CN102510336A - Security certification system or method - Google Patents

Security certification system or method Download PDF

Info

Publication number
CN102510336A
CN102510336A CN2011103974100A CN201110397410A CN102510336A CN 102510336 A CN102510336 A CN 102510336A CN 2011103974100 A CN2011103974100 A CN 2011103974100A CN 201110397410 A CN201110397410 A CN 201110397410A CN 102510336 A CN102510336 A CN 102510336A
Authority
CN
China
Prior art keywords
service
authentication
terminal
user
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011103974100A
Other languages
Chinese (zh)
Inventor
任少华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2011103974100A priority Critical patent/CN102510336A/en
Publication of CN102510336A publication Critical patent/CN102510336A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a security certification system or method. A movable IC (integrated circuit) mode is used for solving the problems of inconvenience in use and low security when users login the same network account on different terminals or users login different network accounts on the same terminal.

Description

The Verification System or the method for safety
Technical field
The present invention relates to a kind of safe Verification System or method.
Background technology
There is inconvenience and the not high problem of fail safe used when on same terminal, landing the heterogeneous networks number of the account in the user landing consolidated network number of the account and user on the different terminals.And removable IC can't be applied to a plurality of websites simultaneously.
Summary of the invention
The present invention is achieved in that a kind of safe Verification System or method, wherein; Comprise terminal, service side, party intermediary and removable IC chip, wherein, the user at terminal has service side's number of the account in service side; The user at terminal has the party intermediary number of the account in party intermediary, and wherein, the user at terminal can be associated party intermediary number of the account and service side's number of the account; Party intermediary can write down should association, wherein, and after the user uses the terminal to pass through the party intermediary authentication and logins party intermediary; Party intermediary can send to the terminal with the service side's account information that is associated with this user's party intermediary number of the account; The terminal will be to this side's of service number of the account of this service side's request login user after selecting the service side that an is associated number of the account on the party intermediary interface at terminal for the user, and service side can have only the authentication of service side can allow this service side's number of the account of terminal login just now through the back service to the authentication of the side of service, terminal after receiving the logging request at terminal; Wherein, The user has removable IC chip, and the authentication of the side of service is carried out through this removable IC chip, and only the authentication of the side of service could be passed through when this removable IC chip is connected in the terminal.
Wherein, preserve the privately owned part of an authentication sign in the removable IC chip, party intermediary is preserved the open part of this authentication sign, and this privately owned part can be carried out mutual authentication through corresponding calculating with open part.Wherein, removable IC chip is the party intermediary issue.
Wherein, this authentication sign is the key of a pair of asymmetric encryption.Wherein, privately owned part is a private key, and open part is a PKI.
Wherein, in the authentication of service side, the terminal can be sent with the privately owned part of authentication sign to service side and calculated the authentication information that generates.Wherein, service side can verify calculating to this authentication information with the open part of authentication sign, and the authentication of the side of service just can be passed through when having only checking result of calculation correct.Wherein, the free term of validity of authentication information, expired authentication information can lose efficacy.
Wherein, in the authentication of service side, can transmit the open part of this authentication sign between the side of service and the party intermediary.After having only the correct completion of this transmission, the authentication of the side of service could be passed through.Wherein, or party intermediary transmits the open part of this authentication sign to service side, or the open part that the service orientation party intermediary transmits this authentication sign is returned confirmation by party intermediary to service side then.
Wherein, when the user will the side's of service number of the account be associated with the party intermediary number of the account, can transmit the open part of this authentication sign between the side of service and the party intermediary.After having only the correct completion of this transmission, related ability success.Wherein, or party intermediary transmits the open part of this authentication sign to service side, or the open part that the service orientation party intermediary transmits this authentication sign is returned confirmation by party intermediary to service side then.Wherein, after the association success, the open part of the authentication sign of service side's meeting recording user.
Wherein, after the user was associated party intermediary number of the account and service side's number of the account, service side also can write down should association.
Wherein, the program object of the program object of login service side, terminal and terminal login party intermediary is two different programs objects.Wherein, the terminal is two different programs objects to the program object of service side's transmission authentication information and the program object of terminal login party intermediary.
Wherein, the in store key of described removable IC chip calculates and authentication with this key in the authentication of the side of service.Wherein, in store private key for user in the removable IC chip.Wherein, in the authentication of service side, service side can carry out authentication through calculating to the terminal through the corresponding relation of the private key for user in client public key and the removable IC chip.
Wherein, the terminal is after the service side of login user number of the account, and the terminal will connect with service side, and the user just can connect the resource and the service of the appointment of using service side through this.
