CN104579662B - Mobile terminal authentication method and system based on WPKI and timestamp - Google Patents

Mobile terminal authentication method and system based on WPKI and timestamp Download PDF

Info

Publication number
CN104579662B
CN104579662B CN201310496089.0A CN201310496089A CN104579662B CN 104579662 B CN104579662 B CN 104579662B CN 201310496089 A CN201310496089 A CN 201310496089A CN 104579662 B CN104579662 B CN 104579662B
Authority
CN
China
Prior art keywords
wpki
timestamp
user terminal
application service
service end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310496089.0A
Other languages
Chinese (zh)
Other versions
CN104579662A (en
Inventor
耿方
林文辉
郭向国
林凉
杜悦琨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201310496089.0A priority Critical patent/CN104579662B/en
Publication of CN104579662A publication Critical patent/CN104579662A/en
Application granted granted Critical
Publication of CN104579662B publication Critical patent/CN104579662B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

An embodiment of the present invention provides a kind of mobile terminal authentication method and system based on WPKI and timestamp.This method includes mainly:User terminal is stabbed from Time Stamping Authority system acquisition time, and user terminal establishes safe data channel using WPKI with application service end;Application service end receives the timestamp that user terminal is sent by safe data channel, and timestamp is verified by Time Stamping Authority system in application service end;After being verified of timestamp, carried out data transmission using safe data channel between application service end and user terminal.The embodiment of the present invention is communicated using WPKI technologies with application service end by mobile intelligent terminal, using the SSL traffic agreement based on ECC algorithm, ensures the safety of entire link;By using trusted third party's time-stamping service, the various attacks to group key exchange agreement can be resisted.Effective authentication is carried out to mobile terminal to realize, ensure that the data safety of the wireless traffic of mobile terminal.

