TW200901721A - Secure videoconferencing system and method thereof - Google Patents

Secure videoconferencing system and method thereof Download PDF

Info

Publication number
TW200901721A
TW200901721A TW97136477A TW97136477A TW200901721A TW 200901721 A TW200901721 A TW 200901721A TW 97136477 A TW97136477 A TW 97136477A TW 97136477 A TW97136477 A TW 97136477A TW 200901721 A TW200901721 A TW 200901721A
Authority
TW
Taiwan
Prior art keywords
user
key
group
conference
calculate
Prior art date
Application number
TW97136477A
Other languages
Chinese (zh)
Other versions
TWI387292B (en
Inventor
jian-long Xu
zong-cheng Wu
yan-qing Lin
Original Assignee
Univ Chang Gung
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Chang Gung filed Critical Univ Chang Gung
Priority to TW97136477A priority Critical patent/TWI387292B/en
Publication of TW200901721A publication Critical patent/TW200901721A/en
Application granted granted Critical
Publication of TWI387292B publication Critical patent/TWI387292B/en

Links

Abstract

A secure videoconferencing system and method thereof are disclosed to provide the related security mechanism and module and to enhance the security of the videoconferencing system, so as to achieve the goal of tremendous security, that is, to provide higher security and better affinity. The present invention is for the system administrator to provide the user for opening, canceling and issuing Java-based Card, thus the system administrator can create a certificate authority (CA). For the users, the system is for the primary user to open or close the session, create the session list and cancel the illicit user. The system provides the self-designed public-key mechanism to assure the session confidentiality and uses the self-designed two-party password identity-based authentication mechanism to confirm a user's legitimacy.

Description

200901721 九、發明說明: 【發明所屬之技術領域】 本發明係提供一種視訊會議系統及方法,尤 種更具安全性及親和性之安全視訊會議系統,其 設計的金鑰協議機制,確保會議訊4、的機密性。 【先前技術】 資訊網路已經是現代社會不可或缺n 的生活息息相關。近车枣娘!狄α α %牛求網路的技術不斷突破, 及品質大幅提升,Π& 在因為頻寬限制而做不到的 訊,現在已能達成,並且還出現了即時通訊軟體 MSN Messenger ^ Yahoo Messenger ^ Skype # » 用者能與他人即時谁令& 1听進仃文子聊天、語音對話、視 多元化功能。 視Λ會議系統即整合電腦、網路通訊以及視 軟硬體《又備形成一種新的通訊工具,&夠即時的 、影像、文字盘咨极 ^ .__. ^ ^ ,、貝枓’匕打破了人傳統溝通的格 網路使用者可以不受時間與空間之限制,在網際 行面對® 0遠距交Μ。這類系統的應用範嘴廣泛 企業視訊會議、遠距教學、制設計、虛擬社群 護等應用。 然而’隨著網路犯罪的猖獗,視訊會議系統 安全性議題1發弓I人重視。系統的安全性不足 用者可能會面臨以下的問題: 1 .假 w . 士 •有心人士假冒他人偽造資料、複 指提供一 精由自行 它與個人 網路頻寬 多媒體通 ,例如: 讓網路使 訊聊天等 訊等各種 傳送聲音 式,允許 網路中進 ,例如: 、居家照 所面臨的 將使得使 製、重送 5 200901721 或竄改傳送的訊息,使得合 正確性。 法使用者無法分辨資料來源的 2 *竊聽:在網路傳送的 心人士竊取,使得内容曝Γ程中,影音、文字遭刻有 過程::二有些屬於個人的隱私資料,在網路的傳送 程中4到有心人士竊取散播。 …其習用身分鐘別系統會有下列缺失: •私Μ能會被伺服器如叫得知。 私鑰。1腦中右存有私鑰,就有可能遭木馬程式竊取到 3 ·使用點對點涂# |& , ” 金输’非多人共同建立一把金鑰 ,&•成金鑰的建立無效率。 ID、p4 .伺服器(Serve〇知道所有使用者的秘密資訊(如 資料。rd)右遭有心人士竊取,就能假冒他人傳送 5 ·需額外安裝加密軟體。 一、針對上述習知、结構所存在之問題點,如何開發 3更具理想實用性之創新結構,實消費者所殷切企盼, 亦係相關業者須努力研發突破之目標及方向。 有鑑於此,發明又士 月人本於多年從事相關產品之製造開發 與設計經驗,針對、+、+ α μ 述之目裇,詳加設計與審慎評估後, 終得—確具實用性之本發明。 【發明内容】 欲解決之技術問題點:隨著網路犯罪的猎獗,視訊會 6 200901721 議系統所面臨的安令,14蟮0自,A e 文王性義嘁,愈發引人重視。系統的安全 性不足將使得使用者可能會面臨以下的問題有假冒、竊聽 及隱私纟中饭g為有心人士假冒他人偽造資料、複製、 重送或窥改傳送的[自 你值人 的Λ心使得合法使用者無法分辨資料來 源的正確纟。竊聽為在網路傳送的過程中,影音、文字遭 到有U人士竊& ’使得内容曝光。隱私為有些屬於個人的 隱私資料’在網路的傳送過程中,遭到有心人士竊取散播 解決問題之技術特點··本發明提供一種安全視訊會議 系統及方法,主要係提出相關安全機制與模組,加強視訊 會議系統的安全性,以達到相當好的安全性(PGS,pretty Good Security)之目標,即具備高安全(G〇〇d Security)與 咼親和性(Good Friendliness),本系統針對系統管理者, 提供使用者註冊、註銷以及核發Java Carci等功能,使系 統管理者具有簡易認證當局(CA,Certificati〇n Authority) 的功能。對於使用者而言,本系統將針對擔任主席之使用 者’提供開啟和關閉會議,建立會議名單、踢除不當行為 之與會者等基本功能’本系統提供自行設計的金鑰機制, 確保會議訊息的機密性,並且利用自行設計的通行碼基底 之雙向身分鑑別機制,以確認使用者身分的合法性。 對照先前技術之功效: 一 '使用者在登入系統的階段,只需填入個人的通行 碼與插入Java Card,便能向Server驗證身分。在登入系 統後,每位使用者只能得知自身有權限參與的會議,並且 7 200901721 =次會礅所使用的加解密金鑰都不同,縱使某把會議金鑰 4 I破解,並不會揭露先前的會議金鑰,可確保每次會議 的機後、性。而不同群體間使用的會議金鑰也不同,可確保 >料與影音的機密性。 — 使用者在登入系統的階段,只需輸入自訂的通行 '馬就犯向Server驗證身分進入系統。本系統使用web·200901721 IX. Description of the Invention: [Technical Field] The present invention provides a video conferencing system and method, and a security video conferencing system with more security and affinity, and a key agreement mechanism designed to ensure conference communication. 4. Confidentiality. [Prior Art] The information network has become an indispensable life in modern society. Near the car date mother! Di α α % % The technology of the Internet has been continuously broken, and the quality has been greatly improved. Π& The message that can't be done because of the bandwidth limitation can now be achieved, and the instant messaging software MSN Messenger ^ Yahoo Messenger ^ Skype # » Users can interact with others instantly & 1 listen to chat, voice conversation, and diversification. The videoconferencing system integrates computers, network communications, and software and hardware. "There is also a new communication tool. & Instant, video, and text-oriented. ^__. ^ ^ ,, Bellow'匕Users who break the traditional communication network can be free from time and space constraints and face the Internet. The application of such systems is widely used in enterprise video conferencing, distance learning, system design, virtual community protection and other applications. However, with the embarrassment of cybercrime, the security issue of the videoconferencing system has been paid attention to. Insufficient security of the system may face the following problems: 1. Fake w. • People who are willing to impersonate others to falsify information, and provide a fine-grained multimedia network with personal network, for example: Let the network Various types of transmissions, such as communication chat, etc., allow the network to enter, for example: , the home photo will be faced with the system, will make the system, re-deliver 5 200901721 or tamper with the transmitted message, so that the correctness. The user of the law can't distinguish the source of the data. 2 *Eavesdropping: The person who steals the heart on the Internet, so that the content is exposed, the video, the text is engraved with the process: 2 Some are personal privacy data, transmitted on the network Cheng Zhong 4 to the people who are interested in stealing the spread. ...there will be the following shortcomings in the system: • The private can be known by the server. Private key. 1 In the brain, there is a private key on the right, which may be stolen by the Trojan horse. 3. Use point-to-point paint # |& , "Golden loser" is not a multi-person to jointly establish a key, & ID, p4. Server (Serve〇 knows that all users' secret information (such as data. rd) is stolen by someone who is interested in it, and can impersonate others to transmit. 5. Additional encryption software is required. 1. For the above-mentioned conventional knowledge, structure The problem lies in how to develop 3 innovative structures that are more ideal and practical. The consumers are eagerly awaiting, and the relevant industry players must work hard to develop breakthrough goals and directions. In view of this, the invention has been based on many years. Engaged in the manufacturing development and design experience of related products, focusing on the results of +, + α μ, detailed design and prudent evaluation, and finally obtained the practical invention. [Disclosed] Technical problem to be solved Point: With the cybercrime hunting, video conferencing 6 200901721 The security system faced by the system, 14 蟮 0 self, A e Wen Wang 嘁 嘁, more and more attention. System security is insufficient to make users may I will face the following problems: counterfeiting, eavesdropping, and privacy. I am for the purpose of impersonating someone to falsify information, copy, resend, or peek at the transmission [from the value of your value, making it impossible for legitimate users to distinguish the source of the data. Eavesdropping In the process of transmission on the Internet, audio and video, texts have been hacked by U people and 'allow content exposure. Privacy is some personal privacy information'. Technical Features for Solving the Problem · The present invention provides a security video conferencing system and method, which mainly proposes related security mechanisms and modules, and enhances the security of the video conferencing system to achieve a relatively good security (PGS, pretty Good Security). The goal is to have high security (G〇〇d Security) and Good Friendliness. This system provides system administrators with functions such as registering, deregistering, and issuing Java Carci for system administrators. The function of the authority (CA, Certificati〇n Authority). For the user, the system will be directed to the chairman The user 'provides basic functions such as opening and closing conferences, establishing conference lists, and dismissing misconduct participants. 'The system provides a self-designed key mechanism to ensure the confidentiality of conference messages and utilizes a self-designed passcode base. The two-way identification mechanism to confirm the legitimacy of the user's identity. In contrast to the effects of the prior art: a user at the stage of logging in to the system, simply fill in the personal passcode and insert the Java Card to verify the identity of the server After logging in to the system, each user can only know the conferences they have permission to participate in, and 7 200901721 = the encryption and decryption keys used by the conference will be different, even if a conference key 4 I is cracked, The previous meeting key will be revealed to ensure the confidentiality of each meeting. The conference keys used by different groups are also different, which ensures the confidentiality of > material and video. — When the user logs in to the system, he or she simply enters a custom pass. This system uses web·