Wherein, same user's the difference side of service number of the account can be associated with this user's same party intermediary number of the account.
Wherein, same user also can have a plurality of party intermediary numbers of the account in same party intermediary.
Wherein, after passing through the authentication of service side, the terminal is connected setting up to encrypt with the key that privately owned part is formed with the open part that the service square tube is crossed said authentication sign.Wherein, through after the authentication of service side, the key that the open part that terminal and service square tube are crossed said authentication sign and privately owned part are formed is to transmitting key and the foundation encryption is connected.For example: set up SSL through the authentication sign and connect.
Wherein, terminal, the side of service and party intermediary are connected through the Internet.Wherein, tripartite information transmission is carried out through the Internet.
Wherein, party intermediary and service side also have corresponding engagement arithmetic, and whether the affirmation information that service can be enough received through this engagement arithmetic calculating inspection is from party intermediary, and perhaps, confirmation is the transmission of encrypting with this engagement arithmetic.Wherein, said engagement arithmetic can be encrypting and decrypting algorithm or Digital Signature Algorithm or one-way hash function algorithm or dynamic password algorithm or the like.Wherein, said engagement arithmetic is a rivest, shamir, adelman.
Wherein, the information transmission between terminal and the service side is without party intermediary, perhaps service side allow the terminal login and the connection of setting up without party intermediary.
Wherein, the authentication of the side of service can allow one of self terminal to connect or port login through service side, back, and this connection or port are that said that port or connection of calculating the authentication information that generates with the authentication sign sent to service side in the terminal.
Wherein, after ended the login of the side of service at the terminal, the terminal side's of service authentication again could be logined again.
Wherein, service can be to be to the terminal server system of resource and service to be provided through the Internet, like various websites etc.Service side also can be other user's on the internet terminal, and for example: above mutual authentication just can be applicable in the instant communicating system two user terminals and sets up the handshake procedure of two point-to-point connections of terminal room.
Wherein, party intermediary is the computer system of carrying out third party's authentication on the internet.
Wherein, the terminal is the equipment with computer function, as: PC, mobile phone, server, server farm etc.
Wherein, the user also uses removable IC chip to login party intermediary.
Description of drawings
Fig. 1 is a schematic network structure of the present invention.
Embodiment
Embodiment 1
In the present embodiment, the user has a user account (AUID) in that party intermediary is registered, and the user is also registered in service side to have a user account (APID).Wherein, service side is an ICP.Wherein, the user associates oneself service side number of the account APID and party intermediary number of the account AUID, and this incidence relation is kept in the system of service side and party intermediary simultaneously.The user has the usb key of party intermediary issue, preserves private key for user and client public key in the usb key, the in store client public key corresponding with this user's party intermediary number of the account in the party intermediary system.
The concrete steps of present embodiment are following:
1) user is connected removable IC with the terminal, and the user uses the authentication procedure at terminal through the party intermediary authentication, and party intermediary is returned all side's of service account information that are associated with user's party intermediary number of the account to the authentication procedure at terminal;
2) when the user clicks the option of login service side on the authentication procedure interface; The browser object of authentication procedure newly-generated sensing address, service side on the terminal or the object of other specific program; This newly-generated program object sends connection request to service side; Comprise service side's number of the account of user, user's party intermediary number of the account, service party name and rise time in this connection request, and this connection request also comprises client public key and the digital signature of carrying out with private key for user;
3) after the connection request from the user is received by service side, the service orientation party intermediary is sent an authentication request, comprise in this authentication request the user the user name of service side, user in the user name of party intermediary, serve party name and client public key;
4) after party intermediary is received the authentication request from service side; Whether party intermediary is checked the terminal public key of sending service side consistent with the client public key of oneself preserving; If client public key is consistent, party intermediary will be sent the correct affirmation information of this client public key of expression to service side so;
5) after the affirmation information from party intermediary is received by service side; Whether service side is correct with the digital signature of client public key checking user's connection request, and service side can also verify whether user's connection request is expired, has only the digital signature of this connection request correct and not out of date; This terminal could be through authentication; Service side can also carry out question and answer response several times again based on the removable IC that is connected on client public key and the terminal, if the question and answer response is correct, then the authentication of service side has been passed through at the terminal.
6) after the authentication of service side was passed through, service side will allow this side's of service number of the account of terminal login user and connect.Wherein, the program object of the service side that the terminal is inserted can be browser or other dedicated program, and after the access, the user just can pass through service specified and the resource that this program connects and use service side on the terminal.
Wherein, the terminal can also be set up to encrypt with service side and be connected by client public key and private key for user, specifically following dual mode can be arranged:
