CN102468958A - Hardware lock device authentication method and related hardware lock device - Google Patents

Hardware lock device authentication method and related hardware lock device Download PDF

Info

Publication number
CN102468958A
CN102468958A CN2010105352390A CN201010535239A CN102468958A CN 102468958 A CN102468958 A CN 102468958A CN 2010105352390 A CN2010105352390 A CN 2010105352390A CN 201010535239 A CN201010535239 A CN 201010535239A CN 102468958 A CN102468958 A CN 102468958A
Authority
CN
China
Prior art keywords
password
factor
main frame
hardware lock
lock device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105352390A
Other languages
Chinese (zh)
Inventor
孟海伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Authenex Inc
Original Assignee
Authenex Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Authenex Inc filed Critical Authenex Inc
Priority to CN2010105352390A priority Critical patent/CN102468958A/en
Publication of CN102468958A publication Critical patent/CN102468958A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an authentication method used for a hardware lock device and the hardware lock device. The authentication method comprises the following steps: receiving a first code trigger factor from a host; according to the first code trigger factor, generating a first one-time code; sending the first one-time code and a second code trigger factor to the host simultaneously; receiving a second one-time code corresponding to the second code trigger factor from the host; according to the second one-time code, determining an authentication result of a hardware lock; sending the authentication result to the host. According to the method and the device of the invention, authentication correlation information can be prevented from being stolen.