Based的界面,電腦只要具有上網的功能與基本的環境設 疋就月b連上本系統’與其他使用者做即時的影音與文字傳 輸。 有關本發明所採用之技術、手段及其功效,茲舉一較 佳實施例並配合圖式詳細說明於后,相信本發明上述之目 的、構造及特徵’當可由之得一深入而具體的瞭解。 【實施方式】 身分鑑別(HLC-Scheme)技術,係出自發明人之一發 表於國際數理雜誌 2006(公認的)(International Mathematical Journal,2006(Accepted))内的一篇報告’其 為「金鑰協定智慧卡使用於遠距相互認證之方案」 (Remote Mutual Authentication Scheme with Key Agreement using Smart Cards.)作者為:許建隆(Chien-Lung Hsu),劉筱賴(Hsiao-Chen Liu),周明慈(Ming-Tzu Chou)。 會議金鑰協議(HML-Scheme)技術,係出自發明人之 一引用於工作報告(Working paper),其為「自我驗證金錄 交換和會議金鑰分配系統」Self-Certified Key Exchange 8 200901721 and Conference Key Distribution System,作者為:許建隆 (Chien-Lung Hsu),林燕卿(Y.C_ Lin),吳宗成(t.C. Wu)。 本發明係提供一種安全視訊會議系統。包含有: 身分鑑別方法:該網路科技的發達使得越來越多的使 •用者藉由網路來傳遞資料,甚至藉以完成以往需要本人親 :自辦理的事務’如繳款、購物等等。因此,爲了保障每個 • 人的權益及資訊的隱私’鑑別使用者身分變得十分關鍵。 透過身分鑑別的程序,可以有效的區別合法與非法的使用 者’以防止非法的侵入者危害事務正常的運作。而在不安 全的網路中’如何防止他人藉由攔載、竊取通訊資料來假 I使用者身分或獲取個人秘密資料,以及如何破保通訊内 容的安全,也是一項重要的課題。 鑑別的方法可追溯至1981年,Lamport提出在不安 王的通道中,利用智慧卡及通行碼,允許使用者進行遠端 登錄,並確認其身分的合法性。隨後,便有許多不同的遠 端鑑別系統相繼被提出[1,3, 8],其目的都在於提高系統 效率和安全性。而先前許多學者所提出的方法常面臨平行 攻擊(parallel session attack)、重送攻擊(replay attack)、 模仿攻擊(reflection attack)、内部攻擊(insider attack)、 離線的字典攻擊(〇mine dictionary attack)、通行碼猜測 攻擊(password guessing attack)和假冒攻擊(forgery attack)。爲解決這些問題,我們除了要達到以下的功能: 1 .提升效能:在鑑別的過程中降低在網路上傳遞之訊息 的傳輸量,在計算方面,則減少使用者和伺服器的運 9 200901721 算成本。 2 .雙向鑑別:使用者和伺服器雙方都可驗證 合法性。 3 .金鑰協議:使用者可在每一次登入後和 把共享的密鑰,藉以建立一個安全通道, 的秘密通訊。 4 .使用者親切性:使用者可自由的選擇自己 向伺服器註冊。 5 ·簡單的通行碼變更機制:使用者可任意變 〇 6 .多伺服器鑑別:使用者可用單一通行碼向 伺服器註冊,登入多個主機。 7 .使用者之間的金錄協議:伺服器分別對不 分別鑑別身分之後’使用者之間可互相確 法的使用者並建立共享金输,以進行秘密 因此,我們提出一個以智慧卡為基礎之具 雙向鑑別的遠端登錄系統,使伺服器可以不需 碼對照表、並且達到使用者親切性、雙向鐘別 立一把使用者與伺服器之間的共享密鑰。本方 階段。 (a)系統設置階段 系統中心(system authority,簡稱SA)建立系統 參數,其定義如下: q 一大質數 彼此身分的 伺服建立一 以進行未來 的通行碼來 更其通行碼 多個不同的 同的使用者 認彼此為合 通訊。 金鑰協議與 要維護通行 ,更可以建 法分為四個 公開與秘密 10 200901721 ° 橢圓曲線的生成數,其秩為質數 y sa的私鑰,其中reZg q β SA的公鑰,其中滿足户 Μ·,·) 單向雜凑函數 χ(ρ) Ρ之X軸值 之後,SA公佈{G,%A塒,並將r保存作為私输。 0>)註冊階段:假設一個新的使用者π想要向鑑別伺服器 註冊(參閱第一圖所示),則C/,.可以透過安三 〜y王的方式來 傳送他的識別碼ZD,以及所選擇的通行碼w,给甸服器 (AS) ( 1 〇 )。當伺服器收到從使用者 有%傅來的{/D(.,尸❷ 時’鑑別伺服器(AS)會計算為(1 1 )如下: ’ !Based on the interface, the computer has the function of connecting to the Internet and the basic environment. The system is connected to the system on the monthly b' to make instant audio and video transmission with other users. With regard to the technology, the means and the functions of the present invention, it is to be understood that the above-mentioned objects, structures and features of the present invention will be described in detail with reference to the drawings. . [Embodiment] The identification (HLC-Scheme) technique is a report published by the inventor in International Mathematical Journal 2006 (Accepted), which is a key. "Remote Mutual Authentication Scheme with Key Agreement using Smart Cards." Author: Chien-Lung Hsu, Hsiao-Chen Liu, Ming Mingci (Ming) -Tzu Chou). The Conference Key Agreement (HML-Scheme) technology is derived from one of the inventors and is referred to as the Working Paper, which is the Self-Certified Exchange and Conference Key Distribution System. Self-Certified Key Exchange 8 200901721 and Conference Key Distribution System, authored by: Chien-Lung Hsu, Lin Yanqing (Y.C_ Lin), Wu Zongcheng (tC Wu). The present invention provides a secure video conferencing system. Including: Identity identification method: The development of this network technology has enabled more and more users to use the Internet to transmit information, and even to complete the need for their own personal affairs: self-services such as payment, shopping, etc. Wait. Therefore, in order to protect the rights of each person and the privacy of information, it has become critical to identify the user's identity. Through the process of identity identification, it is possible to effectively distinguish between legitimate and illegal users' to prevent illegal intruders from jeopardizing the normal operation of the business. In an unsafe network, it is also an important issue to prevent others from intercepting and stealing communication materials to fake I users or obtain personal secret information and how to break the security of communication content. The method of identification dates back to 1981, when Lamport proposed using smart cards and passcodes in the channel of the Unstable, allowing users to log in remotely and confirm the legitimacy of their identity. Subsequently, many different remote authentication systems have been proposed [1, 3, 8], all aimed at improving system efficiency and safety. The methods proposed by many previous scholars often face parallel session attacks, replay attacks, reflection attacks, insider attacks, and offline dictionary attacks. , password guessing attack and forgery attack. In order to solve these problems, in addition to the following functions: 1. Improve performance: reduce the amount of transmission of messages transmitted on the network during the authentication process, and reduce the user and server operations in terms of calculations. cost. 2. Two-way authentication: Both the user and the server can verify the legitimacy. 3. Key Agreement: The secret communication that the user can use to establish a secure channel after each login and the shared key. 4. User intimacy: Users are free to choose to register with the server themselves. 5 · Simple passcode change mechanism: Users can change arbitrarily. 6. Multi-server authentication: Users can register with the server with a single passcode and log in to multiple hosts. 7. The gold record agreement between users: the server separately identifies the user after the identity is not separately and establishes a shared gold input for the user to make a secret. Therefore, we propose a smart card based The remote login system with two-way authentication enables the server to establish a shared key between the user and the server without requiring a code comparison table and achieving user intimacy and two-way clock. This stage. (a) System setting phase The system authority (SA) establishes system parameters, which are defined as follows: q A large prime number of each other's servos are established to perform future passcodes and more passcodes. Users recognize each other as a communication. The key agreement and the maintenance of the pass, can be divided into four public and secret 10 200901721 ° elliptic curve generation number, its rank is the private key of the prime number y sa, where the public key of reZg q β SA, which meets the household Μ·,·) After the one-way hash function χ(ρ) X the X-axis value, SA publishes {G, %A埘, and saves r as a private input. 0>) Registration phase: Suppose a new user π wants to register with the authentication server (see the first figure), then C/,. can transmit his identification code ZD through the way of Ansan~ywang. , and the selected passcode w, to the id (AS) (1 〇). When the server receives a {/D (., corpse] authentication server (AS) from the user, it will be calculated as (1 1 ) as follows: ’ !

Ai = h{IDi\\ x)®h(PWi) \ ) 其中X為鑑別伺服器AS所擁有的密鑰。然後,As會儲 存資訊(切,至智慧卡(1 2 ),As會核發_張包 含資訊{仍,_,4,¥.),1仍的智慧卡給使用者^/(13)。 (C)登入階段:當已經註冊過的使用者R想要登入系統( 參閱第二圖所示)’以獲得存取權限時,他會插入他的智 慧卡到讀卡機裡,並且輸入他的身分碼仍.與通行竭( 2 0 )。¢/,的智慧卡將會使用已儲存的冬以及使用者所輸入 的通行碼來計算庆和c,: =(為㊉ Α(尸<)).G (2) ο) 其中T是讀卡機當時的日期和時間。然後智慧卡會傳 送登入訊息{/£>,,<:,,:〇給伺服器AS ( 2 1 )。 會員在向Server註冊及登入時,使用HLC-Scheme方 法來雙向鑑別身分及金輪協議。 11 200901721 (d)鑑別階段:在接收到從ί/,所傳來的登入訊息{/£>,,C,,r}之 後,鑑別伺服器 AS將執行下列步驟來檢查[/,的登入訊息 ,並且和使用者t/,建立一把交談金鑰。 步驟 1.核對仍,的有效性。如果是無效的,則 A S將會 • 拒絕t/,的登入要求。Ai = h{IDi\\ x)®h(PWi) \ ) where X is the key owned by the authentication server AS. Then, As will store the information (cut, to the smart card (1 2), As will issue _ Zhang contains information {still, _, 4, ¥.), 1 still smart card to the user ^ / (13). (C) Login phase: When the registered user R wants to log in to the system (see the second figure) to get access rights, he will insert his smart card into the card reader and enter him. The identity code is still the same as the pass (2 0). ¢/, the smart card will use the stored winter and the passcode entered by the user to calculate the sum and c:: = (for ten Α (corpse <)). G (2) ο) where T is read The date and time of the card machine at the time. The smart card then sends the login message {/£>,, <:,,:: to the server AS ( 2 1 ). When registering and logging in to the server, members use the HLC-Scheme method to authenticate the identity and the Golden Wheel Agreement in both directions. 11 200901721 (d) Identification phase: After receiving the login message {/£>, C, r} from ί/, the authentication server AS will perform the following steps to check [/, login] Message, and establish a conversation key with the user t/. Step 1. Check the validity of the still. If it is invalid, A S will • reject the login request for t/.

• 步驟2.確認Γ和Γ之間時間間隔的有效性,其中Γ'是 AS 所收 到登入訊息的時間 。假如(Γ-Γ)2ΔΓ ,其中ΔΓ為傳 m 延遲 的有 效時間間隔, 那麼AS會拒絕ί/,的登入要求。 步驟 3. 計算: B-= hilDiWx)^ (4) C-= 明巧) (5) 且比 對 < 是否和所 收到的c丨相同 。如果二者相等, 則 伺服 器 AS會接受登入 .的要求;不然 ,A S會拒絕登入 的 要求 〇 為了 讓%相信AS身分的合法性,AS將計算: Dt = ||rlie;) (6) (2 2 )其中r'是 當時的時戳。) 然後AS送回{Α,Γ"}給 使用 者巧 。當使用者%收到{Α,Π之後 ,會執行下列步驟 來 檢查 AS 的合法性: 步驟 1. Γ"是收到訊息 的時戳,檢查 A ^ (Tm-T")>AT » 如 果延遲的話, 就會停止交談 〇 步驟 2. 計算 D*. = ^;lir||Q) ⑺ 然後 .檢查/是否所 收到的相同( 2 3 )。如果這條 件 成立的話,%就會相信 AS是一個合法的鑑別伺服器,並 12 200901721 且繼續接下來的通訊。 由上述付知,AS和使用者都可以證明對方身分的合 法f生’所以可以達到雙向鑑別的目的。接下來,μ和使 用者則可利用雙方都知道的參數r5,和c,I計算出交 談金鑰尺: (8) K = h{r\\Bi\\ci)• Step 2. Confirm the validity of the time interval between Γ and ,, where Γ' is the time at which the AS received the login message. If (Γ-Γ) 2ΔΓ , where ΔΓ is the effective time interval for the m delay, then the AS will reject the login request for ί/. Step 3. Calculate: B-= hilDiWx)^ (4) C-= wise) (5) and compare < is the same as the received c丨. If the two are equal, the server AS will accept the login request; otherwise, the AS will reject the login request. In order for % to believe the legitimacy of the AS identity, the AS will calculate: Dt = ||rlie;) (6) ( 2 2 ) where r' is the time stamp of the time. Then the AS sends back {Α,Γ"} to the user. After the user receives {Α,Π, the following steps are performed to check the legality of the AS: Step 1. Γ" is the timestamp of the received message, check A ^ (Tm-T")>AT » If If it is delayed, it will stop talking. Step 2. Calculate D*. = ^;lir||Q) (7) Then check if the same is received (2 3 ). If this condition is true, % will believe that AS is a legitimate authentication server, and 12 200901721 and continue the next communication. From the above, the AS and the user can prove the legality of the other party's identity, so that the purpose of the two-way authentication can be achieved. Next, μ and the user can calculate the communication key using the parameters r5, and c, I, which are known to both parties: (8) K = h{r\\Bi\\ci)