First kind of mode is; Service side has service side's private key and the terminal can obtain the corresponding PKI in the side of service; In above step 2) in; In the connection request that service side sends, also include the DES key by service side's public key encryption at the terminal, the terminal is set up to encrypt with this DES key with service side and is connected;
The second way is, in above step 5), encrypt DES key and sends to the terminal with this client public key service side, and service side is connected with this DES key foundation encryption with the terminal.
Embodiment 2
In the present embodiment, the user has a user account (AUID) in that party intermediary is registered, and the user is also registered in service side to have a user account (APID).Wherein, service side is an ICP.Wherein, the user has the usb key of party intermediary issue, preserves private key for user and client public key in the usb key, the in store client public key corresponding with this user's party intermediary number of the account in the party intermediary system.
Wherein, the user associates oneself service side number of the account APID and party intermediary number of the account AUID, and this incidence relation is kept in the system of service side and party intermediary simultaneously.Simultaneously, in association process, service side has also preserved this user's client public key simultaneously.
The concrete steps of present embodiment are following:
1) user is connected removable IC with the terminal, and the user uses the authentication procedure at terminal through the party intermediary authentication, and party intermediary is returned all side's of service account information that are associated with user's party intermediary number of the account to the authentication procedure at terminal;
2) when the user clicks the option of login service side on the authentication procedure interface; The browser object of authentication procedure newly-generated sensing address, service side on the terminal or the object of other specific program; This newly-generated program object sends connection request to service side; Comprise service side's number of the account of user, user's party intermediary number of the account, service party name and rise time in this connection request, and this connection request also comprises client public key and the digital signature of carrying out with private key for user;
3) after the connection request from the user is received by service side; Whether service side is correct with the digital signature of client public key checking user's connection request, and service side can also verify whether user's connection request is expired, has only the digital signature of this connection request correct and not out of date; This terminal could be through authentication; Service side can also carry out question and answer response several times again based on the removable IC that is connected on client public key and the terminal, if the question and answer response is correct, then the authentication of service side has been passed through at the terminal.
4) after the authentication of service side was passed through, service side will allow this side's of service number of the account of terminal login user and connect.Wherein, the program object of the service side that the terminal is inserted can be browser or other dedicated program, and after the access, the user just can pass through service specified and the resource that this program connects and use service side on the terminal.
Embodiment 3
In the present embodiment, the user has a user account (AUID) in that party intermediary is registered, and the user is also registered in service side to have a user account (APID).Wherein, service side is an ICP.Wherein, the user has the usb key of certain CA issue, preserves private key for user and client public key in the usb key.Wherein, the in store client public key corresponding in the service method, system with service side's number of the account of this user, this preservation can be in the process of user registration service side number of the account or after user login services side's number of the account, to carry out.
Wherein, the user associates oneself service side number of the account APID and party intermediary number of the account AUID, in the system of this incidence relation party intermediary.
The concrete steps of present embodiment are following:
1) user is connected removable IC with the terminal, and the user uses the authentication procedure at terminal through the party intermediary authentication, and party intermediary is returned all side's of service account information that are associated with user's party intermediary number of the account to the authentication procedure at terminal;
2) when the user clicks the option of login service side on the authentication procedure interface; The browser object of authentication procedure newly-generated sensing address, service side on the terminal or the object of other specific program; This newly-generated program object sends connection request to service side; Comprise service side's number of the account of user, user's party intermediary number of the account, service party name and rise time in this connection request, and this connection request also comprises client public key and the digital signature of carrying out with private key for user;
3) after the connection request from the user is received by service side; Whether service side is correct with the digital signature of client public key checking user's connection request, and service side can also verify whether user's connection request is expired, has only the digital signature of this connection request correct and not out of date; This terminal could be through authentication; Service side can also carry out question and answer response several times again based on the removable IC that is connected on client public key and the terminal, if the question and answer response is correct, then the authentication of service side has been passed through at the terminal.
4) after the authentication of service side was passed through, service side will allow this side's of service number of the account of terminal login user and connect.Wherein, the program object of the service side that the terminal is inserted can be browser or other dedicated program, and after the access, the user just can pass through service specified and the resource that this program connects and use service side on the terminal.
Certainly, the present invention also can or combine other systems approach and produces many other embodiment based on concrete condition.

Claims (10)

1. the Verification System of a safety or method wherein, comprise terminal, service side, party intermediary and removable IC chip; Wherein, the user at terminal has service side's number of the account in service side, and the user at terminal has the party intermediary number of the account in party intermediary; Wherein, the user at terminal can be associated party intermediary number of the account and service side's number of the account, and party intermediary can write down should association; Wherein, After the user used the terminal to pass through the party intermediary authentication and logins party intermediary, party intermediary can send to the terminal with the service side's account information that is associated with this user's party intermediary number of the account, and the terminal will be to this side's of service number of the account of this service side's request login user after selecting the service side that an is associated number of the account on the party intermediary interface at terminal for the user; Service side can be to the authentication of the side of service, terminal after receiving the logging request at terminal; Have only the authentication of service side can allow this service side's number of the account of terminal login just now through the back service, wherein, the user has removable IC chip; The authentication of the side of service is carried out through this removable IC chip, and only the authentication of the side of service could be passed through when this removable IC chip is connected in the terminal.
2. safe Verification System according to claim 1 or method; It is characterized in that; Preserve the privately owned part of an authentication sign in the removable IC chip; Party intermediary is preserved the open part of this authentication sign, and this privately owned part can be carried out mutual authentication through corresponding calculating with open part.
3. safe Verification System according to claim 2 or method is characterized in that, this authentication sign is the key of a pair of asymmetric encryption, and wherein, privately owned part is a private key, and open part is a PKI.
4. based on described safe Verification System of claim 2 or method, it is characterized in that in the authentication of service side, the terminal can be sent with the privately owned part of authentication sign to service side and calculated the authentication information that generates.
5. safe Verification System according to claim 4 or method is characterized in that, service side can verify calculating to this authentication information with the open part of authentication sign, and the authentication of the side of service just can be passed through when having only checking result of calculation correct.
6. safe Verification System according to claim 4 or method is characterized in that, in the authentication of service side, can transmit the open part of this authentication sign between the side of service and the party intermediary.
7. based on described safe Verification System of claim 2 or method, it is characterized in that, when the user will the side's of service number of the account be associated with the party intermediary number of the account, can transmit the open part of this authentication sign between the side of service and the party intermediary.
8. safe Verification System according to claim 1 or method is characterized in that, after the user was associated party intermediary number of the account and service side's number of the account, service side also can write down should association.
9. safe Verification System according to claim 1 or method is characterized in that, the program object of the program object of login service side, terminal and terminal login party intermediary is two different programs objects.
10. safe Verification System according to claim 1 or method is characterized in that, the in store key of described removable IC chip calculates and authentication with this key in the authentication of the side of service.
CN2011103974100A 2011-12-05 2011-12-05 Security certification system or method Pending CN102510336A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011103974100A CN102510336A (en) 2011-12-05 2011-12-05 Security certification system or method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011103974100A CN102510336A (en) 2011-12-05 2011-12-05 Security certification system or method

Publications (1)

Publication Number Publication Date
CN102510336A true CN102510336A (en) 2012-06-20

Family

ID=46222390

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011103974100A Pending CN102510336A (en) 2011-12-05 2011-12-05 Security certification system or method

Country Status (1)