Description

Mobile terminal authentication method and system based on WPKI and timestamp
Technical field
The present invention relates to media communication technical fields, more particularly to one kind being based on WPKI(Wireless Public Key Infrastructure, Wireless Public Key Infrastructure)With the mobile terminal authentication method and system of timestamp.
Background technology
Mobile intelligent terminal, mainly there is three classes now, be respectively the android mobile phones of Google, the iphone of apple and The Windows Phone of Microsoft.Wherein, the operating system of Android intelligent is based on linux kernel, is Google companies The mobile phone operating system of announcement, is developed by Google in early days, after by open handheld device alliance exploitation.The platform is by operation system System, middleware, user interface and application software composition are the first real openings made for mobile terminal and are completely moved soft Part.
WPKI is the PKI in network(Public Key Infrastructure, Public Key Infrastructure)Safe practice is drawn Enter a set of key for following written standards and certificate management platform system into wireless network environment, WPKI is used for managing moving The public-key cryptography and digital certificate used in dynamic network environment, effectively sets up safe wireless network environment.WPKI conducts The optimization extension of PKI technologies in the wireless network, the X.509 digital certificate and ECC elliptic curves for using the compression of optimization add Secret skill art.It passes through third-party trusted authorities CA(Certificate authority, authentication center)To verify user's Identity realizes the safe transmission of information.
Currently, lack the method for carrying out effective authentication to mobile terminal, the wireless traffic of mobile terminal there is The problem of data safety.In the server end for providing data, since external interface all uses HTTP substantially(Hypertext Transfer Protocol, hypertext transfer protocol)Agreement, encryption and the use of signature are less, and there are prodigious super hidden Suffer from.In financial field, for the external interface of core, 1024 RSA are also accomplished nothing but in application service end for the ultimate attainment of safety The use of algorithm, RSA Algorithm also receive great security threat at present.
Therefore, a kind of method carrying out effective authentication to mobile terminal of exploitation is a urgent problem to be solved.
Invention content
The embodiment provides a kind of mobile terminal authentication method and system based on WPKI and timestamp, Effective authentication is carried out to mobile terminal to realize.
The present invention provides following schemes:
A kind of mobile terminal authentication method based on WPKI and timestamp, including:
User terminal is stabbed from Time Stamping Authority system acquisition time, and the user terminal uses Wireless Public Key Infrastructure WPKI establishes safe data channel with application service end;
The application service end receives the timestamp that the user terminal is sent by the safe data channel, institute Application service end is stated to verify the timestamp by the Time Stamping Authority system;
After being verified of the timestamp, the safety is utilized between the application service end and the user terminal Data channel carries out data transmission.
The user terminal is stabbed from Time Stamping Authority system acquisition time, including:
Time Stamping Authority system receives the connection request of the WPKI digital certificates of the carrying user of user terminal transmission, institute It states Time Stamping Authority system and obtains the WPKI digital certificates carried in the connection request, taken to online certificate status protocol OCSP Business device sends the certification verification request for carrying the WPKI digital certificates;
After the OCSP servers receive the certification verification request, unique mark of the WPKI digital certificates is obtained Whether the term of validity of knowledge, the term of validity, scaling option, WPKI certificates described in the OCSP server authentications is expired, described in verification Whether WPKI certificates are issued by specified authentication center CA, and whether unique mark, the scaling option for verifying the WPKI certificates are effective;
The OCSP servers are after all verifications of the WPKI digital certificates all pass through, to the Time Stamping Authority system System sends the qualified notice of verification, between the Time Stamping Authority system and the user terminal, is built using the WPKI certificates The vertical Secure Socket Layer SSL safe data channels for being used for transmission data;
The user terminal generates digest value using digest algorithm to the data that needs upload, and digest value is followed timestamp Application specification is transferred to Time Stamping Authority system by the SSL safe data channels;The Time Stamping Authority system is to described The digest value that user terminal sends over is capped timestamp, and timestamp is signed with the digital certificate of timestamp train of mechanism Name, user terminal is returned to by the timestamp information after signature.
The user terminal establishes safe data channel using WPKI Wireless Public Key Infrastructure with application service end, wraps It includes:
Application service termination receives the connection request of the WPKI digital certificates of the carrying user of user terminal transmission, described to answer The WPKI digital certificates carried in the connection request are obtained with server-side, are sent to OCSP servers and are carried the WPKI numbers The certification verification request of certificate;
After the OCSP servers receive the certification verification request, unique mark of the WPKI digital certificates is obtained Whether the term of validity of knowledge, the term of validity, scaling option, WPKI certificates described in the OCSP server authentications is expired, described in verification Whether WPKI certificates are issued by specified authentication center CA, and whether unique mark, the scaling option for verifying the WPKI certificates are effective;
The OCSP servers are sent out after all verifications of the WPKI digital certificates all pass through to the application service end It send verification qualified notice, after the application service termination receives that the verification is qualified and notifies, uses WPKI certificates and described The SSL escape ways for being used for transmission data are established between user terminal.
The timestamp is verified by the Time Stamping Authority system in the application service end, including:
The application service end obtains the digital certificate for the Time Stamping Authority system signed on timestamp, to OCSP servers The certification verification request for the digital certificate for carrying the Time Stamping Authority system is sent, OCSP is to the Time Stamping Authority system Digital certificate is verified;