Description

Hardware lock device authentication method and related hardware locking device thereof
Technical field
The present invention relates to a kind of information security method and relevant apparatus, relate in particular to a kind of authentication method and related hardware locking device thereof that is used for a hardware lock device.
Background technology
In computer network, the general data transmission, authentication or software use the mode or the equipment of account, password or hardware lock (KeyPro) in use usually, come whether the authentication user is the proper user who authorizes.Common mode user can apply for a hardware lock device to hardware lock company, like the hardware unit of a token (Token), and passes through the particular webpage startup and sets the protection to certain accounts.Whenever the user desires the protected account of access; When software or particular host when (as the account who logins the ad hoc networks territory or login the particular network shop); The user inputs user's account number and password in advance, then requires the user to insert the hardware lock device and verifies account number, and whether password and hardware lock be correct; If can use this software, account number or data after correct.
In aforementioned user's authentication mode, generally all be to make final decision by main frame, determine whether authentication is passed through.Yet such security schema still exists risk.Can be such as, hacker through eavesdropping software, monitor host side to crack information such as user's input.
Summary of the invention
Therefore,, the object of the present invention is to provide a kind of authentication method of hardware lock device, be stolen with the prevention authentication-related information to the problem that exists in the prior art.
The present invention discloses a kind of authentication method that is used for a hardware lock device, and it includes and receives one first password from a main frame and trigger the factor; Trigger the factor according to this first password, produce one first disposal password; Transmit this first disposal password and one second password simultaneously and trigger the factor to this main frame; Receive one second disposal password that triggers the factor corresponding to this second password from this main frame; According to this second disposal password, judge a authentication result about this hardware lock; And transmit this authentication result to this main frame.
The present invention discloses a kind of hardware lock device in addition, and it includes a password generation unit, a judging unit, a receiving element and a delivery unit.This password generation unit is used for triggering the factor according to one first password, produces one first disposal password.This judging unit is used for judging the authentication result about this hardware lock according to one second disposal password that triggers the factor corresponding to one second password.This receiving element is used for receiving one first password from a main frame and triggers the factor and this second disposal password.This delivery unit is used for transmitting simultaneously this first disposal password and this second password triggers the factor to this main frame, and transmits this authentication result to this main frame.
Beneficial effect of the present invention is; The present invention lets by authentication end (like main frame) and is carried out double disposal password identifying procedure by authentication end (like token); And, be stolen with the disposal password in the prevention verification process by being confirmed final authentication result by the authentication end.
Description of drawings
Fig. 1 is the sketch map of the embodiment of the invention one identifying procedure.
Fig. 2 is the sketch map of the embodiment of the invention one token.
Wherein, description of reference numerals is following:
10 identifying procedures
100,110,120,130,140,150,160,170 steps
12 main frames
14 tokens
A1, A2 password trigger the factor
OTP1, OTP2 disposal password
The AU_RES authentication result
Embodiment
Please refer to Fig. 1, Fig. 1 is the sketch map of the embodiment of the invention one identifying procedure 10.Identifying procedure 10 is used for realizing that a main frame 12 and possesses the authentication of 14 of the tokens (Token) of hardware lock (Keypro), and it comprises the following step:
Step 100: 14 of main frame 12 and tokens are accomplished user's password and are logined flow process.
Step 110: main frame 12 transmits a password and triggers factors A 1 to token 14.
Step 120: token 14 triggers factors A 1 according to password, produces a disposal password OTP1.
Step 130: token 14 transmits disposal password OTP1 simultaneously and a password triggers factors A 2 to main frame 12.
Step 140: main frame 12 triggers factors A 2 according to password, produces a disposal password OTP2.
Step 150: main frame 12 transmits disposal password OTP2 to token 14.
Step 160: token 14 is judged the authentication result about token 14 according to disposal password OTP2.
Step 170: token 14 transmits authentication result to main frame 12.
According to identifying procedure 10, token 14 can input user's account number automatically and password to main frame 12 is logined flow process to accomplish user's password.Then, main frame 12 and token 14 carry out a two-way disposal password identifying procedure.At first, main frame 12 transmits password and triggers factors A 1 to token 14, and token 14 produces corresponding disposal password OTP1 in view of the above.When passback disposal password OTP1, token 14 also transmits password simultaneously and triggers factors A 2 to main frame 12, to carry out the Next Password identifying procedure.It can be that main frame 12 and token 14 prior agreements (presetting) are good with the relation between the cipher authentication flow process for the first time that password triggers factors A 2.Main frame 12 triggers factors A 2 according to password, produces corresponding disposal password OTP2, and repayment gives token and 14 makes authenticate-acknowledge.If disposal password OTP2 meets token 14 required passwords, then token 14 is judged authentication success, otherwise then judges authentification failure.At last, token 14 is passed to main frame 12 with authentication result, informs authentication success or failure.Under the situation of authentication success, the user can successfully login the target of desiring access, like net territory or webpage.By on can know; In identifying procedure 10; Carried out adopting for twice the disposal password identifying procedure of challenge/response (Challenge/Response) mode between main frame 12 and the token 14; And the action of judging authentication success or failure at last is to be responsible for by token 14, even therefore the hacker successfully invades the identifying procedure that also can't definitely learn main frame 12 and token 14 under the situation of main frame 12 eavesdropping passwords, lets and cracks probability and significantly reduce.
In identifying procedure 10, password triggers factors A 1 or A2 can be one group of counter that produces at random or time factor, to be used to realize the disposal password identifying procedure of property counted or timing property.In other words; Main frame 12 and token 14 can trigger factors A 1 or A2 is inserted in identical AES with password, and whether to draw one group of password respectively, it is identical to compare two groups of passwords again; And when two groups of passwords are identical, carry out next step (as judging the cipher authentication flow process of authentication result or another time).For example, main frame 12 utilizes an algorithm and password to trigger factors A 2 and produces disposal password OTP2.Token 14 is when receiving disposal password OTP2; Also utilize identical algorithms and password to trigger factors A 2 and produce one group of disposal password; When if the disposal password that produces conforms to disposal password OTP2, then token 14 is judged authentication success, otherwise then judges authentification failure.Likewise, main frame 12 judge disposal password OTP1 that token 14 produced whether correctly also be profit in the same way.In addition, disposal password OTP1 and OTP2 can (Hash-based Message Authentication Code OneTime Password, HOTP) algorithm produces according to a hash information authenticating one-time password.
Please refer to Fig. 2, Fig. 2 is the sketch map of the embodiment of the invention one token 20.Token 20 is used for realizing the token 14 in the identifying procedure 10, and comprises a connecting interface 200, a receiving element 210, a delivery unit 220, a password generation unit 230 and a judging unit 240.Receiving element 210 and delivery unit 220 carry out handshaking through connecting interface 200 with a main frame (like the main frame 12 of Fig. 1).Connecting interface 200 can be USB (Universal Serial Bus; USB), interface such as a printing terminal (Line Print Terminal, LPT) or RS-232, to let token 20 and main frame can use identical communications protocol or transmission data encipher mode to come swap data.When receiving element 210 received password triggering factors A 1 through connecting interface 200, password generation unit 230 triggered factors A 1 according to password, utilizes the AES identical with main frame to produce disposal password OTP1.Algorithm can be an Advanced Encryption Standard (Advanced Encryption Standard, AES) algorithm or other AESs.In addition; Token 20 can comprise multiple preset password and trigger the factor; Before token 20 dispatches from the factory, store multiple cipher like manufacturer and trigger the factor in the nonvolatile memory (not being shown among the figure) of token 20; When needing password to trigger the factor, token 20 is selected one group of password more at random and is triggered the factor at every turn; Or when needing password to trigger the factor, token 20 produces one group of password at random and triggers the factor at every turn.The password that is produced triggers factors A 2 and follows the disposal password OTP1 that is produced to be sent to main frame by delivery unit 220 simultaneously again.The disposal password OTP2 that judging unit 240 is replied according to the main frame lock judges the authentication result AU_RES about token 20 (or user), and it is sent to main frame by delivery unit 220 again.Because token 20 can be used to realize the token 14 in the identifying procedure 10, therefore detailed identifying procedure please refer to Fig. 1 explanation, does not give unnecessary details in this.
Therefore, the present invention lets by authentication end (like main frame) and is carried out double disposal password identifying procedure by authentication end (like token), and by being confirmed final authentication result by the authentication end, is stolen with the disposal password in the prevention verification process.
The above is merely preferred embodiment of the present invention, and all equivalent variations and modifications of doing according to claim of the present invention all should belong to covering scope of the present invention.