(2 4 )、( 2 5 )往後的通訊訊息皆可用此金鑰加密 以達到秘密通訊的目的。該通訊包括視訊、訊息、聲音 文字傳輸或檔案傳輪。 參與會議時,Λ會議室中與會者會形成—群組,並且 使用HLM-scheme會議金餘機制進行金输之協議,並用於 資料傳輸加密之上。 當群組中之與會者要作兩人秘密對話時將會進行 HLM-W金鎗交換機制,來做金鑰協冑,作為資料傳 輸加密。 使用Java Card可增加登入驗證身分的安全性, CM具有的運算能力、安全性、可攜性及便利性。 親和性之-種表現為,本發明可以允許使用者自由地 決定並更改其通行碼’故可達到使用者親切性的目標。如 果一個合法的使用者想更改他的通行碼—,他可以將智 慧卡插到讀卡機中,廿Βχ ^θ 並且輸入他的售通行碼和新的通 仃碼W。适張智慧卡會執行登入和鑑別階段來鑑別舊通 行碼-,。如果,的鐵別被證明是正確的,那麼智慧卡將 會取代4為(其中⑽W)⑽(㈣。在這之後,使用 13 200901721 者%可以使用新的通行{每户町登入系统。 參閱第三圖所示,包含有一註冊/登入/會議管理之網 路伺服器(Web Server) (3〇)、一成員 1 (31)、一成 員 2 (32)、一成員 3 (33)、一成員 4 (34)、一 成員5 (35)、一新成員(36),其中新成員(36) 藉由網際網路(Internet)向網路伺服器(Web server) ( 3 0 )註冊(3 6 1 ) ’而成員1 ( 3 1 )登入認證即利用伺 服器對使用者之會議金鑰(U2SKAS) ( 3 1 1 )認證,該 成員3 (33)、成員4 (34)、成員5 (35)為一群 組(37),該成員3 (33)建立會議室(33)則群 組(3 7 )對使用者登入認證即為群組對使用者之會議金 鑰(U2GKAS)認證,而成員4 ( 3 4 )與成員5 ( 3 5 ) 進行悄悄話(3 8 ),則利用使用者對使用者之會議金鑰 (U2UKAS)認證。群體金鑰協議,本發明先提出利用ecc 與具自我驗證等相關機制提出一個適用於低資源行動裝置 之遠端身分鑑別與群體金鑰交換機制,本機制將適用於動 態(dynamic)群體系統中,容許使用者動態的加入或離開 ,因此可以很容易地實作到「電子視訊會議系統」中。本 發明所提出的方法具有以下特點: (a) 可同時達成身分鑑別、金鑰交換與金鑰確認的功能; (b) 使用自我驗證機制,在進行金鑰交換的同時即可完成 身分鑑別的目的’無需再執行公鑰查證的程序; (c) 可以建立具鑑別的多個體交談金鑰; (d) 可達到交換協定的安全目標:内隱的金鑰驗證( 14 200901721 implicit key authentication.)與外顯的金餘驗證( explicit key authentication),即參與協定的通訊個體可 彼此鑑別身分與確認交談金鑰。 (e)具已知金鑰安全(known key security)與完美前推安全 (peffeet forward secrecy)並可抵抗金錄遺失假冒攻擊 (key-compromise impersonation)及不知分享金錄攻擊. (unknown key-share)等安全需求。 本發明所提出的方法主要是植基於橢圓曲線離散對數 (Elliptive Curve discrete logarithm modulo a large composite, ECDLP)及單向雜溱函數(OI1e-way hash function, OWHF)假設之上,若上述的假設成立時,則本 發明所提的方法是安全的。 本發 段:使用 鑰協議管 (Trusted 負責建立 我驗證的 身分相關 訊產生並 用者,使 可利用所 金鑰協議 進行通訊 明所提出的群體金鑰交換協定可分 者註冊階段、群體金鑰協議階段以及動態群體金 理階段。在本方法中,存在一個可信賴的第三者 Thud Party,TTP) ’我們稱為系統中心(sa),sa 與管理系統基本參數,以及協助使用者計算具自 么鑰。在使用者註冊階段時,使用者出示自己的 資訊給SA進行註冊,SA針對使用者的身分資 發仃個具自我驗證的公輪與證明(witness)給使 用者可利用傳回的證明計算屬於自己的私鑰,並 2出的私錄來驗證公瑜的有效性;在群錄交談 P白&時’通訊雙方利用對方的公餘與自己的私錄 交換以建立-個共享的交談金鑰;❿在群體金 15 200901721 鑰協議管理階段,當有成員加入或離開時’可以容易地變 更群體金鑰,以達到會議金鑰之前推安全(forward secrecy)與後推安全(baCkward secrecy)。 (a)使用者註冊階段:使用者y.執行以下步驟向SA註冊 : 並取得身分鑑別資訊(參閱第四圖所示): 步驟^ A選定身分識別碼//),·並¢/,選取亂數匆,計 算身分鑑別資訊R : ^ (9) (4 1 )隨後,將{/A.j}傳送給SA,以提出註冊 申請(4 2 )。 步驟2 :當sA收到註冊申請後,選取亂數A 4 4,計算 R的身分鑑別資訊%與自我驗證公鑰h: . yt =Vi+(zj-h(IDi)-G (10) wi =zi{yt) + K^i)) mod q (11) (4 3 ),隨後,將.,W,.}傳送給 t/,. ( 4 4 )。 步驟3 : %收到{乃,·^.}後,執行下列步驟: 步驟 3 - 1 :計算私餘;^· X. = w. -h{kt || ID^moAq (12) 步驟 3-2 :驗證公鑰乃正確性(4 5 ): Xi -G =yt + /?(/!),.)· G + (Χ(^.) + hilD^· β) (13) (b)群體金鑰協議階段:在本發明所提出的方法中,每次 的群體金鑰協議協定都會由一個會議主持人以0來負責與 16 200901721 又炎金瑜的產生與更新。當系統的多個合法使用者欲 、 把群體交談金鑰時,先由主持人t/G進行會議啟動 、乍並决疋此會羲可以參加會議的個體並發出會議通 去(5 1 )給其他的個體(參閱第五圖所示)。詳細步驟 說如下: 步驟1 ·虽其他個體%收到的開會通知後,若想要加入 此次會議,則執行下列步驟,計算金鑰協議資訊 T i 给 Uq。 步驟1 -1 . t/,•使用亂數產器產生一隨機亂數( 5 2 ),並計算(2 4 ), ( 2 5 ) The subsequent communication messages can be encrypted with this key to achieve the purpose of secret communication. The communication includes video, message, voice text transmission or file transmission. When participating in the conference, the participants in the conference room will form a group, and use the HLM-scheme conference golden mechanism to carry out the gold transmission agreement and use it for data transmission encryption. When the participants in the group want to make a secret conversation between two people, the HLM-W Golden Bullet Switch system will be used to make the key agreement as data transmission encryption. Using Java Card can increase the security of login authentication, CM has the computing power, security, portability and convenience. The nature of the affinity is that the present invention allows the user to freely determine and change his pass code' so that the user's intimacy can be achieved. If a legitimate user wants to change his passcode—he can insert the smart card into the reader, 廿Βχ^θ and enter his sales passcode and the new passcode W. The Smart Card will perform the login and authentication phase to identify the old passcode-,. If the iron is proved to be correct, then the smart card will replace 4 (where (10) W) (10) ((4). After that, use 13 200901721% can use the new pass {every household registration system. See section As shown in the three figures, there is a web server (3) for registration/login/conference management, a member 1 (31), a member 2 (32), a member 3 (33), and a member. 4 (34), one member 5 (35), a new member (36), among which the new member (36) registers with the web server (3 0) via the Internet (3 6) (3 6 1) 'And member 1 (3 1 ) login authentication is authenticated by the server to the user's conference key (U2SKAS) (3 1 1 ), the member 3 (33), member 4 (34), member 5 (35) ) is a group (37), the member 3 (33) establishes a conference room (33), and the group (37) authenticates the user to authenticate the group to the user's conference key (U2GKAS), and Member 4 ( 3 4 ) and member 5 ( 3 5 ) whisper (3 8 ), and then use the user to authenticate the user's conference key (U2UKAS). The group key agreement, the present invention first proposes Using ecc and self-verification and other related mechanisms to propose a remote identity authentication and group key exchange mechanism for low-resource mobile devices, this mechanism will be applied to dynamic group systems, allowing users to dynamically join or leave. Therefore, it can be easily implemented in an "electronic video conferencing system." The method proposed by the present invention has the following features: (a) The functions of identity authentication, key exchange, and key confirmation can be simultaneously achieved; (b) use Self-verification mechanism, the purpose of identity authentication can be completed at the same time as the key exchange is performed. 'The procedure of public key verification is no longer needed; (c) Multiple body conversation keys with identification can be established; (d) The exchange agreement can be reached. Security objectives: implicit key authentication (14 200901721 implicit key authentication.) and explicit explicit key authentication, that is, the communicating individuals participating in the agreement can identify each other and confirm the conversation key. Known known key security and perfect forward security (peffeet forward secrecy) and can resist the loss of counterfeit attacks (key- Compromise impersonation and other security requirements. The proposed method is mainly based on Elliptive Curve discrete logarithm modulo a large composite (ECDLP) and one-way miscellaneous On the assumption of the OI1e-way hash function (OWHF), if the above assumption is true, the method of the present invention is safe. This issue: The use of the key agreement management (Trusted is responsible for establishing the identity of the identity-related information generated by the user, so that the use of the key agreement for communication, the group key exchange agreement can be divided into the registration phase, the group key agreement Phase and dynamic group gold phase. In this method, there is a trusted third party, Thud Party, TTP) 'We call system center (sa), sa and management system basic parameters, and assist users to calculate Key. During the user registration phase, the user presents his or her own information to the SA for registration. The SA sends a self-verified public ship and proof to the user's identity to calculate the belongs to the user. My own private key, and 2 private records to verify the validity of the public yoga; in the group chat P white & 'communication parties use the other party's public and their private record exchange to establish a shared conversation gold Key; in the group gold 15 200901721 key agreement management phase, when a member joins or leaves 'can easily change the group key to reach the conference key before the security (forward secrecy) and push security (baCkward secrecy). (a) User registration phase: User y. Perform the following steps to register with the SA: and obtain identity identification information (see the fourth figure): Step ^ A Select the identity ID ///), and select /, select In a random number, calculate the identity identification information R: ^ (9) (4 1 ) Subsequently, {/Aj} is transmitted to the SA to apply for registration (4 2 ). Step 2: When sA receives the registration application, select the random number A 4 4, calculate the identity identification information % of R and the self-verification public key h: . yt =Vi+(zj-h(IDi)-G (10) wi = Zi{yt) + K^i)) mod q (11) (4 3 ), then, transfer ., W,.} to t/,. ( 4 4 ). Step 3: After receiving {乃,·^.}, perform the following steps: Step 3 - 1 : Calculate the private; ^· X. = w. -h{kt || ID^moAq (12) Step 3 2: Verify that the public key is correct (4 5 ): Xi -G =yt + /?(/!),.)· G + (Χ(^.) + hilD^· β) (13) (b) Group Key agreement phase: In the method proposed by the present invention, each group key agreement agreement will be responsible for the generation and update of 16 200901721 and Yan Jinyu by a conference host. When multiple legitimate users of the system want to talk to the group, the host t/G will start the meeting, and then the individual who can participate in the meeting will be sent to the meeting (5 1 ) to other Individual (see the fifth figure). The detailed steps are as follows: Step 1 • After receiving the meeting notification from other individuals, if you want to join the meeting, perform the following steps to calculate the key agreement information T i to Uq. Step 1 -1 . t / , • Use a random number generator to generate a random random number ( 5 2 ) and calculate

