CN105812334B - A kind of method for network authorization - Google Patents

A kind of method for network authorization Download PDF

Info

Publication number
CN105812334B
CN105812334B CN201410852736.1A CN201410852736A CN105812334B CN 105812334 B CN105812334 B CN 105812334B CN 201410852736 A CN201410852736 A CN 201410852736A CN 105812334 B CN105812334 B CN 105812334B
Authority
CN
China
Prior art keywords
key
identification card
subscriber identification
phone number
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410852736.1A
Other languages
Chinese (zh)
Other versions
CN105812334A (en
Inventor
傅宇晨
李良
华燕翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huahong Integrated Circuit Design Co., Ltd.
Original Assignee
BEIJING HUAHONG INTEGRATED CIRCUIT DESIGN Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HUAHONG INTEGRATED CIRCUIT DESIGN Co Ltd filed Critical BEIJING HUAHONG INTEGRATED CIRCUIT DESIGN Co Ltd
Priority to CN201410852736.1A priority Critical patent/CN105812334B/en
Publication of CN105812334A publication Critical patent/CN105812334A/en
Application granted granted Critical
Publication of CN105812334B publication Critical patent/CN105812334B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention discloses a kind of method for network authorization, it include: that login service device receives logging request, certificate server is sent by the cell-phone number of user and logging request, and sends subscriber identification card corresponding with the cell-phone number of user for current authentication characteristics of objects value;Certificate server generates random number, and by and the corresponding key object of cell-phone number, certification object characteristic value and the random number of generation of user be sent to subscriber identification card corresponding with the cell-phone number of user;Subscriber identification card is decrypted to obtain private key to the key object, the current authentication characteristics of objects value is verified according to certification object characteristic value, when the current authentication characteristics of objects value passes through verifying, subscriber identification card signs to the random number with the private key, and sends the certificate server for signature result;After certificate server receives the signature result, sign test is carried out with public key.The embodiment of the present invention can save subscriber identification card memory space, improve the safety of network authentication.

Description

A kind of method for network authorization
Technical field
The present invention relates to internet security field more particularly to a kind of method for network authorization.
Background technique
Currently, user is stepping on using application, the service or when information system under internet environment, be typically necessary first into Row login authentication.The most commonly used is user authentication is carried out by way of username and password.However, this username and password Login mode one side safety it is poor, be easy illegally intercepted and captured and attacked and password is caused to be stolen, on the other hand, it is different Using or service require respective username and password, user can sometimes forget Password, and user reset password step It is rapid general all more complicated, the expense of trouble, increased application or system is caused to user, reduces working efficiency.
It currently, can be by subscriber identification card (such as SIM card, USIM in order to improve the safety of network authentication Card, UIM card etc.) regard authentication component, it is authenticated by registration cell-phone number and subscriber identification card, is recognized to carry out network Card.Subscriber identification card itself has multiple hardwares safeguard measure, there is very high safety.There are also symmetric encipherment algorithms and non- The coprocessor of symmetric encipherment algorithm can guarantee the performance of operation.
The conventional steps of authentication method based on subscriber identification card are: subscriber identification card generates public private key pair, And private key certificate is stored in subscriber identification card, public key certificate is transmitted to server.When doing signature sign test, service Device passes information to subscriber identification card, and subscriber identification card is encrypted with private key, and encryption information is passed to Server, server are decrypted with public key, judge the legitimacy of user identity.
Following problems exist in the prior art: due to for different services, application or information system, it may be necessary to different Private key certificate, thus need to store multiple and different private key certificate in subscriber identification card.The length of each certificate From several hundred a bytes to thousands of a bytes, multiple certificates just need to occupy a large amount of memory space in subscriber identification card. And the memory space of private key certificate is mostly reserved, once memory space completely, may will limit the development of follow-up business. Moreover, in actual use, it is also necessary to develop corresponding STK menu on subscriber identification card, allow user can be into certificate Row management, for example add, it deletes, update etc., it operates more complex, management is inconvenient.
Summary of the invention
The embodiment of the invention provides a kind of method for network authorization, the safety of user authentication under internet environment can be improved Property, save the memory space of subscriber identification card.
In view of this, the present invention provides a kind of method for network authorization, it may include:
Login service device receives logging request, sends certificate server for the cell-phone number of user and the logging request, And subscriber identification card corresponding with the cell-phone number of user is sent by current authentication characteristics of objects value;
Certificate server generates random number, and by key object corresponding with the cell-phone number of user, certification object characteristic value Subscriber identification card corresponding with the cell-phone number of user is sent to the random number of generation;
Subscriber identification card is decrypted to obtain private key to the key object, is verified according to certification object characteristic value The current authentication characteristics of objects value, when the current authentication characteristics of objects value passes through verifying, subscriber identification card institute It states private key to sign to the random number, and sends the certificate server for signature result;
After the certificate server receives the signature result, sign test is carried out with corresponding public key, if by sign test, It is verified, if not over sign test, authentication failed.
In the first possible implementation, before the login service device receives logging request, may also include that Memory mobile phone number and certification object characteristic value corresponding with the cell-phone number, public key, key in the certificate server.
In the second possible implementation, in the certificate server memory mobile phone number and with the cell-phone number pair The step of certification object characteristic value for answering, public key, key can include:
Login service device sends registration request, the cell-phone number that user inputs and certification object characteristic value to certificate server;
After certificate server receives the registration request, to user identity identification corresponding with the cell-phone number of the input Card sends subscriber identification card registration request;
After subscriber identification card receives the subscriber identification card registration request, public private key pair is generated, by private key It carries out encryption and forms key object, and send the certificate server for the key object and the public key;
The certificate server receives the key object and the public key, and stores the cell-phone number, described of user's input The corresponding certification object characteristic value of cell-phone number, public key and key object.
In the third possible implementation, the subscriber identification card receives the subscriber identification card note After volume request, public private key pair is generated, private key is subjected to the step of encryption forms key object can include: the user identity identification Card encrypts the private key with symmetric key, forms key object.
In the fourth possible implementation, subscriber identification card is decrypted to obtain private to the key object Key, the step of current authentication characteristics of objects value is verified according to certification object characteristic value can include: in the current authentication When characteristics of objects value is unverified, exception information is sent to the login service device, the login service device refusal is notified to use Family logs in.
In a fifth possible implementation, it after the certificate server receives the signature result, is carried out with public key Sign test, if be verified by sign test, if not over sign test, the step of authentication failed can include: if passed through Sign test, then the certificate server notifies the login service device refusal user to log in, if notifying institute not over sign test Stating login service device allows user to log in.
In a sixth possible implementation, the certification object characteristic value may include it is following at least one: user's IP address, port numbers, the cryptographic Hash of app encapsulation certificate of login service device.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that
In the embodiment of the present invention, do not need for private key to be stored on the subscriber identification card of user mobile phone, but will be public Key and private key are stored on certificate server, certification when by certificate server by private key be sent to subscriber identification card into Row certification saves the memory space of subscriber identification card, also, due to being with the progress of encrypted key object to private key It stores and transmits, and encryption key is only stored in subscriber identification card, so safety is higher.And it is and conventional It is different in such a way that user name password is verified, it is verified, is avoided caused by user forgets Password by cell-phone number Trouble.
Detailed description of the invention
Fig. 1 is the flow chart of method for network authorization one embodiment in the embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides a kind of method for network authorization, can save the memory space of subscriber identification card, Improve the safety of certification.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
Referring to Fig. 1, method for network authorization one embodiment includes: in the embodiment of the present invention
S101, login service device receive logging request, send certification clothes for the cell-phone number of user and the logging request Business device, and subscriber identification card corresponding with the cell-phone number of user is sent by current authentication characteristics of objects value;
Wherein, user is when logging in Internet service, application or information system, and (such as passes through click login page Submitting button) submission logging request, after login service device receives the logging request of user's submission, server can be according to login account Number corresponding phone number is searched, the cell-phone number of user is sent collectively to certificate server together with logging request, and will be current Certification object characteristic value is sent to subscriber identification card corresponding with the cell-phone number of user, which can be SIM card, usim card, the UIM card etc. of client identity identification are carried out for communication networks such as 2G, 3G, 4G.
S102, certificate server generate random number (or one group of characteristic value comprising random number), and will be with user's The corresponding key object of cell-phone number, certification object characteristic value and the random number of generation are sent to use corresponding with the cell-phone number of user Family identification card.
Wherein, the key object is to carry out encrypted information to private key.Certificate server is receiving logging request Later, random number can be generated, then by the key object corresponding with the cell-phone number of user prestored in certificate server, certification pair The corresponding subscriber identification card of cell-phone number for being sent collectively to user together with the random number of generation as characteristic value.
S103, subscriber identification card are decrypted to obtain private key to the key object, according to certification object characteristic value The current authentication characteristics of objects value is verified, when the current authentication characteristics of objects value passes through verifying, user identity identification Card signs to the random number with the private key, and sends the certificate server for signature result.
Wherein, subscriber identification card receives the current authentication characteristics of objects value that login service device is sent to, and receives After the key object that is sent to certificate server, certification object characteristic value and random number, the current authentication object that will receive Characteristic value is compared with the certification object characteristic value prestored, if consistent with each other, current authentication characteristics of objects value is by testing Card, then the private key after subscriber identification card decompression signs to random number.
S104 after the certificate server receives the signature result, carries out sign test with public key, if by sign test, It is verified, if not over sign test, authentication failed.
Using method for network authorization provided by the invention, the user identity identification that private key is stored in user mobile phone is not needed On card, but public key and private key are stored on certificate server, private key is sent to user by certificate server in certification Identification card is authenticated, and saves the memory space of subscriber identification card, also, due to being with encrypted to private key What key object was stored and transmitted, so safety is higher.And it and conventional is verified by user name password Mode is different, is verified by cell-phone number, and trouble caused by user forgets Password is avoided.
Preferably, the certification object characteristic value may include the IP address of the login service device of user, port numbers, app Encapsulate the cryptographic Hash etc. of certificate.
It in a preferred embodiment of the present invention, can be with before the login service device receives logging request It include: memory mobile phone number and certification object characteristic value corresponding with the cell-phone number, public key, close in the certificate server Key.
Preferably, by the following method generate and memory mobile phone number, public key corresponding with cell-phone number, key, certification object The information such as characteristic value:
Login service device sends registration request, the cell-phone number that user inputs and certification object characteristic value to certificate server;
After certificate server receives the registration request, to user identity identification corresponding with the cell-phone number of the input Card sends subscriber identification card registration request;
After subscriber identification card receives the subscriber identification card registration request, public private key pair is generated, by private key It carries out encryption and forms key object, and send the certificate server for the key object and the public key;
The certificate server receives the key object and the public key, and stores the cell-phone number, described of user's input The corresponding certification object characteristic value of cell-phone number, public key and key object.
User mobile phone number is registered in the above manner, user first passes through login page, by subscriber identification card Public key and key are generated, and public key and key are transmitted on certificate server, by certificate server memory mobile phone number and and hand The corresponding certification object characteristic value of machine number, public key and key object.Recognize in this manner it is possible to which the information such as private key and key are stored in Demonstrate,prove in server, save space for subscriber identification card, also facilitate the data such as public key, key are added, are deleted, The management of the operations such as update.
Preferably, the subscriber identification card is when carrying out encryption for private key and forming key object, can be with symmetrical close Key encrypts the private key, such as the symmetric keys such as AES or 3DES.Correspondingly, user identity is known when user log-in authentication It is not stuck in when receiving key object from certificate server, same symmetric key also can be used, key object is solved It is close, obtain private key.The symmetric key can store on subscriber identification card.
Preferably, subscriber identification card verifies the current authentication characteristics of objects value according to certification object characteristic value, When current authentication characteristics of objects value is unverified, exception information is sent to the login service device, is stepped on described in notice Server refusal user is recorded to log in.
Preferably, after the certificate server receives the signature result, sign test is carried out with public key, if by testing Label, then the certificate server notifies the login service device refusal user to log in, if not over sign test, described in notice Login service device allows user to log in.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
Description and claims of this specification and term " first ", " second ", " third " " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein Or the sequence other than the content of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that Cover it is non-exclusive include, for example, containing the process, method, system, product or equipment of a series of steps or units need not limit In step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, produce The other step or units of product or equipment inherently.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (5)

1. a kind of method for network authorization characterized by comprising
Login service device receives logging request, sends certificate server for the cell-phone number of user and the logging request, and will Current authentication characteristics of objects value is sent to subscriber identification card corresponding with the cell-phone number of user;
Certificate server generates random number, and by key object corresponding with the cell-phone number of user, certification object characteristic value and life At random number be sent to subscriber identification card corresponding with the cell-phone number of user;
Subscriber identification card is decrypted to obtain private key to the key object, is verified according to certification object characteristic value described Current authentication characteristics of objects value, when the current authentication characteristics of objects value passes through verifying, the subscriber identification card private Key signs to the random number, and sends the certificate server for signature result;
After the certificate server receives the signature result, sign test is carried out with public key, if be verified by sign test, If not over sign test, authentication failed;
Before the login service device receives logging request, further includes:
Memory mobile phone number and certification object characteristic value corresponding with the cell-phone number, public key, key in the certificate server;
Memory mobile phone number and certification object characteristic value corresponding with the cell-phone number, public key, key in the certificate server The step of include:
Login service device sends registration request, the cell-phone number that user inputs and certification object characteristic value to certificate server;
After certificate server receives the registration request, sent out to subscriber identification card corresponding with the cell-phone number of the input Send subscriber identification card registration request;
After subscriber identification card receives the subscriber identification card registration request, public private key pair is generated, private key is carried out Encryption forms key object, and sends the certificate server for the key object and the public key;
The certificate server receives the key object and the public key, and stores the cell-phone number of user's input, the mobile phone Number corresponding certification object characteristic value, public key and key object.
2. method for network authorization according to claim 1, which is characterized in that the subscriber identification card receives described After subscriber identification card registration request, public private key pair is generated, private key, which is carried out the step of encryption forms key object, includes:
The subscriber identification card encrypts the private key with symmetric key, forms key object.
3. method for network authorization according to claim 1, which is characterized in that subscriber identification card is to the key object The step of being decrypted to obtain private key, the current authentication characteristics of objects value is verified according to certification object characteristic value include:
When current authentication characteristics of objects value is unverified, exception information is sent to the login service device, notifies institute Login service device refusal user is stated to log in.
4. method for network authorization according to claim 1, which is characterized in that the certificate server receives the signature knot After fruit, sign test is carried out with public key, if be verified by sign test, if not over sign test, the step of authentication failed Include:
If the certificate server notifies the login service device refusal user to log in, if passed through not over sign test Sign test then notifies the login service device that user is allowed to log in.
5. method for network authorization described in any one of -4 according to claim 1, which is characterized in that the certification object characteristic value Including it is following at least one: the IP address of the login service device of user, port numbers, the cryptographic Hash of app encapsulation certificate.
CN201410852736.1A 2014-12-31 2014-12-31 A kind of method for network authorization Active CN105812334B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410852736.1A CN105812334B (en) 2014-12-31 2014-12-31 A kind of method for network authorization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410852736.1A CN105812334B (en) 2014-12-31 2014-12-31 A kind of method for network authorization

Publications (2)

Publication Number Publication Date
CN105812334A CN105812334A (en) 2016-07-27
CN105812334B true CN105812334B (en) 2019-02-05

Family

ID=56420920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410852736.1A Active CN105812334B (en) 2014-12-31 2014-12-31 A kind of method for network authorization

Country Status (1)

Country Link
CN (1) CN105812334B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302544A (en) * 2016-10-18 2017-01-04 深圳市金立通信设备有限公司 A kind of safe verification method and system
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
CN108768650B (en) * 2018-04-12 2021-06-22 济南大学 Short message verification system based on biological characteristics
CN109005155B (en) * 2018-07-04 2021-11-12 奇安信科技集团股份有限公司 Identity authentication method and device
CN110417848B (en) * 2019-05-22 2022-04-01 无锡源致科技有限公司 Racing pigeon decentralized competition method
CN110602076B (en) * 2019-08-15 2021-11-26 中国人民银行数字货币研究所 Identity using method, device and system based on master identity multiple authentication
CN110492989B (en) * 2019-08-23 2020-11-13 广州华多网络科技有限公司 Private key processing method, access method, and medium and device corresponding to method
CN114244565B (en) * 2021-11-16 2023-09-19 广东电网有限责任公司 Key distribution method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254380A (en) * 2010-05-31 2011-11-23 北京汇冠金财科技有限公司 Safe mobile phone payment method and system based on hybrid encryption mechanism
CN103346887A (en) * 2013-07-02 2013-10-09 山东科技大学 Low-complexity identity authentication method based on intelligent card and under multiserver environment
CN103813333A (en) * 2014-02-21 2014-05-21 天地融科技股份有限公司 Data processing method based on negotiation keys
CN103944724A (en) * 2014-04-18 2014-07-23 天地融科技股份有限公司 User identity identification card
CN103944715A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data processing method based on agreement key

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1601958B (en) * 2003-09-26 2010-05-12 北京三星通信技术研究有限公司 HRPD network access authentication method based on CAVE algorithm
US7418595B2 (en) * 2004-01-02 2008-08-26 Nokia Siemens Networks Oy Replay prevention mechanism for EAP/SIM authentication
EP1976322A1 (en) * 2007-03-27 2008-10-01 British Telecommunications Public Limited Company An authentication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254380A (en) * 2010-05-31 2011-11-23 北京汇冠金财科技有限公司 Safe mobile phone payment method and system based on hybrid encryption mechanism
CN103346887A (en) * 2013-07-02 2013-10-09 山东科技大学 Low-complexity identity authentication method based on intelligent card and under multiserver environment
CN103813333A (en) * 2014-02-21 2014-05-21 天地融科技股份有限公司 Data processing method based on negotiation keys
CN103944724A (en) * 2014-04-18 2014-07-23 天地融科技股份有限公司 User identity identification card
CN103944715A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data processing method based on agreement key

Also Published As

Publication number Publication date
CN105812334A (en) 2016-07-27

Similar Documents

Publication Publication Date Title
CN105812334B (en) A kind of method for network authorization
US10187202B2 (en) Key agreement for wireless communication
CN106161359B (en) It authenticates the method and device of user, register the method and device of wearable device
CN102761870B (en) Terminal authentication and service authentication method, system and terminal
CN103747443B (en) One kind is based on cellphone subscriber's identification card Multi-security domain device and its method for authenticating
CN109858262A (en) Workflow examination and approval method, apparatus, system and storage medium based on block catenary system
US9088408B2 (en) Key agreement using a key derivation key
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN111447220B (en) Authentication information management method, server of application system and computer storage medium
US20170148014A1 (en) Device-Associated Token Identity
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
CN109740319A (en) Digital identity verification method and server
CN108234126B (en) System and method for remote account opening
CN114666040A (en) Radio frequency identification authentication system and method based on quantum cryptography network
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device
CN104683979B (en) A kind of authentication method and equipment
CN115801448A (en) Data communication method and system
TW201947434A (en) Application login method
WO2016161717A1 (en) Data processing method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 100089 Floor 12 1506, Building A 1, 66 Zhongguancun East Road, Haidian District, Beijing

Patentee after: Beijing Huahong Integrated Circuit Design Co., Ltd.

Address before: 100080 Beijing City, Haidian District Zhongguancun Road No. 66, building 1, 12 layers of 1501-1510

Patentee before: Beijing Huahong Integrated Circuit Design Co., Ltd.

CP03 Change of name, title or address