CN104734856B - A kind of command identifying method of anti-server information leakage - Google Patents

A kind of command identifying method of anti-server information leakage Download PDF

Info

Publication number
CN104734856B
CN104734856B CN201510098392.4A CN201510098392A CN104734856B CN 104734856 B CN104734856 B CN 104734856B CN 201510098392 A CN201510098392 A CN 201510098392A CN 104734856 B CN104734856 B CN 104734856B
Authority
CN
China
Prior art keywords
user
ttp
information
application server
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510098392.4A
Other languages
Chinese (zh)
Other versions
CN104734856A (en
Inventor
朱文涛
潘适然
杨玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Data Assurance and Communication Security Research Center of CAS
Original Assignee
Institute of Information Engineering of CAS
Data Assurance and Communication Security Research Center of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS, Data Assurance and Communication Security Research Center of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201510098392.4A priority Critical patent/CN104734856B/en
Publication of CN104734856A publication Critical patent/CN104734856A/en
Application granted granted Critical
Publication of CN104734856B publication Critical patent/CN104734856B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of command identifying method of anti-server information leakage.This method is:1) user by selected application identifier AI, account name user and logs in password pw and is sent to trusted third party TTP by escape way;2) TTP generates a secret value x according to its key k and (AI, user, pw), and (user, x) then is sent into the application server that AI is specified;3) (user, x) information of the application server for storage user, and the information that succeeds in registration is returned to by TTP;4) when logging in, (AI, user, the pw ') of input is sent to the TTP by secure network channel and is calculated a secret value x ' by client, and should (user, x ') be sent to the application server that AI is specified and be authenticated;If certification success, return log in successful message.The present invention protects the safety for logging in password, has wide applicability.

Description

A kind of command identifying method of anti-server information leakage
Technical field
The invention belongs to network technique field, more particularly to a kind of command identifying method of anti-server information leakage.
Background technology
With the continuous development of network technology, the application system based on the network platform is more and more.These systems are generally adopted The authenticity of the user identity of server is logged on the guarantee of various identity identifying technologies, so as to ensure the safety of system and data And authorize the legitimate rights and interests of visitor.
At present, authentication is mainly realized by one or a combination set of following three Basic Ways:Knowledge based engineering body Part certification, the authentication based on biological property and the authentication based on token device such as smart card.Wherein knowledge based Authentication be widely used because simple and convenient.
Password authentication is as typical Knowledge based engineering identity identifying technology, it has also become the preferred authenticating party of many systems Formula.In password authentication mode, server end has user name and treated password, and user only inputs effective user Name and matching password could pass through certification.But there is a variety of causes that the information of server end can be caused to let out in reality Dew, so as to cause the password by conversion also to reveal.Because password space is smaller, therefore opponent is easily by offline dictionary attack Etc. mode password is logged in obtain user.
For avoid because user password space is smaller and caused by password be subject to offline dictionary attack the problem of, it is some to have The system of greater security requirement also add other authentication means, user need to be by a variety of in addition to using password authentication Certification could be completed to log in.This authentication techniques are referred to as dual factor anthentication.Dual factor anthentication may need token device such as intelligence Card logs in required key to store and handle user.Because key space is very big, even if opponent obtains server end storage Information also be difficult to by modes such as offline dictionary attacks come breaking cryptographic keys.However, to increase user extra for above-mentioned token device Expenditure, and be only supported in the equipment of special interface and use, while need to carry with just can logging in online account by user.This Outside, there is also the risk lost and illegally obtained by opponent for the token device that user holds.
The content of the invention
For solve the problems, such as due to user password space is smaller and caused by password be subject to offline dictionary attack, the present invention On the premise of without increasing token device such as smart card from user terminal, propose that a kind of password of anti-server information leakage is recognized Card method.
The present invention relates to three kinds of network entities:User, trusted third party (Trusted Third Party, TTP) and application Server (Application Server, AS).Wherein user holds network account name and corresponding entry password, TTP profits Log-on message with its key using special algorithm processing user, and application server safeguards the account name of user and logs in password The database of relevant information, and the log on request of user is authenticated accordingly.
The technical solution adopted by the present invention is as follows:
A kind of command identifying method of anti-server information leakage, its step are:User's registration is completed by TTP and stepped on The application of land process completes registration on TTP, i.e. TTP knows the mark and its corresponding server or domain name of each application Deng.
First, registration process
1) user by the application identifier AI for wishing register account number and the account name user oneself selected and logs in password Pw is sent to TTP by secured fashion;
2) inputs of (AI, user, the pw) that TTP is sent with its key k and user as special algorithm f, is calculated one Individual secret x, and (user, x) is sent to the application server that AI is specified;
3) application server checking user profile legitimacy (such as whether be registered according to user name or in accordance with The requirements such as specification judge the legitimacy of user), (user, x) is stored if legal, and return and register to user by TTP The information of work(.
2nd, landfall process
1) the application identifier AI and note that user wishes to log in by local client (such as browser login page) input Volume and logs in password pw ' at account name user accordingly;
2) (AI, user, the pw ') that user inputs is sent to TTP by local client by secure network channel, TTP with X ', and the application specified based on x ' and AI is calculated as special algorithm f input in its key k and (AI, user, pw ') Server performs authentication protocol;
If 3) certification success, server is returned to user by TTP and logs in successful message, and user can complete system Log in.
Further, described secure network channel need to use the communication protocol of safety.
Further, the key k of the TTP comes from sufficiently large key space, such as length is not less than 128 bits.
Further, the special algorithm f is security algorithm, i.e., is only computationally from algorithm output Backstepping input It is infeasible, such as SHA-256 algorithms or AES encryption algorithm.
Further, the TTP, which has been played, is changed into the user password for coming from smaller space from larger space Secret x and storage application identifier AI and the incidence relation of corresponding server effect.
Further, unique user can by same TTP on multiple different application servers register account number, also may be used To apply register account number in the multiple of same server;(AI, user) unique mark is which applies which upper account.
Further, the x of server end storage can be the direct result that TTP is calculated, or x is encoded or turns Result after alternatively.
Further, the authentication protocol between the TTP and server is initiated and completed by server, can be directly to verify X ' and the simple form whether consistent x being locally stored, or the challenge responses based on secret x initiated by server end are assisted View etc., for example use such as MAP1, DH-EKE, EVE1 etc. the authentication method of the authentication protocol based on wildcard.
Compared with prior art, the present invention proposes a kind of command identifying method of anti-server information leakage, and its is beneficial Effect is:
A) present invention makes user not increase to user and appoint without that just can complete authentication in locally increase token device What extra expense (expense introduced in such as dual factor anthentication technology by token device), even and if opponent obtained by certain means Obtaining the secret information of server end storage can not still guess that user's logs in password, protects the safety for logging in password;This hair Ming Zhong trusted third party has played the work that the user password for coming from smaller space is changed into the secret x from larger space With.
B) proposed by the present invention is a kind of general framework, therefore has wide applicability, the enterprise network that is particularly suitable for use in, campus The network environment that the multiservers such as net are managed by same authoritative institution.
Brief description of the drawings
Fig. 1 is the exemplary plot of user's registration process in certain application system in the present invention.
Fig. 2 is the exemplary plot of user's landfall process in certain application system in the present invention.
Embodiment
In order that the object, technical solutions and advantages of the present invention become apparent from understanding, below with reference to specific embodiment, and The present invention is described in detail referring to the drawings.
Registered in the present embodiment with user by TTP in an application system (it is assumed that carrying out registration on TTP) And log in and be illustrated by TTP completions system, wherein TTP key k length is 128 bits, and the f used calculates for SHA-256 Method, idiographic flow are as follows:
First, registration process
As shown in figure 1, registration process of the user in certain application system is as follows:
1) user by the application identifier AI for wishing register account number and the account name user oneself selected and logs in password Pw is sent to TTP by secure network channel;
2) inputs of (AI, user, the pw) that TTP is sent with its key k and user as f, is calculated a secret x =f (AI, user, pw, k), and (user, x) is sent to destination server;
3) legitimacy of server authentication user, (user, x) is stored if legal, and return the information that succeeds in registration to TTP;
4) information to succeed in registration is returned to user by TTP, so far user registration success.
2nd, landfall process
As shown in Fig. 2 landfall process of the user in certain application system is as follows:
1) application system name AI and the login account name that user wishes to log in local client (or browser) input User and log in password pw ' accordingly;
2) (AI, user, the pw ') that local client (or browser) inputs user is sent to by secure network channel X '=f (AI, user, pw ', k) is calculated using the above- mentioned information received and its key k as f input by TTP, TTP, and Will (user, x ') it is sent to destination server;
3) destination server receives (user, the x ') of TTP transmissions, is found in the user's registration information being locally stored Entry corresponding to user (user, x), if the entry is implicitly present in and corresponding x is equal with x ', return logs in successful information To TTP;
4) TTP will log in successful information and return to user, and so far user logs in success.
In summary, the present invention proposes a kind of command identifying method of anti-server information leakage so that Yong Huwu Authentication just need to can be completed in locally increase token device, any extra expense will not be increased to user, even and if opponent The information of server end storage is obtained by certain means can not still guess that user's logs in password, protects and logs in password Safety.Simultaneously proposed by the present invention is a kind of general framework, therefore has wide applicability, the enterprise network that is particularly suitable for use in, campus The network environment that the multiservers such as net are managed by same authoritative institution.
Embodiment described above is only to better illustrate the purpose of the present invention, technical scheme and beneficial effect.It should be understood that , the foregoing is only the present invention specific embodiment, be not intended to limit the invention, it is all the present invention spirit and Any modification, equivalent substitution and improvements done within principle etc., should be included in the scope of the protection.

Claims (9)

1. a kind of command identifying method of anti-server information leakage, its step are:
1) user by selected application identifier AI, account name user and logs in password pw and is sent to credible by escape way Tripartite TTP;
2) information (AI, user, pw) that trusted third party TTP is sent according to its key k and the user generates a secret value x, Then (user, x) is sent to the application server that application identifier AI specifies;
3) application server is verified to the legitimacy of the user profile, stored if being verified the user (user, X) information, and the information to succeed in registration is returned to the user by trusted third party TTP;
4) when user includes application identifier AI, account name user and the log-on message for logging in password pw ' in client input Afterwards, (AI, user, the pw ') that the client currently inputs the user is sent to trusted third party TTP by escape way, A secret value x ' is calculated according to its key k and the information being currently received (AI, user, pw ') in trusted third party TTP, And should (user, x ') be sent to the application server that application identifier AI is specified and be authenticated;If certification success, should answer Returned with server by the trusted third party to user and log in successful message.
2. the method as described in claim 1, it is characterised in that the method that the application server is authenticated is:Using clothes Business device is according to the information (user, x ') received, the entry corresponding to searching user in the user's registration information being locally stored (user, x), if the entry is implicitly present in and corresponding x is equal with x ', certification success.
3. method as claimed in claim 2, it is characterised in that the application server is encoded or changed to secret value x After preserve;The application server to secret value x ' carry out corresponding encoded or conversion after with it is corresponding encoded or conversion after X is compared, if equal, certification success.
4. the method as described in claim 1 or 2 or 3, it is characterised in that the application server uses to be compiled with x or its process Code or the x after changing are authenticated into the authentication protocol of wildcard to user.
5. the method as described in claim 1 or 2 or 3, it is characterised in that the user passes through same trusted third party TTP The register account number on multiple different application servers.
6. the method as described in claim 1 or 2 or 3, it is characterised in that the user is multiple same application server Using upper register account number;The application server is applied according to corresponding to (AI, user) determines each register account number.
7. the method as described in claim 1 or 2 or 3, it is characterised in that the key k comes from close not less than 128 bits Key space.
8. the method as described in claim 1, it is characterised in that the trusted third party is according to its key k and is currently received Information (AI, user, pw ') the secret value x ' is calculated using security algorithm.
9. method as claimed in claim 8, it is characterised in that the security algorithm is that SHA-224 algorithms or SHA-256 are calculated Method.
CN201510098392.4A 2015-03-05 2015-03-05 A kind of command identifying method of anti-server information leakage Expired - Fee Related CN104734856B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510098392.4A CN104734856B (en) 2015-03-05 2015-03-05 A kind of command identifying method of anti-server information leakage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510098392.4A CN104734856B (en) 2015-03-05 2015-03-05 A kind of command identifying method of anti-server information leakage

Publications (2)

Publication Number Publication Date
CN104734856A CN104734856A (en) 2015-06-24
CN104734856B true CN104734856B (en) 2017-12-26

Family

ID=53458317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510098392.4A Expired - Fee Related CN104734856B (en) 2015-03-05 2015-03-05 A kind of command identifying method of anti-server information leakage

Country Status (1)

Country Link
CN (1) CN104734856B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897730A (en) * 2016-05-12 2016-08-24 广西尊达电子商务有限公司 User name and password information encryption and verification method
CN106921663B (en) * 2017-03-03 2020-04-10 浙江智贝信息科技有限公司 Identity continuous authentication system and method based on intelligent terminal software/intelligent terminal
CN109711173B (en) * 2019-02-03 2020-10-09 北京大学 Password file leakage detection method
CN111314090B (en) * 2020-03-25 2021-03-26 北京航空航天大学 Secure multi-cloud password management method based on bit level threshold
CN112671786B (en) * 2020-12-29 2022-06-28 科来网络技术股份有限公司 System and method for safe login based on third party authentication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304318A (en) * 2008-07-04 2008-11-12 任少华 Safe network authentication system and method
CN102195957A (en) * 2010-03-19 2011-09-21 华为技术有限公司 Resource sharing method, device and system
CN102739708A (en) * 2011-04-07 2012-10-17 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7694136B2 (en) * 2003-02-10 2010-04-06 International Business Machines Corporation Method for distributing and authenticating public keys using hashed password protection
AU2013243768B2 (en) * 2012-04-01 2017-12-21 Payfone, Inc. Secure authentication in a multi-party system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304318A (en) * 2008-07-04 2008-11-12 任少华 Safe network authentication system and method
CN102195957A (en) * 2010-03-19 2011-09-21 华为技术有限公司 Resource sharing method, device and system
CN102739708A (en) * 2011-04-07 2012-10-17 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《基于身份的认证协议的理论及应用研究》;曹雪菲;《中国博士学位论文全文数据库信息科技辑》;20090715(第07期);正文第3-6章 *

Also Published As

Publication number Publication date
CN104734856A (en) 2015-06-24

Similar Documents

Publication Publication Date Title
TWI436627B (en) Method and apparatus for authenticatiing online transactions using a browser
CN104468115B (en) information system access authentication method and device
Kaul et al. Security enhancement of an improved remote user authentication scheme with key agreement
Ali et al. An efficient three factor–based authentication scheme in multiserver environment using ECC
CN104734856B (en) A kind of command identifying method of anti-server information leakage
CN105827573B (en) System, method and the relevant apparatus of internet of things equipment strong authentication
JP2009508189A (en) Extended one-time password method and apparatus
CN105430014B (en) A kind of single-point logging method and its system
CN108400962B (en) Authentication and key agreement method under multi-server architecture
Mirsaraei et al. A secure three-factor authentication scheme for IoT environments
US20170085381A1 (en) Persistent authentication system incorporating one time pass codes
US9954853B2 (en) Network security
US20150328119A1 (en) Method of treating hair
Kim et al. A design of one-time password mechanism using public key infrastructure
Alqubaisi et al. Should we rush to implement password-less single factor FIDO2 based authentication?
CN107248997A (en) Authentication method based on smart card under environment of multi-server
CN106657125A (en) Flow control mechanism suitable for online identity authentication
CN112383401B (en) User name generation method and system for providing identity authentication service
US20090319778A1 (en) User authentication system and method without password
Alemu et al. Fingerprint based authentication architecture for accessing multiple cloud computing services using single user credential in IOT environments
Aiash A formal analysis of authentication protocols for mobile devices in next generation networks
Kiennert et al. Authentication systems
CN106877996A (en) User in PKI domains accesses the authentication key agreement method of the resource in IBC domains
KR101962349B1 (en) Consolidated Authentication Method based on Certificate
KR100959201B1 (en) Smartcard-Based Remote User Authentication Method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171226

Termination date: 20190305