Ti=ti,G (14) 步驟2-2 :將⑽,知7;·}傳送至% ( 5 3 ) 步驟2 ·當收到{;/);,兄,7;.}時’可以計算部份群體交談金 錄資訊他並透過《尺。.驗證個體^,的身分: 步驟2-1 :使用亂數產器產生一隨機亂數~ ,並計 算 TQ=t0'° (15) 步驟2-2.計算自己與其他通訊個體",的部份群體交 談金鑰資訊5尺〇,: SK〇i=T0 •yi+Ti-y〇 =(^+i〇)-G + (i;.+x〇).(7 (16) 步驟2-3 :由和*5尺〇,驗證f/,.身分的合法性: SKQilt0 -{(X(y0) + h(ID0)) + {X{yi) + h{IDi))-p) + xQ-Ti (17) (5 4 ) ’若上式成立’則表示可正確地驗證% 17 200901721 步驟 的合法性 .當收到全部 鑰協議(5 的Udj.,η}後’即可持續進行 群體金 步驟 步驟: :由部份 群體金鑰資訊來產生此次會議的群 體金鑰GiC : ㊉狄。2㊉煎㈣v驟3-2 .分別為計算群體金鑰資訊^ d[㊉ 5¾ 步驟3’3 :計算金鑰驗證值h以供其他通訊個體進 行群體金鑰的驗證(5 6 ): a=/z(g/:||/z)〇) (2〇)v驟3 4 .傳送{/£)。,外,7^,_^+,2}給其他通訊個體%(5 7 )。 (18) (19) 步驟4 :當R收到{/A),外,時,執行下列步驗以產生 群體金鑰G尺並驗證G尺的正確性。 步驟4-1 :計算部份群體交談金鑰資訊$尤。 ^/0 =Ti+y〇+Ti+ y, =(xo+ti)-G + (t0 +xi)-G (21) 步驟4-2 :由UD〇,_y〇,r〇}和5Ά〇驗證身分的合法性·· 5^.{(你0) + 柳0))+ (22) (X(yi) + KIDi))-^) + xiT0 (5 8 )’若上式成立’則表示可正確地驗證ί/,· 的合法性。 步驟4-3:計算群體金鑰: GK^K^SK^ (23) 200901721 步驟4-4 :驗證GK;.的正確性: XIKGK.WID,) (24) (5 9 ),若上式成立,則表示與握有相同 的交談金鍮。 ; (c)動態群體金鑰協議管理一新增:若有新的合法使用者 t/;.欲向會議主持人( 6 0 )加入本次的會議時,執行 下列步驟即可完成群體會議金鑰的更新(參閱第六圖所示 ),並可達到前推安全(forward secrecy): 步驟 1 :使用者%使用亂數產器產生一隨機亂數eZg ( 6 1 ),並計算Ti=ti, G (14) Step 2-2: Transfer (10), know 7;·} to % ( 5 3 ) Step 2 · When {;/);, brother, 7;.} is received, 'can be calculated Some of the groups talked to him about the information. To verify the identity of the individual ^, Step 2-1: Use a random number generator to generate a random random number ~ and calculate TQ=t0'° (15) Step 2-2. Calculate yourself and other communication entities " Some group chat key information 5 feet 〇,: SK〇i=T0 • yi+Ti-y〇=(^+i〇)-G + (i;.+x〇).(7 (16) Step 2 -3 : Verify the legality of f/,. by identity and *5 feet :: SKQilt0 -{(X(y0) + h(ID0)) + {X{yi) + h{IDi))-p) + xQ-Ti (17) (5 4 ) 'If the above formula is true', it means that the validity of the % 17 200901721 step can be correctly verified. After receiving all the key protocols (Udj., η} of 5) Group gold steps: : The group key GiC of the meeting is generated by partial group key information: Ten Di. 2 十煎 (4) v 3-2. Calculated group key information ^ d[10 53⁄4 Step 3' 3: Calculate the key verification value h for other communication individuals to verify the group key (5 6 ): a=/z(g/:||/z)〇) (2〇)v 3 3 .Transfer { /£). , outside, 7^, _^+, 2} to other communication individuals% (5 7). (18) (19) Step 4: When R receives {/A), the following steps are performed to generate the group key G ruler and verify the correctness of the G ruler. Step 4-1: Calculate the partial group chat key information $ especially. ^/0 = Ti+y〇+Ti+ y, =(xo+ti)-G + (t0 +xi)-G (21) Step 4-2: Validated by UD〇, _y〇, r〇} and 5Ά〇 Legitimacy of identity····························································· Properly verify the legality of ί/,·. Step 4-3: Calculate the group key: GK^K^SK^ (23) 200901721 Step 4-4: Verify the correctness of GK;.: XIKGK.WID,) (24) (5 9 ), if the above formula is established , which means the same conversation with the holder. (c) Dynamic Group Key Agreement Management: If there is a new legitimate user t/;. To join the meeting host (60), join the meeting to complete the group meeting. Key update (see Figure 6), and forward security (step secrecy): Step 1: User % uses random number generator to generate a random random number eZg ( 6 1 ), and calculate

Tj=tj-G (25) 步驟2 : %將{/^.,心:?}}傳送至( 6 2 )。 步驟3 :當t/〇收到{//^,巧,7}}後,執行下列步驟驗證的身分 ,並計算新的群體金鑰GiT : _ 步驟3 -1 :計算與%的部份群體交談金鑰資訊 ^〇 j ~^〇' yj+^j = (Xy + ) · G + (t j + Xq ) · G (26) 步驟3_2 :由{/Z)y,;;y·,:^.}和51尺〇y驗證t/;身分的合法性: SK0J?t0-{(X(y0) + h(ID0)) + (X(yj) + h(IDJ))^) + x0-TJ (27) (6 3 ),若上式成立,則表示可正確地驗證% 的合法性。 步驟3-3 :使用亂數產器產生一隨機亂數砵,並 19 (28)200901721 計算新的群體金鑰Gjr : GK’ = GK ® SKQj ® nk' 步驟3 -4 :分別為計算新的群體金鑰資訊κ : (29) K\ =GKr@SK0i 步驟3-5:計算新的群體金鑰之驗證值i,以供其他 通訊個體進行群體金鑰的驗證(6 4 ): r = h(GK'\\ID0) (30) 步驟3-4 :傳送 (6 5 1 )給其他通訊個體(/, ( 6 5 )。 步驟4:新加入的使用者執行與群體金鑰協議階段之步驟 4( 6 6 )即可計算出群體金鑰並驗證群體金鑰 的正確性(6 5 2 )。既有的使用者執行下列步 驟即可計算出新的群體金鑰(6 7 ): (31)Tj=tj-G (25) Step 2: % transfers {/^., heart:?}} to (6 2 ). Step 3: When t/〇 receives {//^, Qiao, 7}}, perform the following steps to verify the identity and calculate the new group key GiT: _ Step 3 -1 : Calculate the partial group with % Conversation key information ^〇j ~^〇' yj+^j = (Xy + ) · G + (tj + Xq ) · G (26) Step 3_2: by {/Z)y,;;y·,:^. } and 51 feet 〇 y verify t /; legality of identity: SK0J?t0-{(X(y0) + h(ID0)) + (X(yj) + h(IDJ))^) + x0-TJ ( 27) (6 3 ), if the above formula is true, it means that the legality of % can be correctly verified. Step 3-3: Use a random number generator to generate a random random number 并, and 19 (28) 200901721 Calculate the new group key Gjr: GK' = GK ® SKQj ® nk' Step 3 -4: Calculate the new one separately Group Key Information κ : (29) K\ =GKr@SK0i Step 3-5: Calculate the verification value i of the new group key for other communication individuals to verify the group key (6 4 ): r = h (GK'\\ID0) (30) Step 3-4: Transfer (6 5 1 ) to other communicating individuals (/, ( 6 5 ). Step 4: Steps for the newly added user to perform the group key agreement phase 4 ( 6 6 ) to calculate the group key and verify the correctness of the group key (6 5 2 ). Existing users can calculate the new group key by performing the following steps (6 7 ): (31 )

GK>K\®SKiQ (d)動態群體金鍮協議管理—成員離開:若有參與會議 的使用者ί// ( 7 0 )離開會議,執行下列步驟即可完成 群體會議金鑰的更新(參閱第七圖所示),並可達到後推 安全(backward secrecy): 步驟1.會議主持人t/〇 (7 1 )使用亂數產器產生一隨機 亂數為e Z〆並計算新的群體金錄沉": GKn = GKf®SKQl®nk2 步驟2 ·分別為¢/,計算新的群體金鑰資訊尺 K,;=GK”®SKQi (33) 20 200901721 步驟3 :計算新的群體金鑰之驗證值A〃,以供其他通訊個 體進行群體金鑰的驗證(72): λη = h(GK" IIID0) (3 4) 步驟4 :傳送{/DQ,(〃,;r}給其他通訊個體r ( 7 3 )。 '步驟5 :行下列步驟即可計算出新的群體金鑰(7 4 ) • ♦ GK【=K:®SKiQ (3 5) 本發明可以達到高度的安全性(Good Security),由於 本系統結合兩套金鑰協議機制,因此可以達到多重的資訊 保護。以下列出本系統中,可達成之安全特性及功能。 (a)本系統結合Java Card Security以及Password雙重登入 鑑別機制,使用者在使用本系統前,須向 CA ( Certificate Authority)註冊,使用者決定 password 密 碼後,CA運算出未來在登入系統時需用到之秘密資訊 ,將其寫入Java Card中,並將Java Card發給使用者 〇 當使用者登入本系統時,必須於讀卡機中插入註冊時 所得到之Java Card,以及輸入ID及Password以達到 雙重鑑別,系統利用由Java Card中讀取到之秘密資訊 ,以及前面所得到之資料做運算,並把運算結果與 Server交換,以鑑別使用者之合法身分,最後再和 Server共同算出一把Session Key,以作為將來交換秘 密訊息之用。 21 200901721 (b)針對金鑰交換機制而言,本系統可達成三個不同層級 之金餘協議機制。即是使用者可與系統中三種不同參與 角色:Server (U2S: User t〇 Server)、使用者群組( U2G · User to Group )以及個別使用者(U2U : User to User )做金鑰的協議。 使用者在登入時’利用HLM-scheme會議金鑰機制 ,與Server共同算出一把會議金鑰(U2s)作為將來秘密 貝訊傳遞之用。當會議進行時,所有參與會議的使用者 由會議主席發起群體金鑰協議機制建立一把群體金鑰( U2G ),以達成安全視訊會議目的;除此之外,參與會 s義的使用者彼此之間若要再秘密傳送訊息(悄悄話功能) ,亦可使用群體金鑰交換機制(2_user)建立一把交談金 鑰(U2U)。 此三種金鑰協議機制所算出之金鑰皆是不相同的,因 此使用者便可與不同層級之角色作秘密資訊之交換,而 不會被其他層級使用者得之秘密資訊内容。 U)針對使用者觀點而言,由於本系統可達成上點所述之 三個不同層級金鑰協議機制,而可對三種不同層級之使 用者作秘密資訊之交換,而不會被不同層級之使用者得 知,便達成了仍S、U2G與U2U之資料與影音的機密 性。 (d)本系統可讓使用者驗證會議及交談金錄的真實性。使 用者在使用金鑰作秘密資訊交換時,可與使用者相互驗 證此會議金鑰之真實性,而不會出現使用攻擊者所傳送 22 200901721 過來之爲造金鑰作資訊的加密,讓攻擊者攔截後,用偽 造的金鑰解開而使秘密資訊洩漏之情況。 (e) 本系統之加密機制可達到即使其中一把會議金鑰遭到 破解攻擊者也無法經由此把金鑰計算出先前所舉行過 之會議所使用的會議金鑰内容,故可確保每次會議秘密 資訊的機密性。 (f) 虽使用者進入會議進行金鑰協議後’使用者將只能得 知自身有權限參與的會議之通訊内容,而無法取得不同 會議之會議資訊。相對的,此會議内進行的資訊交換也 不會讓會議參與者以外的人得知。 本系統可提供高度的使用者親和性(G〇〇dGK>K\®SKiQ (d) Dynamic Groups Agreement Management - Member Leave: If a user participating in the meeting ί// ( 7 0 ) leaves the meeting, perform the following steps to complete the group meeting key update (see Figure 7), and can achieve backward secrecy: Step 1. Conference host t/〇 (7 1 ) uses a chaotic generator to generate a random chaotic number e Z〆 and calculate a new group金录沈": GKn = GKf®SKQl®nk2 Step 2 · Calculate the new group key information K for ¢/, respectively;;=GK”®SKQi (33) 20 200901721 Step 3: Calculate the new group gold The key verification value A〃, for other communication individuals to verify the group key (72): λη = h(GK" IIID0) (3 4) Step 4: Transfer {/DQ, (〃,;r} to other Communication individual r ( 7 3 ). 'Step 5: Calculate the new group key by following the steps below (7 4 ) • ♦ GK [=K:®SKiQ (3 5) The invention can achieve a high degree of security ( Good Security), because the system combines two sets of key agreement mechanisms, it can achieve multiple information protection. The following lists the security that can be achieved in this system. (a) This system combines Java Card Security and Password dual login authentication mechanism. Users must register with CA (Certificate Authority) before using this system. After the user decides the password, CA will calculate the future login. The system needs to use the secret information, write it into the Java Card, and send the Java Card to the user. When the user logs in to the system, the Java Card obtained at the time of registration must be inserted into the card reader, and Enter the ID and password to achieve double authentication. The system uses the secret information read by the Java Card and the data obtained in the previous operation, and exchanges the operation result with the Server to identify the legal identity of the user. Server jointly calculates a Session Key for future exchange of secret messages. 21 200901721 (b) For the key exchange system, the system can achieve three different levels of the gold balance protocol mechanism. Three different participating roles in the system: Server (U2S: User t〇Server), User Group (U2G · User to Group), and individual The user (U2U: User to User) is the key agreement. When the user logs in, he uses the HLM-scheme conference key mechanism to calculate a conference key (U2s) together with the server for future secret broadcast. . When the conference is held, all the users participating in the conference are initiated by the conference chairperson to establish a group key (U2G) to achieve the purpose of the security video conference; in addition, the users participating in the conference will each other To secretly transmit messages (whispering), you can also use the group key exchange mechanism (2_user) to create a chat key (U2U). The keys calculated by the three key agreement mechanisms are different, so the user can exchange secret information with different levels of roles without the secret information content obtained by other level users. U) From the user's point of view, since the system can achieve the three different hierarchical key agreement mechanisms described above, the secret information can be exchanged for users of three different levels without being affected by different levels. When the user knows, the confidentiality of the data and audio and video of S, U2G and U2U is achieved. (d) This system allows the user to verify the authenticity of the meeting and chat. When the user uses the key for secret information exchange, the user can mutually verify the authenticity of the conference key without using the encryption transmitted by the attacker as a key to the information transmitted by the attacker. After the interception, the fake key is used to unlock the secret information. (e) The encryption mechanism of the system can ensure that even if one of the conference keys is cracked, the key cannot be used to calculate the conference key content used by the previously held conference. The confidentiality of the secret information of the meeting. (f) Although the user enters the conference to make the key agreement, the user will only be able to know the communication content of the conference that he or she has permission to participate in, and cannot obtain the conference information of different conferences. In contrast, the exchange of information conducted during this meeting will not be known to anyone outside the meeting participants. This system provides a high degree of user affinity (G〇〇d

Friendliness),讓使用者在使用本系統時,可以感到系統 操作簡易、介面親切等特點。以下列點舉出本系統在高度 的使用者親和性(Good Friendliness)方面可達到之特性。 (a) 本系統之鑑別機制不同於一般密碼鑑別機制,使用演 算法算出長度冗長的密碼來達到安全性。在本系統中, 使用者可自訂易於記憶之密碼(Password ),但同時也 具有與一般密碼機制相同等級的安全性等級。 (b) 本系統所使用之鑑别機制’可讓使用者直接連上伺服 器(Server )做密瑪的更改而不用親自到註冊的CA 處更改卡上的密碼,藉以增加使用者變更密碼之便利性 〇 (C)本系統在使用的介面上’採用基礎網路(Web-Based)作 為系統之操作平台。使用者使用本系統時,不需下載任 23 200901721 何的安裝程式,只需連上網站,點選自己可參與之會議 後,便經由網頁自動下載系統而不需進行安裝的動作, 增加使用者使用此系統之方便性。 (d)本視訊會議系統可經由中央Server作使用者間訊息的 • 轉送與傳遞,而視訊影像則採用使用者間點對點的傳送 : ,這兩種功能皆可使本視訊系統具備立即的訊息傳遞能 力。 〇)本系統具有動態管理會議之功能,當會議的主席進入 會議至後’此會議便被開啟’同時在參與此會議使用者 的網頁上狀態將會顯示為可進入,主席也可決定會議結 束時機’當主席結束此會議的同時會議便被永遠關閉’ 以達到主席具有控制會議開啟與關閉之權限。 (f)本系統可提供使用者自由選擇是否儲存會議内容之功 月°當使用者選擇儲存會議内容時,系統便會將對話紀 錄儲存於使用者自訂之資料夾與檔案中,以作為保存及 會議紀錄之用。 參閱第一圖與第二圖所示,使用上使用者至服務中心 申叫8主冊會員,輸入、Password及其他相關資料,管 理者便可讓其註冊新會員,並核發具有秘密資訊 J αν aFriendliness) allows users to feel the system is easy to operate and the interface is friendly when using the system. The characteristics of the system in terms of high user Friendliness are exemplified by the following points. (a) The authentication mechanism of this system is different from the general password authentication mechanism, and the algorithm is used to calculate the lengthy password to achieve security. In this system, the user can customize the password that is easy to remember, but also has the same level of security as the general password mechanism. (b) The authentication mechanism used by the system allows the user to directly connect to the server (Server) to make changes to the MME without changing the password on the card at the registered CA to increase the user's password change. Convenience C (C) The system uses the Web-Based as the operating platform of the system. When users use this system, they do not need to download any installation program of 2009 200901721. Just connect to the website and click on the meeting that they can participate in. After downloading the system automatically, the system does not need to be installed. The convenience of using this system. (d) The videoconferencing system can be used for the transfer and transmission of messages between users via the central server, while the video images are transmitted peer-to-peer between users: both of these functions enable the video system to have immediate messaging. ability. 〇) The system has the function of dynamically managing conferences. When the chairman of the conference enters the conference, the conference is opened. At the same time, the status of the users participating in the conference will be displayed as accessible, and the chairman may decide to end the conference. Timing 'When the chairman ends this meeting, the meeting is closed forever' to achieve the chairman's authority to control the opening and closing of the meeting. (f) The system can provide users with the freedom to choose whether to save the content of the meeting. When the user chooses to save the meeting content, the system will save the dialogue record in the user-defined folder and file as a save. And the minutes of the meeting. Referring to the first figure and the second figure, using the user to the service center to apply for the 8 main book members, input, password and other related information, the manager can let them register the new member and issue the secret information J αν a

Card ;若註冊會員有不當行為,管理者亦可註銷該會員之 Java Card 。 使用者插入java card並輸入ID及Password即可輿 Server進行雙向的身分鑑別,並產生本次會議的秘密金輪 24 200901721 登入後,使用者可 分為已開啟及未開啟 &自己有權參與之會議室’可 η μ ^ ^ 開啟之會議室必須等待主席執杆 開啟會議功能。已開啟 沛執仃 |礒室,可直接點選進入會 (參閱第二圖之參與會 喊至 找永構圖)。 參閱第三圖所示,悄 會議中的與會者(成員5 H能金輪 行私下交談。 可與另一與會者(成員4 )進 會議中的與會者亦可進擇 對象,點選(執行·傳送視 h者選擇傳送 )選擇欲傳送檔案。 接收者選擇是否同意接收情案。 〃 執行-傳送視訊:會議中的與會者亦可 。發送者選擇料對象 則專送 選擇是否同意視訊傳送。執订-傳送視訊」;接收者 變更-字型:會議中與會者可任意變更字型。 檔案-儲存:會議進行或結束時, 儲存4 ^ ,、會者可任意選擇 存會4紀錄與否,選擇儲存目的, 擇 槽錯存於指定的位置。 “紀錄將以純文字 構案-離開:與會者可點選「檔幸 ;甚+办 搔茱·離開」離開此會議 右主席選擇離開,則本次會議亦強制關閉。 主席特有功能有: ,〜六宫=¾ ,點 主席-踢除」’該與會者將強制離開合4 哪間會遢,並不得再度 選「主席·踢除:主席可選擇特定不當行為之與會者,點 ' 生席-踢除.,今方命各本收% 土I紅-- 進入 主席-關閉會議室 主席-關閉會議室:主席可點選Γ 25 200901721 ,強制關閉本次會議,所有與會者將結束與此會議連線並 不得再次進入。 主席-啟動金鑰協議:會議主席可點選「主席_啟動金 鑰協議」,開始協議本次會議的交談會議金鑰,其後的通 訊内容,包含視訊及文字都將以此會議金鑰進行加密。 新增會議.本系統之使用者皆可申請新增會議室輸 入會議名稱、會議曰期以及主席ID,即可新增會議,接 著在下一個頁面中對照使用者名稱列表,填入與會者之會 員編號,決定成員完畢後,使按右上方之超連結文字跳回 會議列表畫面。 前文係針對本發明之較佳眚· 4 & & 4ι权佳實施例為本發明之技術特徵 進行具體之說明;惟,熟悉此項技 峒扠術之人士當可在不脫離 本發明之精神與原則下對本發明隹 不贫明進仃變更與修改,而該等 變更與修改’皆應涵蓋於如下申請專 中 τ f寻利靶圍所界定之範疇 【圖式簡單說明】 第-圖:係使用者向鑑別伺服器申請註冊之示意圖。 第二圖 第三圖 第四圖 第五圖 第六圖 第七圖 係登入與鑑別階段示意圖 係安全視訊會議系統架構圖。 係群體金鑰協議系統之使用者註冊示意圖。 係群體金鑰協m系統之建立群體金鑰示意圖 係群體金鑰協議系統之成員加入示意圖。 係群體金鑰協議系統之成員離開示意圖。 主要元件符號說明 26 200901721 (1 0 )新的使用者向鑑別伺服器AS註冊,傳送他的 識別碼與以及所選擇的通行碼 (1 1 )當鑑別伺服器AS收到從使用者傳來的{码 時’鑑別飼服器AS會計算為Ai = h{IDi II x)0h{PWt) (1 2 )鑑別伺服器AS儲存{取,為,至智慧卡 (1 3)核發一張包含資訊{仍,,為,从切,句的智慧卡給使用 者C/, 2 0 )當已經註冊過的使用者π想要登入系統,以獲得 存取權限時,他會插入他的智慧卡到讀卡機裡,並且輸 入他的身分碼沿與通行碼 (21)的智慧卡將會使用已儲存的4以及使用者所輸 入的通行碼懷;來計算β;和c, : β;=(4㊉; 罄)其巾τ是讀卡機當時的日期和時間。然後智 ‘ ' :會傳送登入訊息w c, Γ}給鑑別伺服器as (2 2 )鑑別伺服器AS核對屯確認(r ^ ^KlDjWx)^ 計算 ||Γ"||ς*) 確(T -T)kAT 計算 riiς) 2 4 )鐘別词服器as 计异交談金錄 計算交談金鑰 〇 )網路伺服器(Web Server) ( 3 1 )成員1 伺服器對使用者之會議金鑰(U2SKAS) (33)成員3 (34)成員4 (36)新成員 (361)註冊 25)使用者K —時I丨咖 3 3 2 3 5 成員 成員 27 200901721 (3 7 )群組 (3 8 )悄悄話Card; if the registered member has misconduct, the manager can also cancel the member's Java Card. After the user inserts the java card and enters the ID and password, the server can perform two-way identity authentication and generate the secret golden wheel of the conference. 24 200901721 After logging in, the user can be divided into opened and not opened & Meeting rooms that can be opened by η μ ^ ^ must wait for the chairman to open the meeting function. Opened Pei Pei | Room, you can click directly to enter the meeting (see the second picture of the participation will call to find permanent composition). Referring to the third figure, the participants in the private meeting (members 5 H can talk privately. The participants who can enter the meeting with another participant (member 4) can also choose the target, click (execute· Select to transfer the file. Select whether you want to transfer the file. The recipient chooses whether or not to agree to receive the case. 〃 Execute-transfer video: The participant in the conference can also. The sender selects the material object and chooses whether to agree to the video transmission. Subscriber-Transfer Video"; Receiver Change-Font Type: Participants can change the font type at any time during the conference. File-storage: When the conference is finished or finished, save 4^, and the participant can choose to save 4 records or not. Select the storage purpose, and select the slot to be in the specified location. "The record will be in plain text - leave: Participants can click "Fast fortunate; very + do not leave" to leave the meeting. The right chairman chooses to leave, then this The meeting is also forcibly closed. The special functions of the chairman are: , ~6th house = 3⁄4, point chairman - kicked out" 'The participant will be forced to leave the 4th meeting, and no longer choose "President · Kick: Chairman Choose special Participants in misconduct, point 'birth-kick-off., today's life-receiving%% soil I red-- enter the chairman-close the meeting room chairman-close the meeting room: the chairman can click Γ 25 200901721, forcibly close this At the second meeting, all participants will end the connection with this meeting and may not re-enter. Chairman-Starting Key Agreement: The chairman of the meeting can click on “Chairman_Start Key Agreement” to start the agreement meeting key of this meeting. Subsequent communication content, including video and text, will be encrypted with this conference key. New conferences. Users of this system can apply for new conference room to enter the conference name, conference deadline and chairman ID. Add a meeting, then fill in the participant's member number in the next page against the user name list, and after the member is determined, jump to the upper right hyperlink text to jump back to the meeting list screen. The foregoing is a better example of the present invention. 4 && 4 ι 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳 佳In principle, the invention is not limited to the changes and modifications, and the changes and modifications should be included in the scope of the following application τ f search target [simplified description] Schematic diagram of the user applying for registration to the authentication server. The second figure, the third figure, the fourth figure, the fifth figure, the sixth figure, the seventh picture, the login and authentication stage, the schematic diagram of the security video conferencing system, and the group key agreement system. Schematic diagram of user registration. The establishment of the group key system is a schematic diagram of the members of the group key agreement system. The diagram of the members leaving the group key agreement system. The main component symbol description 26 200901721 (1 0 ) The new user registers with the authentication server AS, transmits his identification code and the selected pass code (1 1 ). When the authentication server AS receives the {code from the user, the authentication feeder AS will Calculated as Ai = h{IDi II x)0h{PWt) (1 2 ) The authentication server AS stores {take, for, to the smart card (1 3) to issue a piece of information {still,, for, from cut, sentence Smart card to the user C/, 2 0) When the registered user π wants to log in to the system to gain access, he inserts his smart card into the card reader and enters his identity code along with the pass code ( 21) The smart card will use the stored 4 and the pass code entered by the user; to calculate β; and c, : β; = (4 ten; 罄) its towel τ is the date and time of the card reader at that time. . Then wise ' ': will send the login message wc, Γ} to the authentication server as (2 2) authentication server AS check 屯 confirmation (r ^ ^ KlDjWx) ^ calculation | | Γ " | | ς *) indeed (T - T) kAT calculation riiς) 2 4) 别 词 as as 计 交谈 交谈 交谈 交谈 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 网路 网路 网路 网路 成员 成员 成员U2SKAS) (33) member 3 (34) member 4 (36) new member (361) registration 25) user K - hour I 丨 3 3 2 3 5 member member 27 200901721 (3 7 ) group (3 8 ) Whisper

(4 1 )使用者c/,.選定身分識別碼/£),.並ί/;·選取亂數 匀e 4 計算巧=丨丨與).G (4 2 )將{/AA}傳送給SA,以提出註冊申請 (4 3 )系統中心sA收到註冊申請後,選取亂數^ ’計算的身分鑑別 資訊w,·與自我驗證公鑰少(.:乃= 0+(Ί(//)(.)·α wt =zi+y-(X {yt) + h(IDi)) mod q (4 4 )將{y,.,·^.}傳送給 ¢/,. (45)使用者%計算私鍮'.=>^-/«||/0,.)111〇£1《驗證公錄乃 正確性:核對 xrG = yt + KIDi) · G + (X(^.) + /2(/1).) · β)(4 1) User c/,.Select the ID/£),. and ί/;·Select random number e 4 Calculate 巧=丨丨 and ).G (4 2 ) Transfer {/AA} to SA, after submitting the registration application (4 3), after receiving the registration application, the system center sA selects the random number ^ 'calculated identity identification information w, and the self-verification public key is less (.: is = 0 + (Ί (/ / )(.)·α wt =zi+y-(X {yt) + h(IDi)) mod q (4 4 ) Transfer {y,.,·^.} to ¢/,. (45) user % Calculated private '.=>^-/«||/0,.)111〇£1 "Verification of the correctness: check xrG = yt + KIDi) · G + (X(^.) + / 2(/1).) · β)

(5 1 )會議主持人t/〇發開會通知 (5 2 )會議成員%選取亂數ί;. eZg 計算7;. =irG (5 3 )將{/A,兄,7;.}傳送至 t/〇(5 1) The meeting host t/issued the meeting notice (5 2) the meeting member % selects the random number ί;. eZg calculates 7;. =irG (5 3 ) transmits {/A, brother, 7;.} to t/〇

(54)會議主持人t/〇選取亂數eZ9計算=ί〇 .G §t SK〇j —Tq 'yi'>rTi ·= (x;. + i0)·G + (ί(· + x0)·G 核對%3。.{(义(九)+ /»(/£>。))+(义(兄.)+ /<//)<.))4) + 々.7;· (5 5 )會議主持人w收到全部的{/Α·,Κ,7]}後,即可持續 進行群體金鑰協議 (5 6 )會議主持人計鼻 GK = ISKq\® SfCQ2® …® & =GX ® SHCQi A = h(GK\\ID〇) (5 7 )傳送丨給其他會議成員 (5 8 )會議成員α,計算 ^,.0 = 7;+3^〇+7; + ^· =(^ + ^)-^ + (^0+^)-^ 28 200901721 核對沉,.❶ + + (5 9 )會議成員W計算<^=尺;.㊉级,.〇核對;12冲丨丨仍〇) (6 0 )會議主持人"〇 (6 1 )新成員選取亂數iy eZg計算7} =iy+.G (62)將{仍_/,7;,7}}傳送至卩〇 (6 3 )會議主持人W計算沉。 核對 S‘l。·{(尤(凡)+ />(仍。)) + (尤〇V) + *(/£>,))·灼 + χ。.7; (6 4 )會議主持人V。計算= GiC㊉㊉吨 K\ = GK' 0 SKQi λ' = h{GK' II /D〇 )(54) Conference host t/〇 select random number eZ9 calculation = ί〇.G §t SK〇j —Tq 'yi'>rTi ·= (x;. + i0)·G + (ί(· + x0 )·G Check %3..{(义(九)+ /»(/£>.))+(义(兄.)+ /<//)<.))4) + 々.7 ;· (5 5 ) After the meeting host receives all the {/Α·,Κ,7]}, the sustainable group key agreement (5 6 ) is hosted by the host. GK = ISKq\® SfCQ2® ...® & =GX ® SHCQi A = h(GK\\ID〇) (5 7 ) Transfer to other conference members (5 8 ) Conference member α, calculate ^,.0 = 7; +3^〇+7 ; + ^· =(^ + ^)-^ + (^0+^)-^ 28 200901721 Checking Shen,.❶ + + (5 9 )Meeting members W Calculate <^=foot;.10,.〇 Check; 12 is still 〇) (6 0) Conference host " 〇 (6 1) new members choose random number iy eZg calculation 7} = iy+.G (62) will { still _ /, 7;, 7 }} Transfer to 卩〇 (6 3 ) Conference host W calculates Shen. Check S'l. · {(尤(凡)+ />(还.)) + (尤〇V) + *(/£>,))·灼+χ. .7; (6 4) Conference host V. Calculation = GiC ten tons K\ = GK' 0 SKQi λ' = h{GK' II /D〇 )

(65) 傳送{仍〇,凡,%,/^,;1/}給^,並傳送{仍(),尺;,;1,}給其他 通訊個體A (6 5 1 )傳送{/A),r ,乂,} (6 5 2 )原有的會議成員R計算说,=尺·,.㊉%。核對 X'^iGKr || ID0) (66) 新成員 h 計算 %。=5+:^+7)+1. = 0^+6.).6 + (6+5.).(5 計算G&.=尺;㊉·S&。核對;1,(沉;丨丨仍❶) (6 7 )新成員ι〇計算<^〇=尤;㊉π;0核對;1》(沉)丨丨仍0) (7 0 )離開成員U/ (7 1 )會議主持人t/〇 (7 2 )會議主持人t/〇選取亂數吨計算 GK^GK^SK^Bn!^ fC;=GKn®SKQi /Τ = /z(G7T II /D〇) (7 3 )傳送UA>,CU,}給其他會議成員仏· (7 4 )其他會議成員⑺計算㊉%G核對 X'lhiGKlWIDo) 29(65) Transfer {still 〇,凡,%,/^,;1/} to ^, and transmit {still(), 尺;,;1,} to other communication individuals A (6 5 1 ) to transmit {/A ), r , 乂, } (6 5 2 ) The original conference member R calculates, = 尺·, .10%. Check X'^iGKr || ID0) (66) New member h Calculate %. =5+:^+7)+1. = 0^+6.).6 + (6+5.).(5 Calculate G&.=foot;ten·S✓1,(Shen;丨丨 still ❶) (6 7 ) new member ι〇 calculation < ^ 〇 = especially; ten π; 0 check; 1 "(sink) 丨丨 still 0) (7 0) leave member U / (7 1) meeting host t/〇(7 2 ) Conference host t/〇 select random number of tons to calculate GK^GK^SK^Bn!^ fC;=GKn®SKQi /Τ = /z(G7T II /D〇) (7 3 )Transfer UA>, CU,} to other conference members仏 (7 4) Other conference members (7) Calculate ten% G checkup X'lhiGKlWIDo) 29

Claims (1)