The OCSP servers are after all verifications of the digital certificate of the Time Stamping Authority system all pass through, to described Application service end sends the qualified notice of verification, and the timestamp information is sent to the Time Stamping Authority by the application service end System;
The Time Stamping Authority system verifies the timestamp information sent using server-side, which includes the time Whether stamp is that this TSA is signed and issued, can timestamp information sign test pass through, and the Time Stamping Authority system is in the timestamp information institute After thering is verification all to pass through, to application service end sending time stamp Information Authentication qualification notice;In the timestamp information All verifications are not to stab the unqualified notice of Information Authentication to application service end sending time after all passing through.
After being verified of the timestamp, the safety is utilized between the application service end and the user terminal Data channel carries out data transmission, including:
After the application service termination receives the qualified notice of timestamp information verification that the Time Stamping Authority system returns, Judge that the authentication of user terminal passes through, receive the connection request of user terminal, leads between user terminal and application service end The SSL safe data channels are crossed to be communicated.
The application service termination receives the timestamp information that the Time Stamping Authority system returns and verifies unqualified notice Afterwards, judge that the authentication of the user terminal does not pass through, refuse the connection request of the user terminal.
A kind of mobile terminal authentication system based on WPKI and timestamp, including user terminal, application service end and Time Stamping Authority system:
The user terminal, for being stabbed from Time Stamping Authority system acquisition time, using Wireless Public Key Infrastructure WPKI establishes safe data channel with application service end;
The application service end, for receive the user terminal by the safe data channel send it is described when Between stab, the timestamp is verified by the Time Stamping Authority system in the application service end;In the timestamp Carried out data transmission using the safe data channel between the user terminal after being verified;
The Time Stamping Authority system, for being stabbed to the user terminal sending time, to the application service end The timestamp sended over is verified.
The system further includes:OCSP servers,
The Time Stamping Authority system, the Wireless Public base of the carrying user specifically for receiving user terminal transmission The connection request of Infrastructure WPKI digital certificates obtains the WPKI digital certificates carried in the connection request, is serviced to OCSP Device sends the certification verification request for carrying the WPKI digital certificates;
The OCSP servers obtain the WPKI digital certificates after receiving the certification verification request Unique mark, the term of validity, scaling option, whether the term of validity for verifying the WPKI certificates is expired, and verifying the WPKI certificates is No to be issued by specified authentication center CA, whether unique mark, the scaling option for verifying the WPKI certificates are effective;In the WPKI After all verifications of digital certificate all pass through, the qualified notice of verification is sent to the Time Stamping Authority system;
The user terminal will make a summary specifically for generating digest value to the data that needs upload using digest algorithm Value follows timestamp application specification and is transferred to Time Stamping Authority system by the SSL safe data channels;
The Time Stamping Authority system, after being specifically used for reception with the qualified notice of the verification, in the timestamp machine Between construction system and the user terminal, the SSL safe data channels for being used for transmission data are established using the WPKI certificates;It is right The digest value that the user terminal sends over is capped timestamp, and timestamp is carried out with the digital certificate of timestamp train of mechanism Signature, user terminal is returned to by the timestamp information after signature.
The application service end, the WPKI digital certificates of the carrying user specifically for receiving user terminal transmission Connection request obtains the WPKI digital certificates carried in the connection request, is sent to OCSP servers and carries the WPKI numbers The certification verification request of word certificate;
The OCSP servers obtain the WPKI numbers card after receiving the certification verification request The unique mark of book, the term of validity, scaling option, whether the term of validity for verifying the WPKI certificates is expired, verifies the WPKI cards Whether book is issued by specified authentication center CA, and whether unique mark, the scaling option for verifying the WPKI certificates are effective;Described After all verifications of WPKI digital certificates all pass through, the qualified notice of verification is sent to the application service end;
The application service end uses the WPKI certificates and institute after receiving the qualified notice of the verification State the Secure Socket Layer SSL escape ways established between user terminal and be used for transmission data.
The application service end, specifically for obtaining the digital certificate for the Time Stamping Authority system signed on timestamp, The certification verification request that the digital certificate for carrying the Time Stamping Authority system is sent to OCSP servers receives OCSP services After the verification qualification notice that device is sent, the timestamp information is sent to the Time Stamping Authority system;
The OCSP servers are verified specifically for the digital certificate to the Time Stamping Authority system;Institute State the digital certificate of Time Stamping Authority system all verifications all pass through after, it is qualified logical to send verification to the application service end Know;
The Time Stamping Authority system is carried out specifically for the timestamp information after the signature to being sent using server-side Verification, which includes whether timestamp is that this TSA is signed and issued, can timestamp information sign test pass through, in the timestamp information After all verifications all pass through, to application service end sending time stamp Information Authentication qualification notice;In the timestamp information All verifications be not to stab the unqualified notice of Information Authentication to application service end sending time after all passing through.
The application service end is verified specifically for receiving the timestamp information that the Time Stamping Authority system returns After qualification notice, judge that the authentication of user terminal passes through, receives the connection request of user terminal, user terminal and application clothes Business is communicated between end by SSL safe data channels.
After receiving the unqualified notice of timestamp information verification that the Time Stamping Authority system returns, the user is judged The authentication of terminal does not pass through, and refuses the connection request of the user terminal.
The embodiment of the present invention passes through intelligent movable end it can be seen from the technical solution that embodiments of the invention described above provide End is communicated using WPKI technologies with application service end, using the SSL traffic agreement based on ECC algorithm, ensures entire link Safety;By using trusted third party's time-stamping service, the mobile intelligent terminal of user obtains the label of timestamp ECC algorithm Name information is simultaneously sent, and server interface is stabbed to verify the calling data of user in application service end by allocating time, records simultaneously Put on record, the playback of message can be prevented, the various attacks to group key exchange agreement can be resisted.To realize to mobile whole End carries out effective authentication, ensure that the data safety of the wireless traffic of mobile terminal.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill of field, without having to pay creative labor, other are can also be obtained according to these attached drawings Attached drawing.
Fig. 1 is a kind of mobile terminal authentication method based on WPKI and timestamp that the embodiment of the present invention one provides Realization principle schematic diagram;
Fig. 2 is a kind of mobile terminal authentication method based on WPKI and timestamp that the embodiment of the present invention one provides Specific process chart;
Fig. 3 is that second embodiment of the present invention provides a kind of mobile terminal authentication systems based on WPKI and timestamp Structure chart, in figure, user terminal 310, application service end 320, Time Stamping Authority system 330 and OCSP servers 340.
Specific implementation mode
For ease of the understanding to the embodiment of the present invention, done further by taking several specific embodiments as an example below in conjunction with attached drawing Explanation, and each embodiment does not constitute the restriction to the embodiment of the present invention.
Embodiment one
In embodiments of the present invention, user terminal is stabbed from Time Stamping Authority system acquisition time, is taken using WPKI and application Safe data channel is established at business end.The application service end receives what the user terminal was sent by the safe data channel The timestamp is verified by the Time Stamping Authority system in the timestamp, the application service end;When described Between stab be verified after, between the application service end and the user terminal utilize the safe data channel carry out data Transmission.
This embodiment offers a kind of realization principles of the mobile terminal authentication method based on WPKI and timestamp to show It is intended to as shown in Figure 1, specific process flow is as shown in Fig. 2, include following processing step:
Step S210, timestamp is by national time service central authority, and by the credible TSA of authority(Time Stamp Authority, Time Stamping Authority)One signed and issued can prove that electronic message (electronic document with legal effect)At one Between point it is already existing, complete, can verify that have the electronic certificate of legal effect.Any mechanism include TSA oneself not It can modify to the time to ensure the authority of time.Timestamp is mainly used for the anti-tamper and subsequent denial of electronic document, determines The correct time that electronic document generates.Timestamp is now extensively using e-commerce, electronic government documents, intellectual property, health care Equal fields, the legal effect problem for ensureing electronic data file.
User passes through mobile intelligent terminal(That is user terminal)The WPKI digital certificates of carrying user are initiated to TSA systems Connection request carries certificate DN in above-mentioned WPKI digital certificates(Distinct Name, unique mark), the term of validity, scaling option Etc. contents.
Step S220, TSA systems obtain the WPKI digital certificates of the user terminal carried in above-mentioned connection request, to OCSP (Online Certificate Status Protocol, online certificate status protocol)Server initiates the WPKI of user terminal The checking request of digital certificate.
Step S230, the function of OCSP servers is mainly to receive the certificate retraction request of client, utilizes agreement Certificate retraction request in standard analysis request, by parsing obtained certificate serial number, system database is signed and issued in inquiry In certificate status, then recycle interface specification encapsulation certificate retraction response, return to client.System service pair Particular port is monitored, and receives the certificate request that client is sent by unsecured connections.It, will after analyzing request Client-side information is sent to the distributor on backstage together with solicited message, submits to each service module.When user attempts to access that one When a server, online certificate status protocol sends a request for certificate status information.Server, which replys one, " to be had The response of effect ", " expired " or " unknown ".Agreement defines the communication grammer of server and client side's application program.Online certificate Status protocol has given one grace period of overdue certificate of user, in this way they can update in pervious a period of time after It is continuous to access server.
After OCSP servers receive the checking request, the WPKI digital certificates carried in the checking request are obtained, Above-mentioned WPKI digital certificates are verified, which includes verifying whether the WPKI certificates are issued by specified CA, verifies institute Whether unique mark, the scaling option for stating WPKI certificates are effective,
The OCSP servers are sent after all verifications of the WPKI digital certificates all pass through to the TSA systems The qualified notice of verification;After all verifications of the WPKI digital certificates are not all to pass through, verification is sent not to the TSA systems Qualification notice.
Step S240, after TSA systems receive above-mentioned verification qualification notice, in the TSA systems and the user terminal Between, it is established using the WPKI certificates and is based on ECC(Error Correcting Code, error checking and correction)Algorithm It is used for transmission the SSL of data(Secure Socket Layer, Secure Socket Layer)Safe data channel.
After TSA systems receive the unqualified notice of above-mentioned verification, refuse the connection request of above-mentioned user terminal.
Step S250, after SSL safe data channels are established, above-mentioned user terminal uses the number that digest algorithm uploads needs According to digest value is generated, digest value is followed into timestamp application specification, TSA systems are transferred to by SSL safe data channels.
Step S260, above-mentioned TSA systems are capped timestamp to the digest value that above-mentioned user terminal sends over, by timestamp It is signed with the digital certificate of TSA, the timestamp information after signature is returned into user terminal.
Step S270, user initiates to carry the connection of the WPKI digital certificates of user to application service end by user terminal It asks, the contents such as certificate DN, the term of validity, scaling option is carried in above-mentioned WPKI digital certificates.
Step S280, after application service termination receives above-mentioned connection request, the user carried in above-mentioned connection request is obtained The WPKI digital certificates of terminal initiate the checking request of the WPKI digital certificates of user terminal to OCSP servers.
Step S290, after OCSP servers receive the checking request, the WPKI carried in the checking request is obtained Digital certificate verifies above-mentioned WPKI digital certificates, which includes verifying whether the WPKI certificates are issued by specified CA Hair, whether unique mark, the scaling option for verifying the WPKI certificates are effective,
The OCSP servers are sent out after all verifications of the WPKI digital certificates all pass through to the application service end Send verification qualified notice;After all verifications of the WPKI digital certificates are not all to pass through, sent to the application service end Verify unqualified notice.
Step S2100, after application service termination receives above-mentioned verification qualification notice, in the application service end and the use Between the terminal of family, the SSL safe data channels for being used for transmission data are established using the WPKI certificates.
After application service termination receives the unqualified notice of above-mentioned verification, refuse the connection request of above-mentioned user terminal.
Step S2110, the data that user terminal transmits the TSA timestamp informations returned and needs pass through the safe numbers of SSL According to channel transfer to application service end.
Step S2120, after application service termination receives the timestamp information that above-mentioned user terminal sends over, the time is obtained The digital certificate of the TSA to sign on stamp.Application service end calling OCSP verifies the validity of the digital certificate of above-mentioned TSA, OCSP The digital certificate of above-mentioned TSA is verified, whether which includes verifying the digital certificate of the TSA to be issued by specified CA, Whether unique mark, the scaling option for verifying the digital certificate of the TSA are effective.
Step S2130, after all verifications of digital certificate of the described OCSP servers in the TSA all pass through, to described Application service end sends the qualified notice of verification;After all verifications of the digital certificate of the TSA are not all to pass through, answered to described It is sent with server-side and verifies unqualified notice.
Step S2140, after application service termination receives the unqualified notice of verification that OCSP servers return, then it is assumed that the time Signature on stamp is illegal, refuses the connection request of user terminal.The verification that application service termination receives the return of OCSP servers is closed After lattice notice, then it is assumed that the signature on timestamp is legal, then the timestamp information after above-mentioned signature is sent to TSA, for testing Demonstrate,prove the timestamp information of user.
Step S2150, the timestamp information after the signature that TSA sends application server-side is verified, when verification includes Between whether stab be that this TSA is signed and issued, can timestamp information sign test pass through.
TSA is tested after all verifications of the timestamp information all pass through to application service end sending time stamp information The qualified notice of card;After all verifications of the timestamp information are not all to pass through, stabbed to application service end sending time The unqualified notice of Information Authentication.
Step S2160, it is qualified to receive the timestamp information verification that the Time Stamping Authority system returns for application service termination After notice, judge that the authentication of user terminal passes through, receives the connection request of user terminal, user terminal and application service end Between can be communicated by SSL safe data channels.
After application service termination receives the unqualified notice of timestamp information verification that the Time Stamping Authority system returns, sentence The authentication of disconnected user terminal does not pass through, and refuses the connection request of user terminal.
Embodiment two
This embodiment offers the kinds mobile terminal authentication system based on WPKI and timestamp, concrete structure As shown in figure 3, including:User terminal, application service end, Time Stamping Authority system and OCSP servers.
The user terminal, for being stabbed from Time Stamping Authority system acquisition time, using Wireless Public Key Infrastructure WPKI establishes safe data channel with application service end;
The application service end, for receive the user terminal by the safe data channel send it is described when Between stab, the timestamp is verified by the Time Stamping Authority system in the application service end;In the timestamp Carried out data transmission using the safe data channel between the user terminal after being verified;
The Time Stamping Authority system, for being stabbed to the user terminal sending time, to the application service end The timestamp sended over is verified.
Specifically, the Time Stamping Authority system, the nothing of the carrying user specifically for receiving user terminal transmission The connection request of line Public Key Infrastructure WPKI digital certificates, obtains the WPKI digital certificates carried in the connection request, to OCSP servers send the certification verification request for carrying the WPKI digital certificates;
Specifically, the OCSP servers obtain the WPKI numbers after receiving the certification verification request The unique mark of certificate, the term of validity, scaling option, whether the term of validity for verifying the WPKI certificates is expired, verifies the WPKI Whether certificate is issued by specified authentication center CA, and whether unique mark, the scaling option for verifying the WPKI certificates are effective;Institute State WPKI digital certificates all verifications all pass through after, send the qualified notice of verification to the Time Stamping Authority system;
Specifically, the user terminal, specifically for generating digest value to the data that needs upload using digest algorithm, Digest value is followed into timestamp application specification, Time Stamping Authority system is transferred to by the SSL safe data channels;
Further, the Time Stamping Authority system, after being specifically used for reception with the qualified notice of the verification, described Between Time Stamping Authority system and the user terminal, the safe numbers of SSL for being used for transmission data are established using the WPKI certificates According to channel;Timestamp is capped to the digest value that the user terminal sends over, by the timestamp number of timestamp train of mechanism Word certificate is signed, and the timestamp information after signature is returned to user terminal.
Further, the application service end, the WPKI of the carrying user specifically for receiving user terminal transmission The connection request of digital certificate obtains the WPKI digital certificates carried in the connection request, sends and carries to OCSP servers The certification verification request of the WPKI digital certificates;
Further, the OCSP servers, after receiving the certification verification request, described in acquisition The unique mark of WPKI digital certificates, the term of validity, scaling option, whether the term of validity for verifying the WPKI certificates is expired, verification Whether the WPKI certificates are issued by specified authentication center CA, whether verify the unique marks of the WPKI certificates, scaling option Effectively;After all verifications of the WPKI digital certificates all pass through, the qualified notice of verification is sent to the application service end;
Further, the application service end uses the WPKI after receiving the qualified notice of the verification The Secure Socket Layer SSL escape ways for being used for transmission data are established between certificate and the user terminal.
Further, the application service end, specifically for obtaining the Time Stamping Authority system signed on timestamp Digital certificate sends the certification verification request for the digital certificate for carrying the Time Stamping Authority system to OCSP servers, receives After the verification qualification notice sent to OCSP servers, the timestamp information is sent to the Time Stamping Authority system;
Further, the OCSP servers are specifically used for carrying out the digital certificate of the Time Stamping Authority system Verification;After all verifications of the digital certificate of the Time Stamping Authority system all pass through, sends and test to the application service end The qualified notice of card;
Further, the Time Stamping Authority system, specifically for the time after the signature to being sent using server-side Stamp information is verified, which includes whether timestamp is that this TSA is signed and issued, can timestamp information sign test pass through, described After all verifications of timestamp information all pass through, to application service end sending time stamp Information Authentication qualification notice;Described All verifications of timestamp information are led to sending time stamp Information Authentication in the application service end is unqualified after all passing through Know.
Further, the application service end, the time returned specifically for receiving the Time Stamping Authority system After stabbing Information Authentication qualification notice, judge that the authentication of user terminal passes through, receive the connection request of user terminal, user is whole It is communicated by SSL safe data channels between end and application service end.
After receiving the unqualified notice of timestamp information verification that the Time Stamping Authority system returns, the user is judged The authentication of terminal does not pass through, and refuses the connection request of the user terminal.
The detailed process of the authentication based on WPKI and timestamp and aforementioned side are carried out with the system of the embodiment of the present invention Method embodiment is similar, and details are not described herein again.
In conclusion the embodiment of the present invention is led to using WPKI technologies with application service end by mobile intelligent terminal Letter, using the SSL traffic agreement based on ECC algorithm, ensures the safety of entire link;By using trusted third party's timestamp The mobile intelligent terminal of service, user obtains signing messages and the transmission of timestamp ECC algorithm, when application service end passes through calling Between stamp server interface verify the calling data of user, while record is put on record, the playback of message can be prevented, and can resist pair The various attacks of group key exchange agreement.Effective authentication is carried out to mobile terminal to realize, ensure that mobile whole The data safety of the wireless traffic at end.
The embodiment of the present invention calls OCSP systems come the legitimacy of verification time stamp mechanism by application service end, can also The legitimacy of user certificate is verified, rigid authentication further is carried out to user identity.
The embodiment of the present invention makees the calling record of the mobile intelligent terminal of user with the record of third party's trusted timestamp For credible electronic evidence, foundation can be provided for the subsequent audit of operating service, safety inspection and information tracing, while stringent Certificate identity is verified and encrypted communication link so that the safety of server-side key interface discrepancy information further increases.
One of ordinary skill in the art will appreciate that:Attached drawing is the schematic diagram of one embodiment, module in attached drawing or Flow is not necessarily implemented necessary to the present invention.
As seen through the above description of the embodiments, those skilled in the art can be understood that the present invention can It is realized by the mode of software plus required general hardware platform.Based on this understanding, technical scheme of the present invention essence On in other words the part that contributes to existing technology can be expressed in the form of software products, the computer software product It can be stored in a storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are used so that a computer equipment (Can be personal computer, server or the network equipment etc.)Execute the certain of each embodiment or embodiment of the invention Method described in part.
Each embodiment in this specification is described in a progressive manner, identical similar portion between each embodiment Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for system or For system embodiment, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to method The part of embodiment illustrates.System and system embodiment described above is only schematical, wherein the conduct The unit that separating component illustrates may or may not be physically separated, the component shown as unit can be or Person may not be physical unit, you can be located at a place, or may be distributed over multiple network units.It can root According to actual need that some or all of module therein is selected to achieve the purpose of the solution of this embodiment.Ordinary skill Personnel are without creative efforts, you can to understand and implement.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Any one skilled in the art in the technical scope disclosed by the present invention, the change or replacement that can be readily occurred in, It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with scope of the claims Subject to.

Claims (10)

1. a kind of mobile terminal authentication method based on WPKI and timestamp, which is characterized in that including:
Time Stamping Authority system receives the connection request of the WPKI digital certificates of the carrying user of user terminal transmission, when described Between stamp train of mechanism obtain the WPKI digital certificates carried in the connection request, to online certificate status protocol OCSP servers Send the certification verification request for carrying the WPKI digital certificates;
The OCSP servers are sent out after all verifications of the WPKI digital certificates all pass through to the Time Stamping Authority system It send verification qualified notice, between the Time Stamping Authority system and the user terminal, is established and used using the WPKI certificates In the Secure Socket Layer SSL safe data channels of transmission data;
User terminal is stabbed by the SSL safe data channels from Time Stamping Authority system acquisition time;
The user terminal sends the connection request for carrying the WPKI digital certificates of user to application service end, and application service end is logical It crosses OCSP servers to verify the WPKI digital certificates, is verified rear user terminal and establishes safety with application service end Data channel;
The application service end receives the timestamp that the user terminal is sent by the safe data channel, using clothes Business end obtains the digital certificate for the Time Stamping Authority system signed on timestamp, is sent to OCSP servers and carries the timestamp The certification verification request of the digital certificate of train of mechanism, OCSP verify the digital certificate of the Time Stamping Authority system;
The OCSP servers are after all verifications of the digital certificate of the Time Stamping Authority system all pass through, to the application Server-side sends the qualified notice of verification, and the timestamp information is sent to the Time Stamping Authority system by the application service end System;
The Time Stamping Authority system verifies the timestamp information sent using server-side, after being verified, to described Application service end sending time stamp Information Authentication qualification notice;
After being verified of the timestamp, the secure data is utilized between the application service end and the user terminal Channel carries out data transmission.
2. the mobile terminal authentication method according to claim 1 based on WPKI and timestamp, which is characterized in that institute User terminal is stated to stab from Time Stamping Authority system acquisition time, including:
After the OCSP servers receive the certification verification request, obtains the unique mark of the WPKI digital certificates, has Whether the term of validity of effect phase, scaling option, WPKI certificates described in the OCSP server authentications is expired, verifies the WPKI certificates Whether issued by specified authentication center CA, whether unique mark, the scaling option for verifying the WPKI certificates are effective;
The user terminal generates digest value using digest algorithm to the data that needs upload, and digest value is followed timestamp application Specification is transferred to Time Stamping Authority system by the SSL safe data channels;The Time Stamping Authority system is to the user The digest value that terminal sends over is capped timestamp, and timestamp is signed with the digital certificate of timestamp train of mechanism, will Timestamp information after signature returns to user terminal.
3. the mobile terminal authentication method according to claim 1 based on WPKI and timestamp, it is characterised in that:
After the OCSP servers receive the certification verification request, obtains the unique mark of the WPKI digital certificates, has Whether the term of validity of effect phase, scaling option, WPKI certificates described in the OCSP server authentications is expired, verifies the WPKI certificates Whether issued by specified authentication center CA, whether unique mark, the scaling option for verifying the WPKI certificates are effective;
The OCSP servers send to the application service end and test after all verifications of the WPKI digital certificates all pass through Card qualified notice uses the WPKI certificates and the user after the application service termination receives the qualified notice of the verification The SSL escape ways for being used for transmission data are established between terminal.
4. the mobile terminal authentication method according to claim 1 based on WPKI and timestamp, it is characterised in that institute It states Time Stamping Authority system to verify the timestamp information sent using server-side, which includes whether timestamp is this TSA is signed and issued, can timestamp information sign test pass through, and the Time Stamping Authority system is all logical in all verifications of the timestamp information Later, to application service end sending time stamp Information Authentication qualification notice;The timestamp information all verifications not It is to stab the unqualified notice of Information Authentication to application service end sending time after all passing through.
5. the mobile terminal authentication method according to any one of claims 1 to 4 based on WPKI and timestamp, special Sign is, after being verified of the timestamp, the safety is utilized between the application service end and the user terminal Data channel carries out data transmission, including:
After the application service termination receives the qualified notice of timestamp information verification that the Time Stamping Authority system returns, judge The authentication of user terminal passes through, and receives the connection request of user terminal, passes through institute between user terminal and application service end SSL safe data channels are stated to be communicated;
After the application service termination receives the unqualified notice of timestamp information verification that the Time Stamping Authority system returns, sentence The authentication of the disconnected user terminal does not pass through, and refuses the connection request of the user terminal.
6. a kind of mobile terminal authentication system based on WPKI and timestamp, which is characterized in that including:User terminal is answered With server-side, Time Stamping Authority system and OCSP servers,
The user terminal, for from Time Stamping Authority system acquisition time stab, using Wireless Public Key Infrastructure WPKI with Safe data channel is established at application service end;
The application service end is asked for receiving the connection of WPKI digital certificates for the carrying user that the user terminal is sent It asks, sign on timestamp for receiving the timestamp that the user terminal is sent by the safe data channel and obtaining Time Stamping Authority system digital certificate;The application service end is by the OCSP servers to the WPKI digital certificates It is verified, after the WPKI digital certificate authentications pass through, the secure data established between user terminal and user service end is logical Road;The certificate of the Time Stamping Authority system is verified by the OCSP servers in the application service end, described After the certification authentication of Time Stamping Authority system passes through, the application service end is by the Time Stamping Authority system to the time Stamp is verified;After being verified of the timestamp between the user terminal using the safe data channel into Row data transmission;
The Time Stamping Authority system sends the application service end for being stabbed to the user terminal sending time The timestamp to come over is verified;The Time Stamping Authority system, the carrying specifically for receiving user terminal transmission are used The connection request of the Wireless Public Key Infrastructure WPKI digital certificates at family obtains the WPKI numbers card carried in the connection request Book sends the certification verification request for carrying the WPKI digital certificates to OCSP servers;The Time Stamping Authority system is used After receiving with the qualified notice of the verification, between the Time Stamping Authority system and the user terminal, using described WPKI certificates establish the SSL safe data channels for being used for transmission data;
The OCSP servers, the WPKI certificates for being sended over to the application service end and Time Stamping Authority system Digital certificate verified.
7. the mobile terminal authentication system according to claim 6 based on WPKI and timestamp, it is characterised in that:
The OCSP servers obtain the unique of the WPKI digital certificates after receiving the certification verification request Mark, the term of validity, scaling option, whether the term of validity for verifying the WPKI certificates expired, verify the WPKI certificates whether by Specified authentication center CA is issued, and whether unique mark, the scaling option for verifying the WPKI certificates are effective;In WPKI numbers After all verifications of certificate all pass through, the qualified notice of verification is sent to the Time Stamping Authority system;
The user terminal abides by digest value specifically for generating digest value to the data that needs upload using digest algorithm It follows timestamp application specification and Time Stamping Authority system is transferred to by the SSL safe data channels;
The Time Stamping Authority system is capped timestamp specifically for the digest value sended over to the user terminal, will Timestamp is signed with the digital certificate of timestamp train of mechanism, and the timestamp information after signature is returned to user terminal.
8. the mobile terminal authentication system according to claim 6 based on WPKI and timestamp, it is characterised in that:
The OCSP servers obtain the WPKI digital certificates after receiving the request of WPKI digital certificate authentications Unique mark, the term of validity, scaling option, whether the term of validity for verifying the WPKI certificates is expired, and verifying the WPKI certificates is No to be issued by specified authentication center CA, whether unique mark, the scaling option for verifying the WPKI certificates are effective;In the WPKI After all verifications of digital certificate all pass through, the qualified notice of verification is sent to the application service end;
The application service end uses the WPKI certificates and the use after receiving the qualified notice of the verification The Secure Socket Layer SSL escape ways for being used for transmission data are established between the terminal of family.
9. the mobile terminal authentication system according to claim 6 based on WPKI and timestamp, it is characterised in that:
Timestamp information of the Time Stamping Authority system for after the signature to being sent using server-side is verified, this is tested Card include whether timestamp is that this TSA is signed and issued, can timestamp information sign test pass through, the timestamp information it is all verify all By rear, to application service end sending time stamp Information Authentication qualification notice;In all verifications of the timestamp information It is not to stab the unqualified notice of Information Authentication to application service end sending time after all passing through.
10. according to mobile terminal authentication system of claim 6 to 9 any one of them based on WPKI and timestamp, It is characterized in that:
Qualification is verified in the application service end specifically for receiving the timestamp information that the Time Stamping Authority system returns After notice, judge that the authentication of user terminal passes through, receives the connection request of user terminal, user terminal and application service end Between communicated by SSL safe data channels;
After receiving the unqualified notice of timestamp information verification that the Time Stamping Authority system returns, the user terminal is judged Authentication do not pass through, refuse the connection request of the user terminal.
CN201310496089.0A 2013-10-21 2013-10-21 Mobile terminal authentication method and system based on WPKI and timestamp Active CN104579662B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310496089.0A CN104579662B (en) 2013-10-21 2013-10-21 Mobile terminal authentication method and system based on WPKI and timestamp

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310496089.0A CN104579662B (en) 2013-10-21 2013-10-21 Mobile terminal authentication method and system based on WPKI and timestamp

Publications (2)

Publication Number Publication Date
CN104579662A CN104579662A (en) 2015-04-29
CN104579662B true CN104579662B (en) 2018-11-13

Family

ID=53094946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310496089.0A Active CN104579662B (en) 2013-10-21 2013-10-21 Mobile terminal authentication method and system based on WPKI and timestamp

Country Status (1)

Country Link
CN (1) CN104579662B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653940B (en) * 2015-07-14 2019-02-26 哈尔滨安天科技股份有限公司 A kind of method and system based on PE file analysis attacker source
US10243955B2 (en) * 2016-07-14 2019-03-26 GM Global Technology Operations LLC Securely establishing time values at connected devices
CN109474432B (en) 2017-09-07 2021-11-02 西安西电捷通无线网络通信股份有限公司 Digital certificate management method and device
CN109347897B (en) * 2018-08-16 2019-11-26 朱小军 A kind of center architected bionic data Transmission system
CN109492371B (en) * 2018-10-26 2021-01-26 中国联合网络通信集团有限公司 Digital certificate null sending method and device
CN111274031B (en) * 2020-01-16 2023-07-25 国家电网有限公司信息通信分公司 Method and device for dynamic migration authentication of end-cloud cooperative edge service
CN112395620B (en) * 2020-11-19 2024-01-30 四川泰富地面北斗科技股份有限公司 Trusted time stamp implementation method based on trusted time

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1615632A (en) * 2002-01-12 2005-05-11 英特尔公司 Mechanism for supporting wired and wireless methods for client and server side authentication

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7114175B2 (en) * 2001-08-03 2006-09-26 Nokia Corporation System and method for managing network service access and enrollment
FR2912578B1 (en) * 2007-02-13 2009-05-22 Airbus France Sas METHOD OF AUTHENTICATING AN ELECTRONIC DOCUMENT AND METHOD OF VERIFYING A DOCUMENT THUS AUTHENTICATED.
CN100566460C (en) * 2007-07-13 2009-12-02 北京工业大学 Utilize authentication and cryptographic key negotiation method between the mobile entity that short message realizes
US8635442B2 (en) * 2009-04-28 2014-01-21 Adobe Systems Incorporated System and method for long-term digital signature verification utilizing light weight digital signatures
CN101969427A (en) * 2010-08-24 2011-02-09 吉林大学 Set of core equipment for realizing gas station online payment system based on WPKI (Wireless Public Key Infrastructure)

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1615632A (en) * 2002-01-12 2005-05-11 英特尔公司 Mechanism for supporting wired and wireless methods for client and server side authentication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《电力时间戳系统的设计》;余勇 等;《电力信息化》;20040930;第2卷(第9期);第38-40页 *
《证书撤销方法研究》;李昊 等;《计算机与信息技术》;20060630;第18-20页 *

Also Published As

Publication number Publication date
CN104579662A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN104579662B (en) Mobile terminal authentication method and system based on WPKI and timestamp
CN107171794B (en) A kind of electronic document signature method based on block chain and intelligent contract
KR101814300B1 (en) Securing method for lawful interception
CN106256111B (en) Method for verifying message
US8107623B2 (en) Method for verifying a first identity and a second identity of an entity
CN109347635A (en) A kind of Internet of Things security certification system and authentication method based on national secret algorithm
CN102722931B (en) Voting system and voting method based on intelligent mobile communication devices
US7610056B2 (en) Method and system for phone-number discovery and phone-number authentication for mobile communications devices
CN100566460C (en) Utilize authentication and cryptographic key negotiation method between the mobile entity that short message realizes
CN102546532B (en) Capacity calling method, request unit, platform and system
CN109189962A (en) A kind of license service realization system based on block chain
CN106899410A (en) A kind of method and device of equipment identities certification
CN109194641A (en) A kind of transmission method of business datum, device, equipment and storage medium
CN105578461A (en) Method and device for establishing communication mobile terminals, communication answering method and device, communication calling method and devices, and system
CN101547095A (en) Application service management system and management method based on digital certificate
CN109345245A (en) Short-message verification method, equipment, network and storage medium based on block chain
CN110365662B (en) Business approval method and device
CN101163003A (en) System and method for authenticating network for terminal when SIM card use UMTS terminal and UMTS system
CN110475249A (en) A kind of authentication method, relevant device and system
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN112035896B (en) Electronic contract evidence-storing system based on transaction mode
CN115345618B (en) Block chain transaction verification method and system based on mixed quantum digital signature
CN106713236A (en) End-to-end identity authentication and encryption method based on CPK identifier authentication
CN108599944A (en) A kind of identifying code short message transparent encryption method based on handset identities
CN102546523B (en) Security certification method, system and equipment for internet access

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant