ratio domestic consumer and existing RSA SecurID two-factor authentication token use are high a lot, therefore, directly authentication can be carried out as main password.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Although describe the preferred embodiments of the present invention, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.