200901721 十、申請專利範圍: 1 ·—種安全視訊會議系統,係具有高安全及高親和 性之安全視訊會議系統,包含有: 一雙重登入鑑別機制,該雙重登入鑑別機制包括爪哇 卡(Java Card)安全機制及密碼安全機制,當使用者登入本 系統時,必須於讀卡機中插入註冊時所得到之Java Card ’及輸入使用者編號(ID)與密碼(Passw〇rd),系統利用由 Java Card中讀取到之秘密資訊’及使用者輸入之資料做 運算’並把運算結果與伺服器(Server)交換,以鑑別使用 者之合法身分,最後再和Server共同算出一把會議金鑰 (Session Key) ’以作為會議之交換秘密訊息用,使用者插 入Java Card並輸入id與Password即可與Server進行雙 向的身分鑑別’並產生本次會議的秘密金錄; 一層級式金鑰交換機制,其包含有三個不同層級之金 錄協議機制’即伺服器(U2S:User to Server)、使用者群組 (U2G:User to Group)及個別使用者(U2U:User t〇 User)做 金錄的協議,使用者在登入時,即與伺服器共同算出一 把 Session Key作為將來秘密資訊傳遞之用(U2S);當會議進 行時’使用者還可與參與此會議的使用者群組作另一 金輪 協議機制(U2G) ’或是針對群組中的單一使用者作金 嘴協 礅(U2U); 一親和性密碼機制’使用者可自訂易於記憶之密喝 但同時也具有與—般密碼機制相同等級的安全性,且其系 統所使用之鑑別機制,可讓使用者直接連上伺服器“ 途、石馬 30 200901721 的更改,而不用親自到註 处文彡文卡上的密碼,藉 以增加使用者變更密碼之便利性; 巧0 一親和性基礎網路平a, , R 口 '、統使用介面採基礎網路 (Web-Based)作為系統 …下… 之刼作+口,使用者使用本系統時 不需下载任何的安裝程式,口 飞 a需連上網路,點選自己可 ,一之會議後,便經由 兴目勁下載系統,而不需進行安 裝的動作’増加使用者使 使用此糸統之方便性,會議包括視 Α Λ心、聲音、文字傳輸或槽案傳輸。 申月專利圍第1項所述之安全視訊會議系統 ’其中該雙重登入鑑別機制其註冊之程序,係使用者在使 用本系統前,須合描 、白榷限涊證單位(CA,Certificate Authority)註冊,使用去、1 6 a 用者決疋岔碼後,CA運算出未來在登 入糸統時需用到之秘齋资印 在貝sfL ’將其寫入java Card中,並 給予使用者一使用去 者、,爲5虎(ID) ’並將java card發給使用 者。 如申m專利範圍第1項所述之安全視訊會議系統 ,其中該視訊會議备Μ π γ , 義系統可經由伺服器作使用者間訊息的轉 送與傳遞,而視訊之影像則採用使用者間點對點的傳送, 此兩者皆具備立即的訊息傳遞能力。 4 ·如申請專利範圍第1項所述之安全視訊會議系統 ’其中該視訊會議系祐pIk + 找糸統更具有動態管理會議之能力,即使 用者中其一為會議:^ . 我主席’虽會議主席進入會議室後,此會 議便被開啟,同時左I ▲ f在參與此會議使用者的網頁上狀態將會 顯不為可進入,舍4·墓+洛u 我主席也可決定會議結束時機,當會議 31 200901721 主席結束此會議的同時,會議便被永遠關閉,以達到會議 主席有控制會議開啟與關閉之權限。 5 ·如申請專利範圍第1項所述之安全視訊會議系統 ’其中s亥視訊會議系統更具有提供使用者自由選擇是否儲 存會議内各之功能’當使用者選擇儲存會議内容時,視訊 會議系統便會將對話記錄儲存於使用者自訂之資料夾與槽 案中,以作為保存及會議紀錄之用。 b ·如申請專 -仙矿碾糸統 ,其中該視訊會議系統包含可為企業視訊會議系統、遠距 教學系統、協同設計系統、虛擬社群系統或居家照護系統 〇 之安全視訊會議系統 ,使用 7 ·如申請專利範圍第1項所述 ’其中該使用者向CA註冊及登入時 方法來雙向鑑別身分及金鑰協議。 8 ·如申請專利範圍第i項所述之安全 ’其中該參與會㈣,會議室中使用者會形一群組,:且 使用HLM_seheme會議金餘機制進行金餘之 資料傳輸加密。 卫用於 9 _如申請專利範圍第8項所述之客八 ^ 所迷之女全視訊會議备纪 ’其中該群組中之使用去I你工 ’、統 時,將會進行HLM-schemn^^^ & 肖°舌功此 作金輪交換機制來做金鑰協議, 作為貝科傳輸加密。 ’ 一 1 0 .-種安全視訊會議方法,其中該群體金 協定可分為以下三個. 換 階#又·—使用者註冊階段、-群體金 32 200901721 鑰協議階段以及一動態群體金鑰協議管理階段;在本方法 中’存在一個可信賴的第三者(Trusted Third Party, TTP) ’為系統中心(SA),系統中心負責建立與管理系統基本參 數,以及協助使用者計算具自我驗證的公鑰; * 在使用者註冊階段時,使用者出示自己的身分相關資 : 訊給系統中心進行註冊,系統中心針對使用者的身分資訊 • 產生並發行一個具自我驗證的公鑰與證明(witness)給使用 者’使用者可利用傳回的證明計算屬於自己的私鑰,並可 利用所計算出的私餘來驗證公鑰的有效性; 在群输交談金鍮協議階段時,通訊雙方利用對方的八 鑰與自己的私鑰進行通訊交換,以建立一個共享 又談金 錄; 而在群體金鑰協議管理階段,當有成員加入或離開時 ,可以容易地變更群體金鑰,以達到會議金鑰之前推安全 (forward secrecy)與後推安全(backward secrecy)。 1 1 .如申請專利範圍第i 0項所述之安全視訊會議 方法’其中該使用者註冊階段為使用者%執行以 卜步驟 向系統中心註冊並取得身分鑑別資訊: 步驟1 : t/,選定身分識別碼7认並π.選取亂數t ,%, S十 算身分鑑別資訊0 : II7Z)t).G 隨後’將{//),.,g}傳送給系統中心’以提出 • …心冊甲 δ月 , 步驟2 .當系統中心收到註冊申請後,選取亂數2 l^R 5 33 200901721 §十鼻t/,的身分鑑別資訊%與自我驗證公鑰: ypR+KlDJ.G wi =2i+r. ) + h(<IDj)) mod q 隨後’將{hw,}傳送給t/,.; 步驟3 : %收到U,w,·}後,執行下列步驟: 步驟3 - 1 :計算私鑰々 χ. = w. - II ID()modq 步驟3 -2 :驗證公鑰乃正確性: ' · G =乃 +/ί(/Ζ)(.). σ + (ι(乃)+ w//).) ·^)。 1 2 ·如申請專利範圍第1 〇或1 1項所述之安全 訊會議方法,其中該群體金鑰協議階段為’每次的群體金 鑰協議協定都會由一個會議主持人%來負責與管理交談 金輪的產生與更新,當系統的多個合法使用者欲建立—2 群體交談金鑰時,先由主持人%進行會議啟動的動作, 並決定此會議可以參加會議的個體並發出會議通知給其他 的個體,詳細步驟如下: 步驟1 :當其他個體t/,'收到的開會通知後,若想要加入 此次會議’則執行下列步驟,計算金鑰協議資訊 71,.給 t/〇 ; 步驟1 -1 : t/,.使用亂數產器產生一隨機亂數& ,並 計算 Ti=ti.G 步驟2-2 :將{/Α_,π,7;.}傳送至% 步驟2 :當收到.,乃.,7;.}時,可以計算部份群體交談金 34 200901721 输貨訊iSATo,.他並透過iSATo,.驗證個體t//的身分: 步驟2-1 :使用亂數產器產生一隨機亂數& eZ9,並計 算 ’〇 = ’〇 . G 步驟2-2 :計算自己與其他通訊個體t/,的部份群體交 談金鑰資訊*: = ’〇.乃 +(·少〇 = (A. 。尤〇). G 步驟2-3 :由7}}和5Ά,驗證%身分的合法性: SK0ilt0-{(X(y0) + h(ID0)) + (Χ(γί) + ΚΙΌί))·β) + χ0·Τί 若上式成立,則表示可正確地驗證ίΛ的合法性 步驟3 :當收到全部的7;.}後,即可持續進行群體金 输協議步驟: 步驟3-1:由部份群體金鑰資訊來產生此次會議的群 體金鑰: =沉01㊉级02㊉...㊉级0;„ 步驟3 -2 :分別為計算群體金鑰資訊尤,.: K^GKmsK^ 步驟3 -3 :計算金鑰驗證值;I,以供其他通訊個體進 行群體金鑰的驗證: λ = h(GK II IDq) 步驟3-4 :傳送.,A}給其他通訊個體ί/,.; 步驟4 :當t/,.收到{ΖΟ。,外,Κ, Α}時,執行下列步驗以產生 35 200901721 群體金錄GA:並驗證GA:的正確性; 步驟4-1 :計算部份群體交談金鑰資訊 SKiQ =Tl+y0+Ti+ = (j:0 +ί.). Q + + . G 步驟4-2 :由{/Α),外,7^}和从,_〇驗證.身分的合法性: 若上式成立,則表示可正確地驗證%的合法性 * 步驟4-3 :計算群體金鑰GA:i : GK^K^SK^ 步驟4-4 :驗證G尺的正確性: 辱㈣丨丨仍。) 右上式成立,則表示與%握有相同的交談金鑰 〇 1 3 ·如申請專利範圍第i 0、i丄或i 2項所述之 安全視訊會議方法,其中該動態群體金鑰協議管理包含有 新增及成員離開,其中新增為,若有新的合法使用者% 欲加入本次的會議時,執行下列步驟即可完成群體會議金 鑰的更新,並可達到前推安全(f0rwar(i seerecy): 步驟1 :使用者①使用亂數產器產生一隨機亂數f , J q 並計算 Tj=tj.G 步驟2:%將{/!)/,;〇,7}}傳送至[/〇; 步驟3 :當t/〇收到{/£>y,〜7}}後,執行下列步驟驗證的身分 36 200901721 ,並計算新的群體金鑰GiT : 步驟3 -1 :計算與.的部份群體交談金鑰資訊5 SK〇 j =T0 yj + Tj · _y〇 = (xy +t0)-G + (tj +x0)-G 步驟3-2 :由{/Dy,和*S尤〇y驗證ί/y身分的合法性: SK0J^0-{(X(y0) + h(ID0)) + (X(yJ) + h(IDj))^) + x0-Tj 若上式成立,則表示可正確地驗證的合法性 9 步驟3-3 :使用亂數產器產生一隨機亂數外eZ/並 計鼻新的群體金錄GiT : GK'^GK^SK^nk' 步驟3 - 4 .分別為計算新的群體金输資訊^ . Ki=GK'®SK0i 步驟3 - 5 :計算新的群體金鑰之驗證值T,以供其他 通訊個體進行群體金鑰的驗證: ^ = h(GK'\\ID0) 步驟3-4 :傳送給%,並傳送{IDq,K;,A/} 給其他通訊個體£Λ·; 步驟4 :新加入的使用者收到{/D。,%%,'.,;!/}時,執行下列 步驗以產生群體金鑰G/:並驗證Gii:的正確性; 步驟4-1 :計算部份群體交談金鑰資訊5尤;0 ^i〇 = Ά+ y〇 + r^i+ yi =(x〇+ti)'^+(f〇+xi)'G 步驟4-2 :由{仍0,凡,Γ〇}和SAo驗證新加入的使用者身 37 200901721 分的合法性: ^ο^·{(^〇) + Μ^〇)) + (X{yi) + h{IDi)).p) + xiT, 若上式成立,則表示可正確地驗證新加入的使用 者的合法性; 步驟4-3 :計算群體金鑰: GKfK^St^ 步驟4-4 :驗證(?尺,的正確性: λΐ^οκ^ω,) 若上式成立,則表示與w握有相同的交談金鑰. 既有的使用者執行下列步驟即可計算出新的群體金鑰: 尺;㊉說,.〇 其中,成員離開:若有參與會議的使用者%離開會 議,執行下列步驟即可完成群體會議金鑰的更新並可達 到後推安全(backward secrecy): 步驟 一隨機亂數 .會β義主持人%使用亂數產器產生 < ,並計算新的群體金鍮G/r : GK” 二 GK’®SK,nk2 步驟2 :分別為%計算新的群體金鑰資訊尺广·· K-=GKn@SK0i 步驟3 :計算新的群體金鑰之驗證值^, u具他通訊個 體進行群體金鑰的驗證: 儿” = h(GK”l\lD0) 38 200901721 步驟 步驟 GK;:= 十一 如 4 :傳送{/ZUf,;l〃}給其他通訊個體。 5 : t/,·行下列步驟即可計算出新的群體金鑰: iq®sKi(r 、圖式: 欠頁 39200901721 X. Patent application scope: 1 · A security video conferencing system is a high security and high affinity security video conferencing system, including: A dual login authentication mechanism, including Java Card (Java Card) Security mechanism and password security mechanism. When the user logs in to the system, the Java Card ' and the user ID (ID) and password (Passw〇rd) obtained during registration must be inserted into the card reader. The secret information read by the Java Card and the data entered by the user are used to perform the operation and exchange the result with the server to identify the legal identity of the user. Finally, the conference key is calculated together with the server. (Session Key) 'For the exchange of secret messages for the conference, the user inserts the Java Card and enters the id and password to perform two-way identification with the server' and generates a secret record of the conference; one level key exchange Mechanism, which includes three different levels of the gold record protocol mechanism 'U2S: User to Server, user group (U2G: Us Er to Group) and individual users (U2U: User t〇User) to do the gold record agreement, when the user logs in, they work with the server to calculate a Session Key for future secret information transmission (U2S); During the conference, the user can also make another Golden Wheel Protocol (U2G) with the user group participating in the conference or use the U2U for a single user in the group; The mechanism 'user can customize the easy-to-remember secret but also has the same level of security as the general password mechanism, and the authentication mechanism used by the system allows the user to directly connect to the server. 30 200901721 changes, instead of personally accessing the password on the text card, in order to increase the convenience of the user to change the password; Q 0 a friendly basic network level a, , R port ', the use of interface to extract the basis The network (Web-Based) as the system...the next...the user does not need to download any installation program when using the system. The mouth a must be connected to the network, click on the user, after the meeting, Will Downloading the system by the eye-catching, without the need to install the action 'Additional user makes the use of this system convenient, the meeting includes video, voice, text transmission or slot transmission. Shenyue patent circumference item 1 The security video conferencing system of the above-mentioned dual login authentication mechanism is registered, and the user must register and use the CA (Certificate Authority) to register and use the system before using the system. a After the user decides the weight, the CA calculates the secret information that will be used in the future when logging in to the system, and writes it to the java card in the shell sfL and gives the user a use, 5 Tiger (ID) 'and send java card to the user. The security video conferencing system of claim 1, wherein the video conference is π γ, the system can transmit and transmit information between users via a server, and the video image is used by the user. Peer-to-peer delivery, both with immediate messaging capabilities. 4 · As claimed in the patent application scope 1 of the security video conferencing system 'where the video conferencing department pik + finds the system has the ability to dynamically manage the conference, that is, one of the users is the conference: ^. My chairman' Although the conference chairman enters the conference room, the conference will be opened, and the left I ▲ f will not be accessible on the webpage of the users participating in the conference. She 4·Tomb + Luo u, the chairman can also decide the conference. End of the time, when the meeting 31 200901721 The chairman ends the meeting, the meeting is closed forever, so that the chairman of the meeting has the authority to control the opening and closing of the meeting. 5 · The security video conferencing system described in claim 1 of the patent application, wherein the video conferencing system further provides the user with the freedom to choose whether to store the functions of the conference. When the user chooses to store the conference content, the video conference system The conversation record will be stored in the user-defined folder and slot for use as a save and meeting record. b. If the application is for the singularity system, the videoconferencing system includes a security video conferencing system that can be used for enterprise video conferencing systems, distance learning systems, collaborative design systems, virtual community systems or home care systems. 7 · As described in the first paragraph of the patent application, the method of registering and logging in to the CA to authenticate the identity and key agreement in both directions. 8 • If the security mentioned in item i of the patent application is included, the user in the conference room will form a group: and use the HLM_seheme conference golden mechanism to encrypt the data transmission of Jinyu.卫 for 9 _ as claimed in the 8th article of the patent application scope, the female full video conference preparation record, where the use of the group is going to work, the HLM-schemn will be carried out. ^^^ & Xiao ° tongue work this golden wheel exchange system to do the key agreement, as the Beko transmission encryption. '100.- A security video conferencing method, in which the group gold agreement can be divided into the following three. Change #又·-user registration stage, - group gold 32 200901721 key agreement stage and a dynamic group key agreement Management phase; in this method, 'Trusted Third Party (TTP)' is the System Center (SA), which is responsible for establishing and managing basic parameters of the system, and assisting users in calculating self-verification. Public key; * During the user registration phase, the user presents his or her identity-related information: The system is registered with the system, the system center is responsible for the user's identity information • Generate and issue a self-validated public key and proof (witness To the user's user can use the returned proof to calculate his own private key, and can use the calculated private balance to verify the validity of the public key; in the group communication session, the communication parties use The other party's eight keys exchange communication with their private key to establish a share and talk about the gold record; When a member joins or leave, you can easily change the key groups in order to achieve security before meeting Kim push key (forward secrecy) and push security (backward secrecy). 1 1. The method of security video conferencing as described in claim i of the patent scope, wherein the user registration phase is for the user to perform the step of registering with the system center and obtaining the identity authentication information: Step 1: t/, selected Identity ID 7 recognizes π. Selects the number t, %, S, and the number of identification information 0: II7Z) t).G then 'transmits {//), ., g} to the system center to propose... Heart Book A δ Month, Step 2. When the system center receives the registration application, select the random number 2 l^R 5 33 200901721 § ten nose t /, identity identification information % and self-verification public key: ypR+KlDJ.G Wi =2i+r. ) + h(<IDj)) mod q Then 'pass{hw,} to t/,.; Step 3: % After receiving U, w, ·}, perform the following steps: 3 - 1 : Calculate the private key 々χ. = w. - II ID() modq Step 3 -2 : Verify that the public key is correct: ' · G = is +/ ί(/Ζ)(.). σ + ( ι(乃)+ w//).) ·^). 1 2 · If you apply for the security conference method described in Article 1 or 11 of the patent scope, the group key agreement phase is 'each group key agreement agreement will be responsible and managed by a conference host% The generation and update of the conversation golden wheel. When multiple legitimate users of the system want to establish the -2 group conversation key, the moderator first starts the action of the meeting, and decides that the meeting can participate in the meeting and sends a meeting notice to For other individuals, the detailed steps are as follows: Step 1: When other individuals t/, 'received the meeting notice, if you want to join the meeting', perform the following steps to calculate the key agreement information 71, to t/〇 Step 1 -1 : t / ,. Generate a random random number & using the chaotic generator and calculate Ti = ti.G Step 2-2: Transfer {/Α_, π, 7;.} to % step 2: When receiving ., is., 7;.}, you can calculate part of the group conversations. 200901721 The newsletter iSATo,. He also verified the identity of the individual t// through iSATo.. Step 2-1: Use a random number generator to generate a random number & eZ9 and calculate '〇= '〇 G Step 2-2: Calculate the conversation key information of some groups with other communication individuals t/, *: = '〇.乃+(·少〇= (A. 尤〇). G Step 2-3 : Validate the legality of % identity by 7}} and 5Ά: SK0ilt0-{(X(y0) + h(ID0)) + (Χ(γί) + ΚΙΌί))·β) + χ0·Τί If the above formula is established , which means that the legality of the correctness can be correctly verified. Step 3: After receiving all 7;.}, the group gold transfer protocol step can be continued: Step 3-1: This is generated by partial group key information. The group key of the second meeting: = Shen 01 ten level 02 ten... ten level 0; „ Step 3 -2: Calculate the group key information, respectively..: K^GKmsK^ Step 3 -3: Calculate the key verification value ;I, for other communication individuals to verify the group key: λ = h (GK II IDq) Step 3-4: Transfer., A} to other communication entities ί/,.; Step 4: When t/,. When receiving {ΖΟ.,外,Κ,Α}, perform the following steps to generate 35 200901721 Group Golden Record GA: and verify the correctness of GA: Step 4-1: Calculate the partial group chat key information SKiQ = Tl+y0+Ti+ = (j:0 +ί.). Q + + . G Step 4-2: by {/ ), outside, 7^} and from, _〇 verification. Legitimacy of identity: If the above formula is true, it means that the legality of % can be correctly verified. Step 4-3: Calculate the group key GA:i : GK^ K^SK^ Step 4-4: Verify the correctness of the G rule: Insult (four) 丨丨 still. If the upper right formula is established, it means that the same conversation key as % is held. 1 3 · The secure video conference method described in the patent application scope i 0, i丄 or i 2, wherein the dynamic group key agreement management Including new and member leaving, which is added as, if there are new legitimate users% want to join this meeting, perform the following steps to complete the group meeting key update, and reach the push security (f0rwar (i seerecy): Step 1: User 1 uses a random number generator to generate a random random number f, J q and calculates Tj=tj.G Step 2: % will be {/!)/,;〇,7}} To [/〇; Step 3: When t/〇 receives {/£>y,~7}}, perform the following steps to verify the identity 36 200901721 and calculate the new group key GiT: Step 3 -1 : Calculate the partial key conversation information with .5 SK〇j =T0 yj + Tj · _y〇= (xy +t0)-G + (tj +x0)-G Step 3-2: by {/Dy, and *S You〇y verify the legality of ί/y identity: SK0J^0-{(X(y0) + h(ID0)) + (X(yJ) + h(IDj))^) + x0-Tj If the formula is true, it means the legitimacy that can be correctly verified. 9 Step 3-3: Make Use the chaotic generator to generate a random random number eZ/ and count the new group Jint GiT: GK'^GK^SK^nk' Steps 3 - 4 . Calculate the new group gold information respectively ^ . Ki= GK'®SK0i Steps 3 - 5: Calculate the verification value T of the new group key for other communicating individuals to verify the group key: ^ = h(GK'\\ID0) Step 3-4: Transfer to % And send {IDq, K;, A/} to other communication entities. Step 4: The newly added user receives {/D. , %%, '.,;!/}, perform the following steps to generate the group key G/: and verify the correctness of Gii:; Step 4-1: Calculate the partial group chat key information 5; 0 ^i〇= Ά+ y〇+ r^i+ yi =(x〇+ti)'^+(f〇+xi)'G Step 4-2: Verify new by {still 0, where, Γ〇} and SAo The legality of the user's body 37 200901721 points: ^ο^·{(^〇) + Μ^〇)) + (X{yi) + h{IDi)).p) + xiT, if the above formula holds, It means that the legality of the newly added user can be correctly verified; Step 4-3: Calculate the group key: GKfK^St^ Step 4-4: Verify (?, correctness: λΐ^οκ^ω,) If the above formula is established, it means that it has the same conversation key as w. The existing user can calculate the new group key by performing the following steps: Ruler; Ten said, 〇 where the member leaves: If there is participation % of the users of the meeting leave the meeting, perform the following steps to complete the update of the group meeting key and reach the backward secrecy: Step 1 random random number. The beta host will use the random number generator to generate <; and calculate a new group of gold 鍮 G / r : GK" GK'®SK, nk2 Step 2: Calculate the new group key information scale for % respectively · K-=GKn@SK0i Step 3: Calculate the verification value of the new group key ^, u have his communication individual group Key verification: 儿" = h(GK"l\lD0) 38 200901721 Step Step GK;:= 十一如4: Transfer {/ZUf,; l〃} to other communicating individuals. 5 : t/,· The following steps can be used to calculate a new group key: iq®sKi(r , schema: owed page 39
TW97136477A 2008-09-23 2008-09-23 Secure video conferencing systems and methods TWI387292B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97136477A TWI387292B (en) 2008-09-23 2008-09-23 Secure video conferencing systems and methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97136477A TWI387292B (en) 2008-09-23 2008-09-23 Secure video conferencing systems and methods