Claims (7)

1. authentication method that is used for a hardware lock device includes step:
Receive one first password from a main frame and trigger the factor;
Trigger the factor according to this first password, produce one first disposal password;
One second password that transmits this first disposal password and this hardware lock device simultaneously triggers the factor to this main frame;
Receive one second disposal password that triggers the factor corresponding to this second password from this main frame;
According to this second disposal password, judge a authentication result about this hardware lock; And
Transmit this authentication result to this main frame.
2. authentication method as claimed in claim 1 is characterized in that, this authentication method also is contained in this hardware lock device and receives this first password from this main frame and trigger before factor, accomplishes the step that user's account number and password are logined program with this main frame.
3. authentication method as claimed in claim 1 is characterized in that, it is the time factor that the counter or that produces at random produces at random that this first password triggers factor.
4. authentication method as claimed in claim 1 is characterized in that, it is the time factor that the counter or that produces at random produces at random that this second password triggers factor.
5. hardware lock device includes:
One password generation unit is used for triggering the factor according to one first password, produces one first disposal password;
One judging unit is used for judging the authentication result about this hardware lock according to one second disposal password that triggers the factor corresponding to one second password of this hardware lock device;
One receiving element is used for receiving one first password from a main frame and triggers the factor and this second disposal password; And
One delivery unit is used for transmitting simultaneously this first disposal password and this second password and triggers the factor to this main frame, and transmits this authentication result to this main frame.
6. hardware lock device as claimed in claim 5 is characterized in that, it is the time factor that the counter or that produces at random produces at random that this first password triggers factor.
7. hardware lock device as claimed in claim 5 is characterized in that, it is the time factor that the counter or that produces at random produces at random that this second password triggers factor.
CN2010105352390A 2010-11-03 2010-11-03 Hardware lock device authentication method and related hardware lock device Pending CN102468958A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105352390A CN102468958A (en) 2010-11-03 2010-11-03 Hardware lock device authentication method and related hardware lock device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105352390A CN102468958A (en) 2010-11-03 2010-11-03 Hardware lock device authentication method and related hardware lock device

Publications (1)

Publication Number Publication Date
CN102468958A true CN102468958A (en) 2012-05-23

Family

ID=46072170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105352390A Pending CN102468958A (en) 2010-11-03 2010-11-03 Hardware lock device authentication method and related hardware lock device

Country Status (1)

Country Link
CN (1) CN102468958A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855422A (en) * 2012-08-21 2013-01-02 飞天诚信科技股份有限公司 Method and device for identifying pirated encryption lock
CN104915581A (en) * 2015-01-09 2015-09-16 中华电信股份有限公司 Augmented reality unlocking system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937498A (en) * 2006-10-09 2007-03-28 网之易信息技术(北京)有限公司 Dynamic cipher authentication method, system and device
EP1933252A1 (en) * 2006-12-13 2008-06-18 Axalto S.A. Dynamic OTP Token
CN101453458A (en) * 2007-12-06 2009-06-10 北京唐桓科技发展有限公司 Personal identification process for dynamic cipher password bidirectional authentication based on multiple variables
CN101594232A (en) * 2009-06-30 2009-12-02 北京飞天诚信科技有限公司 The authentication method of dynamic password, system and corresponding authenticating device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937498A (en) * 2006-10-09 2007-03-28 网之易信息技术(北京)有限公司 Dynamic cipher authentication method, system and device
EP1933252A1 (en) * 2006-12-13 2008-06-18 Axalto S.A. Dynamic OTP Token
CN101453458A (en) * 2007-12-06 2009-06-10 北京唐桓科技发展有限公司 Personal identification process for dynamic cipher password bidirectional authentication based on multiple variables
CN101594232A (en) * 2009-06-30 2009-12-02 北京飞天诚信科技有限公司 The authentication method of dynamic password, system and corresponding authenticating device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855422A (en) * 2012-08-21 2013-01-02 飞天诚信科技股份有限公司 Method and device for identifying pirated encryption lock
WO2014029221A1 (en) * 2012-08-21 2014-02-27 飞天诚信科技股份有限公司 Recognition method and apparatus for pirated encryption lock
US10152593B2 (en) 2012-08-21 2018-12-11 Feitian Technologies Co., Ltd. Method and device for identifying pirated dongle
CN104915581A (en) * 2015-01-09 2015-09-16 中华电信股份有限公司 Augmented reality unlocking system and method
CN104915581B (en) * 2015-01-09 2018-10-02 中华电信股份有限公司 Augmented reality unlocking system and method

Similar Documents

Publication Publication Date Title
CN102215221B (en) Methods and systems for secure remote wake, boot, and login to a computer from a mobile device
US8590024B2 (en) Method for generating digital fingerprint using pseudo random number code
CN101340436B (en) Method and apparatus implementing remote access control based on portable memory apparatus
CN111783068B (en) Device authentication method, system, electronic device and storage medium
TW200810465A (en) Mutual authentication between two parties using two consecutive one-time passwords
EP1922632A2 (en) Extended one-time password method and apparatus
CN105553926A (en) Authentication method, server, and terminal
WO2013165317A1 (en) Method and system for protecting a password during an authentication process
US9294474B1 (en) Verification based on input comprising captured images, captured audio and tracked eye movement
CN111131300B (en) Communication method, terminal and server
CN103200176A (en) Identification method, identification device and identification system based on bank independent communication channel
US20160044033A1 (en) Method for verifying security data, system, and a computer-readable storage device
CZ2015473A3 (en) The method of authentication security in electronic communication
CN104077690A (en) One-time password generation method and device, authentication method and authentication system
CN105187382A (en) Multi-factor identity authentication method for preventing library collision attacks
CN104901940A (en) 802.1X network access method based on combined public key cryptosystem (CPK) identity authentication
CN111031061A (en) Verification method and gateway equipment
CN110891065A (en) Token-based user identity auxiliary encryption method
CN107453871A (en) Password generated method, password authentication method, method of payment and device
CN107786978B (en) NFC authentication system based on quantum encryption
CN104901967A (en) Registration method for trusted device
KR101856530B1 (en) Encryption system providing user cognition-based encryption protocol and method for processing on-line settlement, security apparatus and transaction approval server using thereof
CN102468958A (en) Hardware lock device authentication method and related hardware lock device
US20160335636A1 (en) Dual-Channel Identity Authentication Selection Device, System and Method
CN106789076B (en) Interaction method and device for server and intelligent equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120523