Country Link
CN (1) CN102510336A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546293A (en) * 2013-10-08 2014-01-29 任少华 Third party certification system or method
CN103546462A (en) * 2013-10-08 2014-01-29 任少华 Third party certification system with specific associated processes or third party certification method
CN103546290A (en) * 2013-10-08 2014-01-29 任少华 Third party certification system with user groups or third party certification method
CN103546291A (en) * 2013-10-08 2014-01-29 任少华 Third party certification system with specific registration processes or third party certification method
CN104348824A (en) * 2013-08-09 2015-02-11 深圳市腾讯计算机系统有限公司 Method and system for associating network account

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202631A (en) * 2007-12-21 2008-06-18 任少华 System and method for identification authentication based on cipher key and timestamp
CN101252438A (en) * 2008-01-10 2008-08-27 任少华 Third party identification authentication system based on mobile type IC
CN101291223A (en) * 2007-12-21 2008-10-22 任少华 System and method for a third party to provide identity authentication service
CN101304318A (en) * 2008-07-04 2008-11-12 任少华 Safe network authentication system and method
US20110145899A1 (en) * 2009-12-10 2011-06-16 Verisign, Inc. Single Action Authentication via Mobile Devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202631A (en) * 2007-12-21 2008-06-18 任少华 System and method for identification authentication based on cipher key and timestamp
CN101291223A (en) * 2007-12-21 2008-10-22 任少华 System and method for a third party to provide identity authentication service
CN101252438A (en) * 2008-01-10 2008-08-27 任少华 Third party identification authentication system based on mobile type IC
CN101304318A (en) * 2008-07-04 2008-11-12 任少华 Safe network authentication system and method
US20110145899A1 (en) * 2009-12-10 2011-06-16 Verisign, Inc. Single Action Authentication via Mobile Devices

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348824A (en) * 2013-08-09 2015-02-11 深圳市腾讯计算机系统有限公司 Method and system for associating network account
CN104348824B (en) * 2013-08-09 2018-07-20 深圳市腾讯计算机系统有限公司 The method and system of related network account number
CN103546293A (en) * 2013-10-08 2014-01-29 任少华 Third party certification system or method
CN103546462A (en) * 2013-10-08 2014-01-29 任少华 Third party certification system with specific associated processes or third party certification method
CN103546290A (en) * 2013-10-08 2014-01-29 任少华 Third party certification system with user groups or third party certification method
CN103546291A (en) * 2013-10-08 2014-01-29 任少华 Third party certification system with specific registration processes or third party certification method
CN103546290B (en) * 2013-10-08 2019-06-18 任少华 Third Party Authentication system or method with user group

Similar Documents

Publication Publication Date Title
KR101708587B1 (en) Bidirectional authorization system, client and method
US9021552B2 (en) User authentication for intermediate representational state transfer (REST) client via certificate authority
US9912477B2 (en) Using everyday objects as cryptographic keys
EP3611871B1 (en) Technologies for synchronizing and restoring reference templates
WO2018121249A1 (en) Ssl protocol-based access control method and device
EP2839401B1 (en) Secure password-based authentication for cloud computing services
EP2434715A1 (en) Method for establishing a secure communication channel
JP2017528963A (en) System and method for establishing trust using a secure transmission protocol
CN101651666A (en) Method and device for identity authentication and single sign-on based on virtual private network
US9544152B2 (en) Dual layer transport security configuration
CN112543166B (en) Real name login method and device
CN102333085B (en) Security network authentication system and method
US20160381011A1 (en) Network security method and network security system
CN104935441A (en) Authentication method and relevant devices and systems
CN102510336A (en) Security certification system or method
CN104994115B (en) A kind of login authentication method and system
CN108322507A (en) A kind of method and system executing safety operation using safety equipment
CN103546292A (en) Third-party certification system or method with multiple identification codes
WO2015109958A1 (en) Data processing method based on negotiation key, and mobile phone
CN109802834A (en) The method and system that a kind of pair of business layer data is encrypted, decrypted
CN102811203B (en) Method for identifying ID, system and user terminal in the Internet
CN202206419U (en) Network security terminal and interactive system based on terminal
CN103379119A (en) Network multi-authentication system or network multi-authentication method
Me et al. A mobile based approach to strong authentication on Web
CN117336092A (en) Client login method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120620