Publications (2)

Publication Number Publication Date
TW200901721A true TW200901721A (en) 2009-01-01
TWI387292B TWI387292B (en) 2013-02-21

Family

ID=44721711

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97136477A TWI387292B (en) 2008-09-23 2008-09-23 Secure video conferencing systems and methods

Country Status (1)

Country Link
TW (1) TWI387292B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI575957B (en) * 2011-06-07 2017-03-21 英特爾公司 Automated privacy adjustments to video conferencing streams
TWI656781B (en) * 2017-11-28 2019-04-11 南開科技大學 Offline status without login verification system and method thereof

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI758809B (en) * 2019-08-06 2022-03-21 仁寶電腦工業股份有限公司 Smart conference management system and method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6549229B1 (en) * 1999-07-26 2003-04-15 C-Cubed Corporation Small, portable, self-contained, video teleconferencing system
US20070273751A1 (en) * 2000-09-05 2007-11-29 Sachau John A System and methods for mobile videoconferencing
US7623149B2 (en) * 2002-09-13 2009-11-24 Criticom, Inc. Integrated secure encryption apparatus
AU2003274849A1 (en) * 2002-11-04 2004-06-07 Tandberg Telecom As Inter-network and inter-protocol video conference privacy method, apparatus, and computer program product
US7477614B2 (en) * 2004-04-29 2009-01-13 Sandia Corporation Secure videoconferencing equipment switching system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI575957B (en) * 2011-06-07 2017-03-21 英特爾公司 Automated privacy adjustments to video conferencing streams
TWI656781B (en) * 2017-11-28 2019-04-11 南開科技大學 Offline status without login verification system and method thereof

Also Published As

Publication number Publication date
TWI387292B (en) 2013-02-21

Similar Documents

Publication Publication Date Title
US10284379B1 (en) Public key infrastructure based on the public certificates ledger
Islam Design and analysis of an improved smartcard‐based remote user password authentication scheme
Li et al. Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update
Tootoonchian et al. Lockr: better privacy for social networks
Li et al. Applying biometrics to design three‐factor remote user authentication scheme with key agreement
US8346667B2 (en) Distributed secure anonymous conferencing
Chari et al. Universally composable security analysis of OAuth v2. 0
US9100171B1 (en) Computer-implemented forum for enabling secure exchange of information
US20040255137A1 (en) Defending the name space
TW200818838A (en) Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords
Jarecki et al. Two-factor authentication with end-to-end password security
TW201027384A (en) Digital rights management (DRM)-enabled policy management for an identify provider in a federated environment
CN101697540A (en) Method for authenticating user identity through P2P service request
Xie et al. Cryptanalysis and security enhancement of a robust two‐factor authentication and key agreement protocol
CN103684798B (en) Authentication method used in distributed user service
Lou et al. Efficient three‐party password‐based key exchange scheme
Huang A simple three‐party password‐based key exchange protocol
CN115885498A (en) Threshold signature
Muftic Bix certificates: Cryptographic tokens for anonymous transactions based on certificates public ledger
US9553863B2 (en) Computer implemented method and system for an anonymous communication and computer program thereof
CN110866754A (en) Pure software DPVA (distributed data authentication and privacy infrastructure) identity authentication method based on dynamic password
ElGayyar et al. Blockchain-based federated identity and auditing
CN113536347A (en) Bidding method and system based on digital signature
TW200901721A (en) Secure videoconferencing system and method thereof
TW201233113A (en) Method for providing social network service using privacy homomorphism cryptography

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees