CN114760027A - Identity authentication method and device - Google Patents
Identity authentication method and device Download PDFInfo
- Publication number
- CN114760027A CN114760027A CN202011569180.7A CN202011569180A CN114760027A CN 114760027 A CN114760027 A CN 114760027A CN 202011569180 A CN202011569180 A CN 202011569180A CN 114760027 A CN114760027 A CN 114760027A
- Authority
- CN
- China
- Prior art keywords
- authentication
- message
- access controller
- identity
- authentication server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 88
- 238000012795 verification Methods 0.000 claims abstract description 232
- 230000004044 response Effects 0.000 claims abstract description 118
- 238000004422 calculation algorithm Methods 0.000 claims description 123
- 238000004364 calculation method Methods 0.000 claims description 84
- 238000009795 derivation Methods 0.000 claims description 26
- 230000002457 bidirectional effect Effects 0.000 abstract description 9
- 230000008569 process Effects 0.000 description 21
- 238000010586 diagram Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000006386 neutralization reaction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0414—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application discloses an identity authentication method, which comprises the following steps: an authentication access controller AAC receives an identity ciphertext message sent by a request device REQ, AAC sends a first authentication request message to a trusted first authentication server, the first authentication request message comprises a digital certificate of REQ and an identity authentication code of AAC, the first authentication server verifies the identity authentication code of AAC, a trusted second authentication server of REQ verifies the validity of the digital certificate of REQ, AAC receives a first authentication response message which is sent by the first authentication server and carries the verification results of AAC and REQ, and AAC and REQ respectively obtain the verification results of an opposite entity to realize bidirectional identity authentication; and the entity sensitive information is transmitted between the REQ and the AAC in a ciphertext mode, so that the safety of the entity is guaranteed.
Description
Technical Field
The present application relates to the field of network communication security technologies, and in particular, to an identity authentication method and apparatus.
Background
At present, a communication network usually requires bidirectional identity authentication between a user and a network access point to ensure that only a legitimate user can communicate with a legitimate network, and in an existing entity authentication scheme, the identity of an entity is either uniformly made of a digital certificate or in a form of a pre-shared key between entities, but in some scenarios in practical application, a situation that one end of the entity uses the digital certificate as an identity credential and the other end of the entity uses the pre-shared key as an identity credential is encountered, which presents a challenge to an entity identity authentication mechanism.
In addition, in the process of identity authentication, identity information of an entity is directly exposed, and sometimes, the identity information of the entity contains a plurality of private or sensitive information of the entity, such as an identity card number, a home address, bank card information and the like.
Disclosure of Invention
In order to solve the above technical problem, the present application provides an identity authentication method and apparatus, which implement entity bidirectional identity authentication and entity identity protection under the condition that a requesting device adopts a digital certificate and an authentication access controller adopts a pre-shared key as an identity credential.
In view of the above, a first aspect of the present application provides an identity authentication method, including:
an authentication access controller receives an identity ciphertext message sent by a request device, wherein the identity ciphertext message comprises an identity information ciphertext of the request device, and the identity information ciphertext of the request device is generated by encrypting encrypted data including a digital certificate of the request device by using a message encryption key;
the authentication access controller decrypts the identity information ciphertext of the request device by using the message encryption key to obtain a digital certificate of the request device, and sends a first authentication request message to a trusted first authentication server, wherein the first authentication request message comprises the digital certificate of the request device and an identity authentication code of the authentication access controller; the identity authentication code of the authentication access controller is generated by the authentication access controller through calculation on information including the digital certificate of the request equipment by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server;
the authentication access controller receives a first authentication response message sent by the first authentication server, wherein the first authentication response message comprises first authentication result information, a first digital signature of a second authentication server trusted by the request device, second authentication result information and a first message authentication code of the first authentication server; the first authentication result information comprises a first verification result of an identity authentication code of the authentication access controller, the first digital signature is a digital signature generated by the second authentication server through calculation on signature data comprising the first authentication result information, the second authentication result information comprises a second verification result of a digital certificate of the request device, and a first message authentication code of the first authentication server is generated by the first authentication server through calculation on information comprising the second authentication result information by using a pre-shared key with the authentication access controller and a cryptographic algorithm agreed with the authentication access controller;
the authentication access controller verifies a first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server, and if the verification is passed, the authentication access controller determines an identity authentication result of the request device according to a second verification result in the second authentication result information; when the authentication access controller determines that the identity authentication result of the request equipment is legal, a third authentication response message is sent to the request equipment; or,
the authentication access controller verifies a first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server, and if the verification is passed, the authentication access controller sends a third authentication response message to the request device and determines an identity authentication result of the request device according to a second verification result in the second authentication result information; or,
the authentication access controller verifies a first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server; if the first message authentication code of the first authentication server passes the authentication, the authentication access controller determines the identity authentication result of the request device according to a second authentication result in the second authentication result information; the authentication access controller sends a third authentication response message to the requesting device;
wherein the third authentication response message includes an authentication result information ciphertext generated by the authentication access controller encrypting, with the message encryption key, encrypted data including the first authentication result information and the first digital signature;
and after receiving the third authentication response message, the requesting device decrypts the authentication result information ciphertext by using the message encryption key to obtain the first authentication result information and the first digital signature, verifies the first digital signature by using the public key of the second authentication server, and determines the identity authentication result of the authentication access controller according to the first verification result in the first authentication result information if the verification is passed.
A second aspect of the present application provides a requesting device, including:
a sending module, configured to send an identity ciphertext message to an authentication access controller, where the identity ciphertext message includes an identity information ciphertext of the requesting device, and the identity information ciphertext of the requesting device is generated by encrypting, by the requesting device, encrypted data that includes a digital certificate of the requesting device by using a message encryption key;
a receiving module, configured to receive a third authentication response message sent by the authentication access controller, where the third authentication response message includes an authentication result information ciphertext generated by the authentication access controller encrypting, by using the message encryption key, encrypted data that includes the first authentication result information and the first digital signature; the first authentication result information comprises a first verification result of an identity authentication code of the authentication access controller, and the first digital signature is a digital signature generated by a second authentication server through calculation on signature data comprising the first authentication result information;
the decryption module is used for decrypting the authentication result information ciphertext by using the message encryption key to obtain the first authentication result information and the first digital signature;
the verification module is used for verifying the first digital signature by utilizing the public key of the second authentication server;
and the determining module is used for determining the identity authentication result of the authentication access controller according to the first authentication result in the first authentication result information if the authentication is passed.
A third aspect of the present application provides an authentication access controller, comprising:
a receiving module, configured to receive an identity ciphertext message sent by a requesting device, where the identity ciphertext message includes an identity information ciphertext of the requesting device, and the identity information ciphertext of the requesting device is generated by encrypting, by the requesting device, encrypted data that includes a digital certificate of the requesting device by using a message encryption key;
the decryption module is used for decrypting the identity information ciphertext of the request equipment by using the message encryption key to obtain the digital certificate of the request equipment;
a sending module, configured to send a first authentication request message to a first authentication server trusted by the authentication access controller, where the first authentication request message includes a digital certificate of the requesting device and an identity authentication code of the authentication access controller; the identity authentication code of the authentication access controller is generated by the authentication access controller through calculation of information including the digital certificate of the request equipment by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server;
the receiving module is further configured to receive a first authentication response message sent by the first authentication server, where the first authentication response message includes first authentication result information, a first digital signature of a second authentication server trusted by the requesting device, second authentication result information, and a first message authentication code of the first authentication server; the first authentication result information comprises a first verification result of an identity authentication code of the authentication access controller, the first digital signature is a digital signature generated by the second authentication server through calculation on signature data comprising the first authentication result information, the second authentication result information comprises a second verification result of a digital certificate of the request device, and a first message authentication code of the first authentication server is generated by the first authentication server through calculation on information comprising the second authentication result information by using a pre-shared key with the authentication access controller and a cryptographic algorithm agreed with the authentication access controller;
a verification module, configured to verify a first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and using a cryptographic algorithm agreed with the first authentication server; if the verification is passed, the determining module determines the identity authentication result of the request equipment according to a second verification result in the second authentication result information; when the determining module determines that the identity authentication result of the requesting device is legal, the sending module sends a third authentication response message to the requesting device; or,
the authentication module is used for verifying a first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server, and if the authentication is passed, the sending module sends a third authentication response message to the request device and the determining module determines the identity authentication result of the request device according to a second authentication result in the second authentication result information; or,
a first message authentication code for verifying the first authentication server using a cryptographic algorithm agreed with the first authentication server using a pre-shared key with the first authentication server; if the first message authentication code of the first authentication server passes the authentication, the determining module determines the identity authentication result of the requesting device according to a second authentication result in the second authentication result information; the sending module sends a third authentication response message to the requesting device;
wherein the third authentication response message includes an authentication result information ciphertext generated by the authentication access controller encrypting, with the message encryption key, encrypted data including the first authentication result information and the first digital signature.
A fourth aspect of the present application provides a first authentication server, comprising:
a receiving module, configured to receive a first authentication request message sent by an authentication access controller, where the first authentication request message includes a digital certificate of a requesting device and an identity authentication code of the authentication access controller; the identity authentication code of the authentication access controller is generated by the authentication access controller through calculation on information including the digital certificate of the request equipment by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server;
a sending module, configured to send a first authentication response message to the authentication access controller, where the first authentication response message includes first authentication result information, a first digital signature of a second authentication server, second authentication result information, and a first message authentication code of the first authentication server; the first authentication result information includes a first verification result of an identity authentication code of the authentication access controller, the first digital signature is a digital signature generated by the second authentication server through calculation of signature data including the first authentication result information, the second authentication result information includes a second verification result of a digital certificate of the requesting device, and the first message authentication code of the first authentication server is generated by the first authentication server through calculation of information including the second authentication result information through a pre-shared key with the authentication access controller through a cryptographic algorithm agreed with the authentication access controller.
A fifth aspect of the present application provides a second authentication server comprising:
a receiving module, configured to receive a second authentication request message sent by the first authentication server, where the second authentication request message includes the first authentication result information, the digital certificate of the requesting device, and the second digital signature, or the second authentication request message includes the first authentication result information, the digital certificate of the requesting device, and the second message authentication code; the second digital signature is generated by the first authentication server through calculation of signature data including the first authentication result information and the digital certificate of the requesting device, or the second message authentication code is generated by the first authentication server through calculation of information including the first authentication result information and the digital certificate of the requesting device through a pre-shared key with the second authentication server by using a cryptographic algorithm agreed with the second authentication server;
a verification module, configured to verify the second digital signature using a public key of the first authentication server or verify the second message authentication code using a cryptographic algorithm agreed with the first authentication server using a pre-shared key of the first authentication server;
a generating module, configured to perform validity verification on the digital certificate of the requesting device to obtain a second verification result if the verification passes, generate second authentication result information according to information including the second verification result, calculate signature data including the first authentication result information to generate the first digital signature, calculate signature data including the second authentication result information to generate a third digital signature, or calculate information including the second authentication result information to generate a third message authentication code by using a cryptographic algorithm agreed with the first authentication server by using a pre-shared key of the first authentication server;
a sending module, configured to send a second authentication response message to the first authentication server, where the second authentication response message includes the first authentication result information, the first digital signature, the second authentication result information, and the third digital signature, or the second authentication response message includes the first authentication result information, the first digital signature, the second authentication result information, and the third message authentication code.
In the process of identity authentication, the request equipment firstly sends an identity ciphertext message to the authentication access controller, wherein the identity ciphertext message comprises an identity information ciphertext generated by the request equipment by encrypting encrypted data including the digital certificate of the request equipment by using a message encryption key; the authentication access controller decrypts the identity information ciphertext by using the message encryption key to obtain a digital certificate of the request device, calculates information including the digital certificate of the request device by using a pre-shared key of a first authentication server trusted by the authentication access controller and an agreed cryptographic algorithm to generate an identity authentication code of the authentication access controller, sends the digital certificate of the request device and the identity authentication code of the authentication access controller to the first authentication server, verifies the legality of the digital certificate of the request device by using a second authentication server trusted by the request device, verifies the identity authentication code of the authentication access controller by using the first authentication server trusted by the authentication access controller, sends a first authentication response message to the authentication access controller after verification is completed, and the authentication access controller obtains a verification result of the request device from the first authentication response message, and the requesting equipment acquires the verification result of the authentication access controller from the third authentication response message sent by the authentication access controller to determine whether the identity of the authentication access controller is legal, so that the bidirectional identity authentication between the authentication access controller and the requesting equipment is realized, and a foundation is laid for ensuring that only a legal user can communicate with a legal network. And moreover, the identity information and/or the identity authentication result information of the entity are transmitted in a ciphertext mode, so that the safety of private information in the transmission process is guaranteed, and the identity protection of the entity is realized.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the description below are only some embodiments of the present application, and for those skilled in the art, other drawings may be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic diagram of an identity authentication method according to an embodiment of the present application;
fig. 2 is a schematic diagram of a method for requesting a device REQ and authenticating an AAC negotiation message encryption key of an access controller according to an embodiment of the present application;
fig. 3 is a schematic diagram of an identity authentication method provided in an embodiment of the present application, where "+" denotes an optional field or an optional operation;
fig. 4 is a schematic diagram of an identity authentication method provided in an embodiment of the present application, where "+" denotes an optional field or an optional operation;
fig. 5 is a block diagram illustrating a structure of a request device REQ according to an embodiment of the present disclosure;
fig. 6 is a block diagram of an architecture of an authentication access controller AAC according to an embodiment of the present application;
fig. 7 is a block diagram illustrating a structure of an AS-AAC server according to an embodiment of the present disclosure;
fig. 8 is a block diagram of a second authentication server AS-REQ according to an embodiment of the present disclosure.
Detailed Description
In a communication network, a requesting device may access a network through an Authentication access controller, and in order to ensure that the requesting device accessing the network belongs to a legitimate user and that the network accessed by the requesting device is a legitimate network, bidirectional Identity Authentication (MIA for short) needs to be performed between the Authentication access controller and the requesting device.
Taking the current wireless communication and mobile communication scenarios as examples, in a scenario where the requesting device accesses the wireless network through the authentication access controller, the requesting device may be a terminal device such as a mobile phone, a Personal Digital Assistant (PDA), a tablet computer, and the like, and the authentication access controller may be a network side device such as a wireless access point, a wireless router, and the like. Under the scene that the request device is accessed to the wired network through the authentication access controller, the request device can be terminal devices such as a desktop computer and a notebook computer, and the authentication access controller can be network side devices such as a switch or a router. In a scenario that the requesting device accesses a fourth/fifth Generation mobile communication technology (4 th/5th Generation mobile communication technology, abbreviated as 4G/5G) network through the authentication access controller, the requesting device may be a terminal device such as a mobile phone and a tablet computer, and the authentication access controller may be a network side device such as a base station. Of course, the method and the device are also applicable to various data communication scenes such as other wired networks, near field communication networks and the like.
However, in the existing entity authentication scheme, the identity credentials of the entity are either uniformly in the form of a digital certificate or a pre-shared key, and a simple and effective identity authentication mechanism is not proposed for the case that one end of the entity is used as the identity credentials and the other end of the entity is used as the identity credentials in practical application. And in the transmission process of the identity authentication message, the identity information of the entity is directly exposed, so that the security of the entity cannot be guaranteed.
In order to solve the above technical problem, an embodiment of the present application provides an identity authentication method, where a digital certificate is used for a requesting device, an authentication access controller uses an authentication method of pre-sharing a secret key, a first authentication server trusted by the authentication access controller verifies an identity authentication code of the authentication access controller to verify the identity validity of the authentication access controller to obtain a first verification result, a second authentication server trusted by the requesting device verifies the validity of the digital certificate of the requesting device to obtain a second verification result, and the requesting device and the authentication access controller determine whether an entity of an opposite party is legal according to the verification result of the entity of the opposite party, so as to implement bidirectional identity authentication between the authentication access controller and the requesting device, thereby laying a foundation for ensuring that only a legal user can communicate with a legal network. And the private information of the entity, such as the identity identification, the authentication result information and the like, is transmitted in a ciphertext mode, so that the security of the private information in the transmission process is ensured, and the identity protection of the entity is realized.
For convenience of introduction, in the embodiments of the present application, the identity Authentication method of the present application will be described by taking a request device (REQ), an Authentication Access Controller (AAC), and an Authentication Server (AS) AS examples.
Wherein, AAC trusted AS is called a first authentication server AS-AAC, and REQ trusted AS is called a second authentication server AS-REQ. The AS-REQ holds a digital certificate and a private key corresponding to the digital certificate, which are in accordance with ISO/IEC9594-8/ITU X.509, other standards or other technical systems, the AS-AAC can verify the identity validity of AAC, and the AS-REQ can verify the identity validity of REQ. The AS-AAC and the AS-REQ can be the same AS or different ASs, and when the AS-AAC and the AS-REQ are the same, namely the non-roaming condition exists; when the AS-AAC and the AS-REQ are different, namely in a roaming situation, a valid pre-shared key exists between the AS-AAC and the AS-REQ, or when the AS-AAC holds a digital certificate and a corresponding private key of the digital certificate, which are in accordance with ISO/IEC9594-8/ITU X.509, other standards or other technical systems, the AS-AAC and the AS-REQ know the digital certificate of each other or a public key in the digital certificate mutually.
The REQ may be an endpoint participating in an identity authentication process, establishes a connection with AAC, accesses a service provided by AAC, and accesses AS through AAC, and holds a digital certificate compliant with ISO/IEC9594-8/ITU x.509, other standards or other technical systems, and a corresponding private key of the digital certificate, and knows the digital certificate of AS-REQ or a public key in the digital certificate. AAC may be another endpoint participating in the authentication process, establishing a connection with, serving, and communicating with the REQ, and having direct access to AS-AAC with a valid pre-shared key between AAC and AS-AAC.
An identity authentication method provided in an embodiment of the present application is described below with reference to fig. 1, where the method includes:
s101, AAC receives the identity ciphertext message REQInit sent by REQ.
The REQInit includes identity information ciphertext EncData of REQREQ。EncDataREQIs that the REQ uses a message encryption key to adopt a symmetric encryption algorithm to a digital certificate Cert comprising the REQREQThe encrypted data inside is generated by encryption. The message encryption key may be obtained by negotiation between REQ and AAC, or may be pre-shared by REQ and AAC. The implementation of REQ and AAC negotiation messages encryption keys will be described later. In this application, an encrypted object is referred to as encrypted data.
S102, AAC sends a first authentication request message AACVeri to its trusted AS-AAC.
The AACVeri comprises CertREQAnd identity identifier MIC of AACAAC. Wherein, CertREQAAC uses message encryption key to adopt symmetric encryption algorithm to received EncDataREQThe result is obtained by decryption; MICAACIs pre-shared key K of AAC utilization and AS-AACAAC_ASAdopting a cryptographic algorithm pair agreed with AS-AAC to include the CertREQThe information inside is calculated and generated. As an example of the present application, the cryptographic algorithm agreed upon between AAC and AS-AAC may be a hash algorithm, AAC utilizing the KAAC_ASIn combination withMIC in AACVeriAACOther fields preceding a field, e.g. including the CertREQCarrying out hash operation on the information to obtain a hash value, wherein the hash value is used as an identity authentication code MIC of the AACAAC. In the present application, AAC employs the MICAACREQ employs the Cert as identity informationREQAs identity information.
It should be noted that, when AAC trusted AS-AAC and REQ trusted AS-REQ are the same authentication server, REQ and AAC trusted authentication server can be represented by AS-AAC (or AS-REQ, of course). In this case, the Cert is verified by AS-AAC (which may also be denoted AS AS-REQ)REQGet the second verification result ResREQUsing pre-shared key K with AACAAC_ASVerifying the MIC using a cryptographic algorithm agreed with AACAACObtain a first verification result ResAACAccording to the inclusion of the ResAACThe information inside generates the first identification result information PubAACAccording to the inclusion of the ResREQGenerates second authentication result information Pub from the included informationREQAnd use of said KAAC_ASUsing said cryptographic algorithm pair to include said PubREQInformation inside is calculated to generate first message authentication code MIC of AS-AACAS_AAC(first message authentication code MIC which may also be denoted AS AS-REQ)AS_REQ) To include said PubAACComputing the signature data to generate a first digital signature SigAS_AAC1(also denoted Sig)AS_REQ1) According to including said PubAACThe SigAS_AAC1(also denoted Sig)AS_REQ1) The PubREQAnd the MICAS_AAC(may also be denoted MIC)AS_REQ) The included information generates a first authentication response message ASVeri.
When AAC-trusted AS-AAC and REQ-trusted AS-REQ are two different authentication servers, in this case, pre-shared key K with AAC is utilized by AS-AACAAC_ASVerifying the MIC by adopting a cryptographic algorithm agreed with AACAACObtain a first verification result ResAACAccording to including ResAACIn whichInformation generation first authentication result information PubAACTo include said PubAACAnd the CertREQComputing the signature data to generate a second digital signature SigAS_AAC2And sending a second authentication request message AS-AACVeri to the AS-REQ, wherein the AS-AACVeri comprises the PubAACThe CertREQAnd said SigAS_AAC2. Therein, SigAS_AAC2Can be replaced by MICAS_AAC2,MICAS_AAC2The AS-AAC utilizes a pre-shared key of the AS-REQ, adopts a cryptographic algorithm agreed with the AS-REQ to the PubAACAnd said CertREQThe generated second message authentication code is calculated from the included information. The AS-REQ then verifies the Sig using the public key of the AS-AACAS_AAC2Or verifying the MIC by using a pre-shared key with the AS-AAC and adopting a cryptographic algorithm agreed with the AS-AACAS_AAC2After the verification is passed, the Cert is verifiedREQCarrying out validity verification to obtain a second verification result ResREQAccording to including ResREQGenerates second authentication result information Pub from the included informationREQTo include said PubAACThe signature data inside is calculated to generate a first digital signature SigAS_REQ1To include said PubREQComputing the signature data to generate a third digital signature SigAS_REQ3And sending a second authentication response message AS-REQVeri to AS-AAC, wherein the AS-REQVeri comprises the PubAACThe SigAS_REQ1The PubREQAnd said SigAS_REQ3. Therein, SigAS_REQ3Can be replaced by MICAS_REQ3,MICAS_REQ3The AS-REQ uses a pre-shared key with the AS-AAC, adopts a cryptographic algorithm agreed with the AS-AAC to include the PubREQThe generated third message authentication code is calculated from the included information. Then, AS-AAC verifies the Sig with the public key of AS-REQAS_REQ3Or verifying the MIC by using a pre-shared key with the AS-REQ and adopting a cryptographic algorithm agreed with the AS-REQAS_REQ3After verification is passed, AS-AAC utilizes pre-shared key K with AACAAC_ASAdopting a cryptographic algorithm pair agreed with AAC to include the PubREQThe information in the content is calculated to generate AS-AACA message authentication code MICAS_AACAnd according to inclusion of said PubAACThe SigAS_REQ1The PubREQAnd the MICAS_AACThe included information generates the first authentication response message ASVeri.
In the above process, the AS-AAC can be known in advance to have a valid pre-shared key K with AACAAC_ASAnd a cryptographic algorithm; in addition, AACVeri can also carry identity ID of AACAACThe AS-AAC can be based on IDAACDetermined to have a significant K between AACAAC_ASAnd cryptographic algorithms. AS-AAC is verifying the MICAACWhen using said KAAC_ASAdopting a cryptographic algorithm pair agreed with AAC to include MIC in AACVeriAACInformation of other preceding fields, e.g. including the CertREQInformation therein, locally computing to generate MICAACThen calculating MICAACWith received MICAACPerforming a comparison to complete the MICAACAnd (4) verifying.
S103, AAC receives a first authentication response message ASVeri sent by AS-AAC.
The ASVeri comprises first identification result information PubAACFirst digital signature Sig of AS-REQAS_REQ1And second authentication result information PubREQAnd first message authentication code MIC of AS-AACAS_AAC. Wherein said PubAACIncluding a first verification result ResAACThe SigAS_REQ1Is the AS-REQ pair including the PubAACThe generated digital signature is calculated by the signature data inside, and the PubREQIncluding a second verification result ResREQThe MIC ofAS_AACIs pre-shared key K of AS-AAC utilization and AACAAC_ASAdopting a cryptographic algorithm pair agreed with AAC to include the PubREQThe information inside is calculated and generated.
S104, verifying the MIC by using a pre-shared key of the AS-AAC and a cryptographic algorithm agreed with the AS-AACAS_AAC。
Wherein AAC utilizes a pre-shared key K with AS-AACAAC_ASBy reaction with AS-AAC agreed cryptographic algorithm pair comprising said PubREQWith information therein computed locally to generate MICAS_AACAnd calculating MICAS_AACWith received MICAS_AACPerforming a comparison to complete the MICAS_AACAnd (4) verifying.
S105, AAC according to the PubREQRes in (1)REQThe identity authentication result of the REQ is determined.
Due to ResREQCan reflect whether REQ is legal or not, therefore AAC can be based on PubREQRes in (1)REQIt is determined whether the REQ is legitimate.
S106, AAC sends a third authentication response message AACAuth to REQ.
The AACAuth comprises an authentication result information ciphertext EncDataAAC. Wherein, EncDataAACIs that AAC uses a message encryption key to adopt a symmetric encryption algorithm to pair including the PubAACAnd the first digital signature SigAS_REQ1The encrypted data inside is generated by encryption.
It should be noted that the execution sequence of S104 to S106 does not affect the specific implementation of the present application, and in practical applications, the execution sequence of S104 to S106 may be set according to requirements. Preferably, S104 is executed first, when AAC is corresponding to the MICAS_AACIf the verification is not passed, discarding the ASVeri of S103, and when AAC is matched with the MICAS_AACAnd after the verification is passed, executing S105 again, executing S106 again when the REQ is determined to be legal by AAC, and selecting whether to execute S106 by AAC according to a local strategy when the REQ is determined to be illegal by AAC, wherein in consideration of efficiency, the scheme is preferably not executed and the authentication process is ended.
S107, REQ decrypts the EncData by using message encryption keyAACObtaining PubAACAnd SigAS_REQ1Verifying the Sig with the public key of the AS-REQAS_REQ1If the verification is passed, then the method is carried out according to the PubAACRes in (1)AACAnd determining the identity authentication result of the AAC.
Wherein REQ can decrypt EncData by using symmetric encryption algorithm using message encryption keyAACObtaining PubAACAnd SigAS_REQ1. Due to ResAACMay reflect whether AAC is legal, so REQ applies to the SigAS_REQ1After the verification is passed, the method can be used according to PubAACRes in (1)AACDetermining whether AAC is legitimate; if REQ is to the SigAS_REQ1If the verification is not passed, discarding AACAuth.
It can be seen from the above that, the embodiment of the present application provides an identity authentication method, where an authentication server is introduced, a digital certificate is adopted for a requesting device, an authentication access controller adopts an application scenario of an authentication manner of a pre-shared key, a first authentication server trusted by authentication access control verifies an identity authentication code of the authentication access controller by using the pre-shared key of the authentication access controller to obtain a first verification result, a second authentication server trusted by the requesting device verifies the validity of the digital certificate of the requesting device to obtain a second verification result, and the requesting device and the authentication access controller respectively obtain verification results of an opposite entity, so as to determine whether the opposite entity is valid, implement bidirectional identity authentication between the authentication access controller and the requesting device, and lay a foundation for ensuring that only a valid user can communicate with a valid network. And the private information of the entity, such as the identity identification, the authentication result information and the like, is transmitted in a ciphertext form, so that the security of the private information in the transmission process is ensured, and the identity protection of the entity is realized.
In some embodiments, to ensure the authenticity of the authentication result, AAC may generate a message integrity check code. For example, the AACAuth of S106 may further include a message integrity check code MacTagAAC,MacTagAACIs that AAC utilizes the message integrity check key pair including MacTag divided in AACAuthAACAnd other fields except the field are calculated and generated. Accordingly, in S107 according to PubAACRes in (1)AACREQ also needs to verify MacTag with message integrity check key before determining the identity authentication result of AACAACAfter the verification is passed, according to PubAACRes in (1)AACAnd determining the identity authentication result of the AAC. Among them, REQ verifies MacTagAACWhen the message integrity check key pair is used, the MacTag in AACAuth is dividedAACOther fields except the field are locally calculated to generate MacTagAACAnd comparing themLocally computed MacTagAACAnd Mactag in received AACAuthAACAnd if the two are consistent, the verification is passed, and if the two are not consistent, the verification is not passed.
AAC may also determine the digital signature Sig of the REQ before determining the identity of the REQREQWhether or not the authentication is passed, when Sig is determinedREQAfter verification, AAC is again based on PubREQRes in (1)REQThe identity authentication result of the REQ is determined. Referring to fig. 1, the REQInit of S101 may further include a digital signature Sig of REQREQ,SigREQThe signature data includes Sig in REQInitREQOther previous fields, AAC also determines Sig before S105REQIf the verification is passed, if Sig is determinedREQIf the verification is passed, S105 is executed again. Wherein AAC determines SigREQWhether to verify the verification comprises the following ways:
as a way of verifying the Sig by an authentication serverREQIn the case where the AS-REQ and AS-AAC are the same authentication server (i.e., non-roaming), when the AS-AAC (which may also be denoted AS AS-REQ) verifies the SigREQTime, SigREQCan be carried in AACVeri of S102 to be delivered to AS-AAC (also denoted AS AS-REQ), which utilizes Cert in AACVeriREQVerifying the SigREQIf the authentication is passed, continuing to generate and send a first authentication response message ASVeri and other steps; if the authentication fails, the steps of generating and sending the first authentication response message ASVeri and the like are not executed. Thus, AAC may determine Sig based on whether the first authentication response message ASVeri can be receivedREQWhether verification is passed or not, if AAC can receive ASVeri of S103, AAC can determine SigREQAnd (5) passing the verification.
As a way of verifying the Sig by an authentication serverREQIn another embodiment, in the case where the AS-REQ and AS-AAC are two different authentication servers (i.e., roaming), when the AS-REQ verifies the SigREQTime, SigREQMay be carried in a second authentication request message AS-AACVeri sent by AACVeri, AS-AAC of S102 to AS-REQ, delivered to AS-REQ, AS-REQ-utilization of Cert in AS-AACVeriREQVerifying the SigREQIf the verification is passed, the AS-REQ executes the steps of generating and sending a second authentication response message AS-REQVeri and generating and sending a subsequent first authentication response message ASVeri by the AS-AAC, and the like, and if the verification is not passed, the AS-REQ does not execute the steps of generating and sending the second authentication response message AS-REQVeri and generating and sending the subsequent first authentication response message ASVeri by the AS-AAC, and the like. Thus, AAC may determine Sig based on whether the first authentication response message ASVeri can be receivedREQWhether verification is passed or not, if AAC can receive ASVeri of S103, AAC can determine SigREQAnd (5) passing the verification.
As a kind of authentication of the Sig by AACREQIn the embodiment of (1), after AAC receives REQInit of S101, it can decrypt EncData in REQInitREQThe obtained CertREQVerifying the SigREQDetermining Sig from the verification resultREQAnd if the verification is passed, discarding REQInit. Or, when the authentication server generates the second authentication result information PubREQAlso includes CertREQWhen AAC receives ASVeri of S103, Pub in ASVeri can be usedREQIncluding CertREQVerifying the SigREQTo thereby determine SigREQAnd if the verification is not passed, discarding the ASVeri. Or, when Pub in ASVeriREQAlso includes CertREQIn time, AAC checks PubREQCert in (1)REQWhether or not to decrypt the EncDataREQObtained CertREQIf the same, Cert is usedREQVerifying the SigREQDetermining Sig according to the verification resultREQAnd if the verification is not passed, discarding the ASVeri.
It should be noted that the information such as the random number, the identity identifier, etc. generated by the requesting device and/or the authentication access controller may be transmitted in a message exchanged in the authentication process. Under normal conditions, the random number and/or the identity carried in the received message and the random number and/or the identity carried in the sent message should be the same, but when network jitter or attacks and other conditions are encountered, parameter information in the message may be lost or tampered. Therefore, in some embodiments of the present application, the reliability of the authentication result may also be ensured by comparing whether the random numbers and/or the identities in the transmitted and received messages are consistent. The method comprises the following specific steps:
referring to fig. 1, the AACVeri of S102 may further include an identification ID of AACAACAnd/or AAC generated first random number NonceAACCorrespondingly, the ASVeri of S103 also includes IDAACAnd/or NonceAACThen AAC may first match the ID in ASVeri before S105AACAnd AAC's own identity IDAAC(i.e., ID of AAC sent by AACVeri)AAC) Is verified and/or a Nonce in ASVeriAACAnd AAC generated NonceAAC(i.e., Nonce in AAC by AACVeriAAC) The consistency of (a) is verified, and if the verification is passed, the AAC re-executes S105.
In other embodiments, the PubAACMay also include an IDAACAnd EncData in AACAuth of S106AACFurther includes an IDAACThen in S107 according to PubAACRes inAACREQ also decrypts EncData before determining the identity of AACAACObtained PubAACID of (1)AACAnd decrypting EncDataAACThe obtained IDAACIf the consistency passes the verification, the REQ is again according to the PubAACRes in (1)AACAnd determining the identity authentication result of the AAC.
Of course, the REQ may also be the second random number Nonce generated by the REQ in order to ensure the reliability of the authentication resultREQAnd/or identity ID of REQREQAnd carrying out consistency verification.
Referring to fig. 1, the AACVeri of S102 may further include NonceREQAnd/or IDREQWherein, NonceREQID, which may be obtained from REQInit of S101 by AACREQMay be EncData in AAC versus REQInitREQDecrypted, i.e. EncDataREQFurther includes an IDREQ(ii) a Correspondingly, the ASVeri of S103 further includes NonceREQAnd/or IDREQEncData in AACAuth of S106AACFurther includes a NonceREQAnd/or IDREQThen in S107 according to PubAACRes in (1)AACREQ may decrypt EncData before determining the identity of AACAACThe obtained NonceREQAnd REQ generated NonceREQAnd/or, verify the consistency of the decrypted EncDataAACThe obtained IDREQAnd identity ID of REQ itselfREQVerifying the consistency of the data; if the verification passes, REQ is again based on PubAACRes in (1)AACAnd determining the identity authentication result of the AAC.
In the above embodiment, the message encryption key used by REQ and AAC may be obtained by negotiation between REQ and AAC, so this embodiment further provides a method for negotiating a message encryption key between REQ and AAC, see fig. 2, where the method includes:
s201, AAC sends a key request message AACInit to REQ.
The AACInit comprises a key exchange parameter KeyInfo of AACAAC,KeyInfoAACIncluding the temporary public key of AAC. The key exchange refers to a key exchange algorithm such as Diffie-Hellman (DH). The AACInit can also comprise a first random number Nonce generated by AACAAC。
The AACInit can also comprise Security capabilitiesAAC,Security capabilitiesAACThe parameter information indicating the Security capability supported by AAC includes an identity authentication suite (the identity authentication suite includes one or more identity authentication methods), a symmetric encryption algorithm, an integrity check algorithm and/or a key derivation algorithm, etc. supported by AAC, so that the REQ can select a specific Security policy to use, and then the REQ can be selected according to Security capabilitiesAACSelecting a particular Security policy Security capabilities for use with REQREQ。Security capabilitiesREQIndicating the identity authentication method, symmetric encryption algorithm, integrity check algorithm and/or key derivation algorithm, etc., which the REQ is determined to use accordingly.
S202、REQ exchanges parameters KeyInfo according to a key including REQREQCorresponding temporary private key and KeyInfoAACAnd carrying out key exchange calculation on the included temporary public key to generate a first key, and calculating a message encryption key by using a key derivation algorithm according to information including the first key.
If AACInit of S201 also includes the Nonce of AAC generationAACREQ may be based on the inclusion of KeyInfoREQCorresponding temporary private key and KeyInfoAACThe included temporary public key is subjected to key exchange calculation to generate a first key K1, and K1 is combined to include NonceAACAnd a second random number Nonce generated by REQREQAnd the message encryption key is calculated by using a negotiated or preset key derivation algorithm. The negotiated key derivation algorithm may be Security capabilities sent by REQ according to AACAACBut the key derivation algorithm used is selected. Among them, KeyInfoREQIs a key exchange parameter generated by the REQ, including the temporary public key of the REQ. KeyInfoREQThe corresponding ephemeral private key is the ephemeral private key generated by the REQ that corresponds to the ephemeral public key of the REQ, i.e., the ephemeral public key and the ephemeral private key are a pair of ephemeral public and private keys.
S203, REQ sends an identity ciphertext message REQInit to AAC.
KeyInfo is also included in the REQInitREQSo that AAC includes KeyInfoAACCorresponding temporary private key and KeyInfoREQThe information including the temporary public key is calculated to obtain the message encryption key. Among them, KeyInfoAACThe corresponding temporary private key is an AAC-generated temporary private key that corresponds to the AAC's temporary public key, i.e., the temporary public key and temporary private key are a pair of temporary public and private keys.
The REQInit can also comprise Security capabilitiesREQ. Nonces may also be included in the REQInitREQSo that AAC includes said KeyInfoAACCorresponding temporary private key, the KeyInfoREQIncluded temporary public key, the NonceAACAnd said NonceREQThe message encryption key is calculated from the included information.
The REQInit may also beTo include NonceAACFurther, AAC may be applied to Nonce in REQInit before calculating the message encryption keyAACAnd the Nonce for AAC generationAACIs verified to ensure that the REQInit received by AAC is a response message to AACInit.
S204, AAC according to KeyInfoAACCorresponding temporary private key and KeyInfoREQAnd carrying out key exchange calculation on the included temporary public key to generate the first key, and calculating a message encryption key by using the key derivation algorithm according to the information including the first key.
If the Nonce is also included in the REQInitREQAAC may then be based on including the KeyInfoAACCorresponding temporary private key and the KeyInfoREQPerforming a key exchange calculation on the included temporary public key to generate the first key K1, combining K1 to include the NonceAACAnd said NonceREQThe message encryption key is calculated using a negotiated or preset key derivation algorithm. Wherein, the negotiated key derivation algorithm may be Security capabilities sent by AAC according to REQREQAnd the key derivation algorithm used is selected.
It should be noted that, in the embodiment of fig. 2, REQ and AAC may also generate a message integrity check key. The embodiment in which REQ and AAC each generate a message integrity check key is the same as the embodiment in which REQ and AAC each generate a message encryption key, which is exemplified in the embodiment of fig. 2. For example, AAC may derive a string of key data by using a key derivation algorithm in the manner of the embodiment in fig. 2, where the key data may serve as both a message encryption key and a message integrity check key, or a part of the key data may serve as a message encryption key and another part of the key data may serve as a message integrity check key; AAC may also derive two strings of the same or different key data in several times by using a key derivation algorithm in the manner of the embodiment of fig. 2, one string being used as a message encryption key and one string being used as a message integrity check key. REQ may derive a string of key data by using a key derivation algorithm in the manner of the embodiment of fig. 2, where the key data may serve as both a message encryption key and a message integrity check key, or may use a part of the key data as a message encryption key and another part of the key data as a message integrity check key; the REQ may also derive two strings of the same or different key data in several times by using a key derivation algorithm in the manner of the embodiment of fig. 2, one string being used as a message encryption key and one string being used as a message integrity check key.
The embodiment of the present application further provides a method for determining a first authentication server and/or a second authentication server used in the authentication process by using information interaction between AAC and REQ:
referring to fig. 2, AAC adds the identity ID of at least one authentication server trusted by AAC to AACInit of S201AS_AACREQ according to the IDAS_AACIdentification ID of at least one authentication server determining self trustAS_REQ. In particular implementation, REQ Slave IDAS_AACWherein at least one authentication server is selected as ID and is self-trustedAS_REQIf the selection fails, the REQ takes at least one authentication server trusted by the REQ as an IDAS_REQ(wherein, the successful selection corresponds to the non-roaming condition, and the failed selection corresponds to the roaming condition), and the ID is usedAS_REQREQInit added to S203 is sent to AAC. Further, AAC may be based on IDAS_AACAnd IDAS_REQDetermining a first authentication Server, e.g. AAC, can judge the IDAS_REQNeutralization IDAS_AACIf the identity of the authentication server exists, the authentication server is in a non-roaming condition, and the AAC determines a first authentication server participating in identity authentication from the identity of the at least one REQ and AAC jointly-trusted authentication server; if not, the roaming is the case, AAC needs to be according to IDAS_AACDetermining a first authentication server AS-AAC participating in identity authentication, and adding IDAS_REQIs sent to AS-AAC so that AS-AAC is based on IDAS_REQA second authentication server AS-REQ is determined.
As another implementation, AAC may not necessarily send an ID to REQAS_AACAnd adds itself in REQInit of S203 by REQIdentity ID of at least one trusted authentication serverAS_REQ. According to IDAS_REQAnd identity ID of AAC self-trusted authentication serverAS_AACThe implementation of determining the first authentication server and/or the second authentication server to participate in identity authentication is as in the previous embodiment.
Because the authentication servers trusted by REQ and AAC can be the same or different, when the authentication servers trusted by REQ and AAC are the same, the non-roaming condition is obtained; when REQ and AAC trusted authentication servers are different, this is the roaming case. Based on the foregoing embodiment, the identity authentication method provided by the embodiment of the present application is described below with reference to the following two cases in combination with non-roaming and roaming application scenarios: firstly, in the non-roaming condition, REQ identity protection identity authentication method; (II) REQ identity protection identity authentication method under roaming condition.
Referring to fig. 3, it is an embodiment of the identity authentication method in the above (a) case, wherein the AS-AAC (or AS-REQ, of course) can be used to represent the authentication server that REQ and AAC trust together. In this embodiment, the message encryption key negotiation process between REQ and AAC is merged into the identity authentication process in parallel, which is more convenient for engineering implementation. The identity authentication method comprises the following steps:
s301, AAC Generation NonceAACAnd KeyInfoAACGenerating Security capabilities as requiredAAC。
S302, AAC sends a key request message AACInit to REQ.
The AACInit comprises a NonceAAC、KeyInfoAACAnd Security capabilitiesAAC. Wherein Security capabilities are providedAACAnd optional fields represent AAC-supported security capability parameter information, including AAC-supported identity authentication kits, symmetric encryption algorithms, integrity verification algorithms, key derivation algorithms and the like (the same applies below).
After receiving the AACInit, the S303, REQ performs the following operations (unless otherwise specified or logically related, the actions numbered (1) and (2) … … in this document do not have a certain order due to the numbering, and are the same throughout), including:
(1) and generating the NonceREQAnd KeyInfoREQ;
(2) Generating Security capabilities as requiredREQ;
(3) According to the formula including KeyInfoREQCorresponding temporary private key and KeyInfoAACThe included temporary public key is subjected to key exchange calculation to generate a first key K1, K1 is combined with NonceAAC、NonceREQAnd other information (other information employed by REQ and AAC are the same and optional, such as a specific string, etc.) calculate a message encryption key and a message integrity check key using a negotiated or preset key derivation algorithm; wherein, the calculation of the message integrity check key can be executed when the message integrity check key is needed to be used.
(4) And calculating and generating identity information ciphertext EncData of REQ by using message encryption keyREQ;
(5) Calculating the digital signature Sig of the REQREQ。
S304, REQ sends an identity ciphertext message REQInit to AAC.
The REQInit comprises NonceAAC、NonceREQ、Security capabilitiesREQ、KeyInfoREQ、EncDataREQAnd SigREQ. Wherein, NonceAACIs an optional field and should be equal to the corresponding field in aacini; security capabilitiesREQWhether REQ generates Security capabilities for optional fieldsREQDepending on whether Security capabilities are carried in AACInit sent from AAC to REQAAC,Security capabilitiesREQIndicating REQ according to Security capabilitiesAACThe selection of a particular security policy to be made, i.e. the identity authentication method, symmetric encryption algorithm, integrity check algorithm and/or key derivation algorithm, etc. (see below) that REQ determines to use; EncDataREQIncludes IDREQAnd CertREQ;SigREQThe signature data includes Sig in REQInitREQOther previous fields, when Nonce is not included in REQInitAACWhen a field, SigREQSignature data of (2) further includes a Nonce in AACInitAACA field. In this application, the signed object is referred to as signature data.
S305, receiving REQInit by AAC, and executing the following operations comprising:
(1) if any Nonce is present in REQInitAACCheck the NonceAACNonce whether or not to be associated with AAC GenerationAACIf the two are consistent, discarding REQInit;
(2) according to the KeyInfoAACCorresponding temporary private key and the KeyInfoREQThe included temporary public key is subjected to key exchange calculation to generate a first key K1, K1 is combined with NonceAAC、NonceREQAnd other information (other information employed by AAC and REQ are the same and optional, such as a specific string, etc.) calculate a message encryption key and a message integrity check key using a negotiated or preset key derivation algorithm; wherein, the calculation of the message integrity check key can be executed when the message integrity check key is needed to be used.
(3) Decrypting EncData using a message encryption keyREQGet IDREQAnd CertREQ;
(4) And calculating to generate identity authentication code MIC of AACAAC。
S306, AAC sends a first authentication request message AACVeri to AS-AAC.
Including an ID in the AACVeriREQ、CertREQ、NonceREQ、IDAAC、NonceAACAnd MICAAC. Wherein, IDREQ、CertREQ、NonceREQShould equal the corresponding field in REQInit, NonceAACShould equal the Nonce for AAC generationAAC;MICAACIs pre-shared key K of AAC utilization and AS-AACAAC_ASAdopting a hashing algorithm pair agreed with AS-AAC to include MIC in AACVeriAACHash values calculated from other preceding fields, e.g. when the ID is included in sequence in AACVeriREQ、CertREQ、NonceREQ、IDAAC、NonceAACAnd MICAACWhen AAC utilizes said KAAC_ASIncluding an ID with the hash algorithm pairREQ、CertREQ、NonceREQ、IDAACAnd NonceAACCarrying out hash operation on the included information to obtain MICAAC。
S307, after the AS-AAC receives the AACVeri, executing the following operations including:
(1) using pre-shared key K with AACAAC_ASVerifying MIC by adopting hash algorithm agreed with AACAACTo obtain ResAACAccording to including ResAACAnd IDAACGeneration of information in PubAAC;
Wherein AS-AAC is based on ID in AACVeriAACDetermining pre-shared key K agreed with AACAAC_ASAnd a hashing algorithm, using said KAAC_ASAdopting the hashing algorithm pair to include MIC in AACVeriAACThe previous other fields compute the MIC locallyAACAnd adds it to the received MICAACComparing, if the two are the same, then MICAACThe AS-AAC judges the AAC identity authentication result to be legal after verification, and if the AAC identity authentication result is different, the MIC is determined to be legalAACIf the verification fails, the AS-AAC can have the following processing modes according to the local policy, including: discarding AACVeri or judging the identification result of AAC as illegal.
(2) Cert verificationREQGet ResREQAccording to including CertREQAnd ResREQGeneration of information in PubREQ;
(3) And calculating a first message identification code MIC of the AS-AACAS_AACAnd a first digital signature SigAS_AAC1。
S308, the AS-AAC sends a first authentication response message ASVeri to the AAC.
The ASVeri comprises an IDREQ、NonceREQ、PubAAC、SigAS_AAC1、IDAAC、NonceAAC、PubREQAnd MICAS_AAC. Wherein, IDREQ、NonceREQ、IDAAC、NonceAACShould be equal to the corresponding field in AACVeri; sigAS_AAC1Is formed by the AS-AAC pair including IDREQ、NonceREQ、PubAACNumber of signatures inGenerated according to calculation; MICAS_AACIs a pre-shared secret key K utilized by AS-AAC with AACAAC_ASIncluding ID with hash algorithm agreed with AACAAC、NonceAAC、PubREQThe resulting hash value is computed over the included information.
After receiving ASVeri, S309 and AAC perform the following operations, including:
(1) check ID in ASVeriAAC、NonceAACIdentity ID of whether to respectively correspond to AACAACAnd Nonce for AAC generationAACThe same;
(2) utilizing the KAAC_ASVerifying MIC by adopting hash algorithm agreed with AS-AACAS_AAC;
MICAS_AACThe verification process comprises the following steps: AAC utilizing said KAAC_ASIncluding an ID with the hash algorithm pairAAC、NonceAAC、PubREQCarrying out hash operation on the internal information to obtain MICAS_AACAnd compares it with the received MICAS_AACAnd comparing, wherein if the two are consistent, the verification is passed, and if the two are not consistent, the verification is not passed.
(3) Checking PubREQCert in (1)REQWhether to decrypt EncDataREQObtained CertREQThe same;
(4) by CertREQVerifying the digital signature Sig of the REQREQ;
(5) If any step of the checking and the verification is not passed, immediately discarding the ASVeri; after the above checks and verifications are passed, according to PubREQRes inREQDetermining the identity authentication result of the REQ; if REQ is determined to be illegal, ending the authentication process;
(6) calculating EncDataAACAnd MactagAAC。
S310, AAC sends a third authentication response message AACAuth to REQ.
The AACAuth comprises EncDataAACAnd MacTagAAC. Wherein EncDataAACIs AAC includes an ID with a message encryption key pairREQ、NonceREQ、PubAAC、SigAS_AAC1And IDAACThe encrypted data inside is generated by encryption; mactagAACThe calculation process of (2) is as follows: using message integrity check key to adopt integrity check algorithm to divide MacTag in AACAuthAACMactag is generated by calculating information in other fields except for the fieldAAC。
S311, after receiving AACAuth, REQ performs the following operations including:
(1) verification of MacTagAAC;
The verification process comprises the following steps: using message integrity check key to adopt integrity check algorithm to divide MacTag in AACAuthAACThe MacTag is calculated locally by information in other fields except the fieldAAC(this calculation method is similar to the AAC calculation MacTagAACIn the same manner), the calculated MacTag is calculatedAACAnd the received MacTagAACA comparison is made.
(2) Decrypting EncData using message encryption keyAACGet IDREQ、NonceREQ、PubAAC、SigAS_AAC1And IDAAC;
(3) Checking the ID obtained by decryptionREQ、NonceREQWhether or not to respectively identify with REQ's own identity IDREQREQ generated NonceREQThe same;
(4) checking the ID obtained by decryptionAACAnd PubAACID of (1)AACWhether they are the same;
(5) public key verification Sig using AS-AACAS_AAC1;
(6) If any step of the checking and the verification fails, immediately discarding the AACAuth; if the above checks and verifications are passed, then the method is based on PubAACRes in (1)AACAnd determining the identity authentication result of the AAC.
Thus, identity authentication for REQ and AAC, i.e., bidirectional identity authentication for REQ and AAC, is achieved at S309 and S311, respectively, and identity information and identity authentication result information are transmitted in ciphertext between REQ and AAC, thereby achieving identity protection.
In S309, Sig is verifiedREQCan also operateInstead, it is performed in advance in S305, that is, in S305, AAC uses decrypted EncDataREQObtained CertREQVerification SigREQIn this case, no Sig verification is required in S309REQThen PubREQMay not include CertREQ. Alternatively, Sig is verified in S309REQMay be performed in advance in S307, in which case Sig is performedREQCan be delivered to AS-AAC through AACVeri, i.e., in S307, AS-AAC utilizes CertREQVerification SigREQVerifying Cert after the verification is passedREQIn this case, no Sig verification is required in S309REQThen PubREQMay not include CertREQ。
Referring to fig. 4, it is an embodiment of the identity authentication method in the case (two), in which the message encryption key negotiation process between REQ and AAC is merged into the identity authentication process in parallel, which is more convenient for engineering implementation. The identity authentication method comprises the following steps:
s401, AAC Generation NonceAACAnd KeyInfoAACGenerating Security capabilities as requiredAAC。
S402, AAC sends a key request message AACInit to REQ.
The AACInit comprises a NonceAAC、KeyInfoAAC、Security capabilitiesAACAnd IDAS_AAC. Wherein, Security capabilitiesAACAnd IDAS_AACIs an optional field, and IDAS_AACIdentity of at least one authentication server representing AAC trust for enabling REQ according to IDAS_AACIt is determined whether there is a co-trusted authentication server (see below).
S403, after receiving AACInit, REQ performs the following operations, including:
(1) and generating the NonceREQAnd KeyInfoREQ;
(2) Generating an ID as requiredAS_REQAnd Security capabilitiesREQ;
(3) According to the list including KeyInfoREQCorresponding temporary private key and KeyInfoAACIncluding temporary public keys for encryptionThe key exchange calculation generates a first key K1, and combines K1 with NonceAAC、NonceREQAnd other information (other information used for REQ and AAC is the same and optional, such as a specific string, etc.) calculate a message encryption key and a message integrity check key using a negotiated or preset key derivation algorithm; wherein, the calculation of the message integrity check key can be executed when the message integrity check key is needed.
(4) Generating identity information ciphertext EncData of REQ by utilizing message encryption key calculationREQ;
(5) Calculating the digital signature Sig of the REQREQ。
S404, REQ sends an identity ciphertext message REQInit to AAC.
The REQInit comprises NonceAAC、NonceREQ、KeyInfoREQ、Security capabilitiesREQ、IDAS_REQ、EncDataREQAnd SigREQ. Wherein EncDataREQIncludes IDREQAnd CertREQ;NonceAACIs an optional field and should be equal to the corresponding field in aacini; security capabilitiesREQAnd IDAS_REQIs an optional field, and IDAS_REQIdentity of at least one authentication server representing REQ trust, when ID exists in AACInitAS_AACWhen the REQ tries to select at least one ID from its trusted authentication serverAS_AACWherein the same authentication server is used as IDAS REQIf the selection fails, at least one authentication server trusted by the authentication server is used as the IDAS REQ(ii) a When no ID exists in AACInitAS_AACWhen the REQ has at least one authentication server trusted by itself as IDAS_REQ(the same applies hereinafter); sigREQThe signature data includes Sig in REQInitREQOther previous fields, when Nonce is not included in REQInitAACWhen field, SigREQSignature data of (2) further includes a Nonce in AACInitAACA field.
S405, after the AAC receives REQInit, the following operations are executed, including:
(1) ifThe existence of a Nonce in REQInitAACThen check the NonceAACNonce whether or not to be associated with AAC GenerationAACIf the two are consistent, discarding REQInit;
(2) according to the KeyInfoAACCorresponding temporary private key and the KeyInfoREQThe included temporary public key is subjected to key exchange calculation to generate a first key K1, K1 is combined with NonceAAC、NonceREQAnd other information (other information employed by AAC and REQ are the same and optional, such as a specific string, etc.) calculate a message encryption key and a message integrity check key using a negotiated or preset key derivation algorithm; wherein, the calculation of the message integrity check key can be executed when the message integrity check key is needed to be used.
(3) If REQInit carries IDAS_REQAnd the AACInit carries the IDAS_AACThen AAC judgment IDAS_REQAnd IDAS_AACWhether at least one identity mark of the same authentication server exists or not, if so, the authentication server is in a non-roaming condition, and the AAC determines a first authentication server participating in identity authentication from the identity marks of the at least one REQ and AAC jointly trusted authentication server; if not, roaming is the case, AAC needs IDAS_AACDetermining a first authentication server AS-AAC participating in identity authentication, and identifying the IDAS_REQIs sent to AS-AAC so that AS-AAC is based on IDAS_REQDetermining a second authentication server AS-REQ; or,
if REQInit carries IDAS_REQBut no ID is carried in AACInitAS_AACThen AAC judgment IDAS_REQWhether the identity identification of at least one identical authentication server exists in the authentication server trusted by AAC, if so, namely, the authentication server is in a non-roaming condition, the AAC determines a first authentication server participating in identity authentication from the identity identification of the at least one REQ and AAC jointly trusted authentication server; if the ID does not exist, the roaming situation is achieved, the AAC needs to determine a first authentication server AS-AAC participating in identity authentication according to an authentication server trusted by the AAC, and the ID is usedAS_REQIs sent to AS-AAC so that AS-AAC is based on IDAS_REQDetermining a second authentication server AS-REQ;
It should be noted that the result of the determination in this embodiment is a roaming condition.
(4) Decrypting EncData using message encryption keyREQGet IDREQAnd CertREQ;
(5) And calculating to generate identity identification code MIC of AACAAC。
S406, AAC sends a first authentication request message AACVeri to AS-AAC.
The AACVeri comprises a NonceREQ、IDAS_REQ、IDREQ、CertREQ、IDAAC、NonceAACAnd MICAAC. Wherein, IDAS_REQAs an optional field, in case the AS-AAC is known AS AS-REQ, this field may not be carried in AACVeri, otherwise it is carried in AACVeri, so that AS-AAC is according to IDAS_REQDetermining the AS-REQ; MICAACPre-shared key K for AAC utilization and AS-AACAAC_ASAdopting a hashing algorithm pair agreed with AS-AAC to include MIC in AACVeriAACThe resulting hash value is computed over the other preceding fields.
S407, after receiving the AACVeri, the AS-AAC executes the following operations:
(1) verifying MICAACTo obtain ResAACAccording to including ResAACAnd IDAACGeneration of information in PubAAC(ii) a Verification process see fig. 3 for related content of the embodiment;
(2) if there is an ID in AACVeriAS_REQThen AS-AAC according to IDAS_REQDetermining a second authentication server AS-REQ; if not, the AS-AAC is known AS the AS-REQ;
(3) calculating a second digital signature SigAS_AAC2。
S408, the AS-AAC sends a second authentication request message AS-AACVeri to the AS-REQ.
The AS-AACVeri comprises a NonceREQ、IDREQ、CertREQ、IDAAC、NonceAAC、PubAACAnd SigAS_AAC2. Wherein SigAS_AAC2The signature data comprises Sig in AS-AACVeriAS_AAC2Other fields before.
S409, after the AS-REQ receives the AS-AACVeri, the following operations are executed, including:
(1) public key verification Sig using AS-AACAS_AAC2;
(2) Cert verificationREQGet ResREQAccording to including CertREQAnd ResREQGeneration of information in PubREQ;
(3) Calculating a first digital signature SigAS_REQ1And a third digital signature SigAS_REQ3。
S410, the AS-REQ sends a second authentication response message AS-REQVeri to the AS-AAC.
The AS-REQVeri comprises IDREQ、NonceREQ、PubAAC、SigAS_REQ1、IDAAC、NonceAAC、PubREQAnd SigAS_REQ3. Wherein, IDREQ、NonceREQ、PubAAC、IDAAC、NonceAACShould be equal to the corresponding field in the AS-AACVeri respectively; sigAS_REQ1Is formed by the AS-REQ pair including the IDREQ、NonceREQ、PubAACThe signature data inside is generated by calculation; sigAS_REQ3Is formed by the AS-REQ pair including the IDAAC、NonceAAC、PubREQThe signature data inside is calculated and generated.
After S411 and AS-AAC receive AS-REQVeri, the following operations are executed, including:
(1) public key verification Sig with AS-REQAS_REQ3(ii) a If the verification fails, discarding the AS-REQVeri;
(2) calculating a first message authentication code MIC of the AS-AACAS_AAC。
S412, the AS-AAC sends a first authentication response message ASVeri to the AAC.
The ASVeri comprises an IDREQ、NonceREQ、PubAAC、SigAS_REQ1、IDAAC、NonceAAC、PubREQAnd MICAS_AAC. Wherein, IDREQ、NonceREQ、PubAAC、SigAS_REQ1、IDAAC、NonceAAC、PubREQShould be equal to the corresponding field in AS-REQVeri, respectively; MICAS_AACIs a pre-shared secret key K utilized by AS-AAC with AACAAC_ASIncluding ID with hash algorithm agreed with AACAAC、NonceAAC、PubREQThe resulting hash value is computed over the included information.
After receiving ASVeri, S413 and AAC execute the following operations, including:
(1) check ID in ASVeriAAC、NonceAACWhether or not to respectively identify with AAC own identity IDAACAnd Nonce for AAC generationAACThe same;
(2) verifying MICAS_AAC(ii) a Verification process see the relevant contents of the embodiment of fig. 3;
(3) checking PubREQCert in (1)REQAnd decrypting EncDataREQThe obtained CertREQWhether they are the same;
(4) by use of CertREQVerifying SigREQ;
(5) If any step of the checking and the verification fails, immediately discarding the ASVeri; after the above checks and verifications are passed, according to PubREQRes in (1)REQDetermining the identity authentication result of the REQ; if the REQ is determined to be illegal, the authentication process is ended;
(6) calculating EncDataAACAnd MactagAAC。
S414, AAC sends a third authentication response message AACAuth to REQ.
The AACAuth comprises EncDataAACAnd MactagAAC. Wherein EncDataAACIs AAC includes an ID with a message encryption key pairREQ、NonceREQ、PubAAC、SigAS_REQ1And IDAACThe encrypted data inside is generated by encryption; mactagAACAs described in the embodiment of fig. 3.
After S415 and REQ receive AACAuth, the following operations are performed, including:
(1) verification of MacTagAAC(ii) a AuthenticationThe process is as described in the embodiment of FIG. 3;
(2) decrypting EncData using message encryption keyAACObtaining the IDREQ、NonceREQ、PubAAC、SigAS_REQ1And IDAAC;
(3) Checking the ID obtained by decryptionREQ、NonceREQWhether or not to respectively identify with REQ's own IDREQREQ generated NonceREQThe same;
(4) checking the ID obtained by decryptionAACAnd PubAACID of (1)AACWhether the two are consistent;
(5) public key verification Sig using AS-REQAS_REQ1;
(6) After the check and the verification are passed, according to the PubAACRes inAACDetermining the identity authentication result of the AAC; if any step of the checking and the verification is not passed, the AACAuth is immediately discarded.
Thus, identity authentication for REQ and for AAC, i.e., bidirectional identity authentication for REQ and AAC, is achieved at S413 and S415, respectively, and identity information of REQ is transmitted in ciphertext between REQ and AAC, thereby achieving identity protection of REQ.
In addition, the verification Sig in (1) and S413 isREQMay be performed in advance in S405, that is, in S405, AAC decrypts EncData using decrypted EncDataREQThe obtained CertREQVerifying SigREQIn this case, verification Sig is not required in S413REQThen PubREQMay not include CertREQ. Alternatively, Sig is verified in S413REQMay be performed in advance in S409, in which case SigREQMay be delivered to the AS-REQ via AACVeri, AS-AACVeri, i.e., in S409, the AS-REQ utilizes CertREQFor SigREQVerifying, and after the verification is passed, verifying the CertREQIn this case, no sigs needs to be verified in S413REQThen PubREQMay not include CertREQ. (2) Second digital signature Sig in S407, S408AS_AAC2Can be replaced by a second message authentication code MICAS_AAC2In which MICAS_AAC2The AS-AAC utilizes a pre-shared key with the AS-REQ and adopts a hash algorithm agreed with the AS-REQ to carry out MIC in AS-AACVeriAS_AAC2The hash value of the previous other field calculation; s409, AS-REQ verifies SigAS_AAC2Replace with verifying MICAS_AAC2. Third digital signature Sig in S409, S410AS_REQ3Can be replaced by a third message authentication code MICAS_REQ3Wherein MICAS_REQ3The ID included in the AS-REQVeri is subjected to hash algorithm agreed with the AS-AAC by using a pre-shared key of the AS-REQAAC、NonceAAC、PubREQA hash value computed over the inner field; in S411, AS-AAC verifies SigAS_REQ3Replace with verifying MICAS_REQ3。
In the above embodiments, each message may also carry a HASH value HASHX_YThe HASH value HASHX_YThe message is obtained by calculating the latest preamble message sent by the opposite terminal entity Y by the sender entity X of the message by using a hash algorithm, and the calculation result is used for verifying whether the entity X receives the complete latest preamble message by the opposite terminal entity Y. Wherein, HASHREQ_AACHASH value, HASH, indicating the calculation of REQ on the latest preamble message received from AAC transmissionAAC_REQHASH value, HASH, representing the calculation of AAC on the latest preamble message received from REQAAC_AS-AACHASH value, HASH, representing the calculation of AAC on the latest preamble message sent by the AS-AAC receivedAS-AAC_AACHASH value, HASH, representing the calculation of AS-AAC of the latest preamble message of a received AAC transmissionAS-AAC_AS-REQHASH value, HASH, representing the calculation of AS-AAC on the latest preamble message sent by the AS-REQAS-REQ_AS-AACIndicating the hash value calculated by the AS-REQ on the latest preamble message received from the AS-AAC transmission. If the message currently sent by the entity X at the sending party is the first message interacted between the entity X and the entity Y, which means that the entity X does not receive the preamble message sent by the entity Y at the opposite end, the HASH in the messageX_YMay be absent or meaningless.
Correspondingly, after the opposite terminal entity Y receives the message sent by the entity X, if the message contains HASHX_YThen whenEntity Y ignores HASH when entity Y has not sent a preamble to entity XX_Y(ii) a When entity Y has sent a preamble message to entity X, entity Y locally calculates the HASH value of the latest preamble message sent to entity X before by using the HASH algorithm, and compares the HASH value with the HASH value HASH carried in the received messageX_YAnd comparing, if the comparison result is consistent with the comparison result, executing the subsequent steps, otherwise discarding or ending the authentication process.
In the present invention, for an entity X, a preamble message sent from an opposite end entity Y to the entity X means: before the entity X sends the message M to the opposite end entity Y, the received message sent from the opposite end entity Y to the entity X; the latest preamble message sent by the correspondent entity Y to the entity X means: before the entity X sends the message M to the opposite end entity Y, the latest message sent by the opposite end entity Y to the entity X is received. If the message M sent by the entity X to the opposite terminal entity Y is the first message interacted between the entity X and the entity Y, no preamble message sent by the opposite terminal entity Y to the entity X exists before the entity X sends the message M to the opposite terminal entity Y.
The optional fields and optional operations in the embodiments corresponding to fig. 3 to 4 are denoted by "+" in fig. 3 to 4 of the drawings in the specification. The content included in the message according to all the above embodiments is not limited in sequence, and in a case that no particular description is given, the operation sequence of the relevant message after the message is received by the message receiver and the processing sequence of the content included in the message are not limited.
Based on the method embodiments corresponding to fig. 1 to fig. 4, referring to fig. 5, an embodiment of the present application further provides a requesting device 500, including:
a sending module 510, configured to send an identity ciphertext message to an authentication access controller, where the identity ciphertext message includes an identity information ciphertext of the requesting device, and the identity information ciphertext of the requesting device is generated by the requesting device encrypting, by using a message encryption key, encrypted data that includes a digital certificate of the requesting device;
a receiving module 520, configured to receive a third authentication response message sent by the authentication access controller, where the third authentication response message includes an authentication result information ciphertext generated by the authentication access controller encrypting, by using the message encryption key, encrypted data that includes the first authentication result information and the first digital signature; the first authentication result information comprises a first verification result of an identity authentication code of the authentication access controller, and the first digital signature is a digital signature generated by a second authentication server through calculation on signature data comprising the first authentication result information;
a decryption module 530, configured to decrypt the authentication result information ciphertext with the message encryption key to obtain the first authentication result information and the first digital signature;
a verification module 540, configured to verify the first digital signature with a public key of the second authentication server;
a determining module 550, configured to determine, if the authentication passes, an identity authentication result of the authentication access controller according to a first authentication result in the first authentication result information.
Optionally, the receiving module 520 is further configured to: before the sending module 510 sends the identity ciphertext message, receiving a key request message sent by the authentication access controller, where the key request message includes a key exchange parameter of the authentication access controller; the requesting device further includes:
a calculation module, configured to perform key exchange calculation according to a temporary private key corresponding to a key exchange parameter of the requesting device and a temporary public key included in a key exchange parameter of the authentication access controller to generate a first key, and calculate the message encryption key according to information including the first key by using a key derivation algorithm;
the identity cryptogram message also includes the key exchange parameters of the requesting device.
Optionally, the key request message further includes a first random number generated by the authentication access controller; the calculation module is specifically configured to: calculating the message encryption key from information including the first key, the first random number, and a second random number generated by the requesting device; correspondingly, the identity ciphertext message further includes the second random number.
Optionally, the identity ciphertext message sent by the sending module further includes the first random number.
Optionally, the key request message further includes security capability parameter information supported by the authentication access controller; the determination module 550 is further configured to: determining a specific security policy used by the requesting device according to the security capability parameter information; the particular security policy is also included in the identity ciphertext message.
Optionally, the key request message further includes an identity of at least one authentication server trusted by the authentication access controller; the determination module 550 is further configured to: determining the identity of at least one authentication server trusted by the request equipment according to the identity of at least one authentication server trusted by the authentication access controller; the identity cryptogram message further includes an identity of at least one authentication server trusted by the requesting device.
Optionally, the identity ciphertext message sent by the sending module further includes an identity of at least one authentication server trusted by the requesting device.
Optionally, the encrypted data of the identity information ciphertext of the requesting device further includes an identity of the requesting device, and the identity ciphertext message further includes a second random number generated by the requesting device; correspondingly, the encrypted data of the authentication result information ciphertext in the third authentication response message further includes the identity of the requesting device and/or the second random number;
correspondingly, the decryption module decrypts the authentication result information ciphertext in the third authentication response message to obtain the identity identifier of the requesting device and/or the second random number;
the verification module is further configured to: before the determining module determines the identity authentication result of the authentication access controller, verifying the consistency between the identity identifier of the request device obtained by decrypting the authentication result information ciphertext and the identity identifier of the request device, and/or verifying the consistency between the second random number obtained by decrypting the authentication result information ciphertext and the second random number generated by the request device; and if the authentication is passed, the determining module determines the identity authentication result of the authentication access controller according to the first authentication result in the first authentication result information.
Optionally, the third authentication response message further includes a message integrity check code; the verification module is further to: before the determining module determines the identity authentication result of the authentication access controller, verifying the message integrity check code by using a message integrity check key; if the authentication is passed, the determining module determines the identity authentication result of the authentication access controller according to the first authentication result in the first authentication result information; the message integrity check key is generated in the same manner as the message encryption key.
Optionally, the message sent by the requesting device to the authentication access controller further includes a hash value calculated by the requesting device for the latest preamble message sent by the authentication access controller.
Referring to fig. 6, an embodiment of the present application further provides an authentication access controller 600, including:
a receiving module 610, configured to receive an identity ciphertext message sent by a requesting device, where the identity ciphertext message includes an identity information ciphertext of the requesting device, and the identity information ciphertext of the requesting device is generated by encrypting, by the requesting device, encrypted data that includes a digital certificate of the requesting device by using a message encryption key;
a decryption module 620, configured to decrypt, using the message encryption key, the identity information ciphertext of the requesting device to obtain a digital certificate of the requesting device;
a sending module 630, configured to send a first authentication request message to a first authentication server trusted by the authentication access controller, where the first authentication request message includes a digital certificate of the requesting device and an identity authentication code of the authentication access controller; the identity authentication code of the authentication access controller is generated by the authentication access controller through calculation on information including the digital certificate of the request equipment by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server;
the receiving module 610 is further configured to receive a first authentication response message sent by the first authentication server, where the first authentication response message includes first authentication result information, a first digital signature of a second authentication server trusted by the requesting device, second authentication result information, and a first message authentication code of the first authentication server; the first authentication result information comprises a first verification result of an identity authentication code of the authentication access controller, the first digital signature is a digital signature generated by the second authentication server through calculation on signature data comprising the first authentication result information, the second authentication result information comprises a second verification result of a digital certificate of the request device, and a first message authentication code of the first authentication server is generated by the first authentication server through calculation on information comprising the second authentication result information by using a pre-shared key with the authentication access controller and a cryptographic algorithm agreed with the authentication access controller;
a verification module 640, configured to verify a first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and using a cryptographic algorithm agreed with the first authentication server, and if the verification is passed, the determining module 650 determines an identity authentication result of the requesting device according to a second verification result in the second authentication result information; when the determining module 650 determines that the identity authentication result of the requesting device is legal, the sending module 630 sends a third authentication response message to the requesting device; or,
a first message authentication code for verifying the first authentication server by using a pre-shared key of the first authentication server and using a cryptographic algorithm agreed with the first authentication server, if the first message authentication code passes the verification, the sending module 630 sends a third authentication response message to the requesting device, and the determining module 650 determines the identity authentication result of the requesting device according to a second verification result in the second authentication result information; or,
a first message authentication code for verifying the first authentication server using a cryptographic algorithm agreed with the first authentication server using a pre-shared key with the first authentication server; if the first message authentication code of the first authentication server passes the authentication, the determining module 650 determines the authentication result of the requesting device according to the second authentication result in the second authentication result information; the sending module 630 sends a third authentication response message to the requesting device;
wherein the third authentication response message includes an authentication result information ciphertext generated by the authentication access controller encrypting, with the message encryption key, encrypted data including the first authentication result information and the first digital signature.
Optionally, the sending module 630 is further configured to: before the receiving module 610 receives the identity ciphertext message, sending a key request message to the requesting device, where the key request message includes a key exchange parameter of the authentication access controller; the identity ciphertext message further comprises a key exchange parameter of the request device; the authentication access controller further comprises:
and the calculation module is used for performing key exchange calculation according to a temporary private key corresponding to the key exchange parameters of the authentication access controller and a temporary public key included in the key exchange parameters of the request equipment to generate a first key, and calculating the message encryption key by using a key derivation algorithm according to information including the first key.
Optionally, the key request message further includes a first random number generated by the authentication access controller; the identity ciphertext message further comprises a second random number generated by the request device;
the calculation module is specifically configured to: calculating the message encryption key from information including the first key, the first random number, and the second random number.
Optionally, the identity ciphertext message further includes the first random number; the verification module 640 is further configured to: before the calculation module calculates the message encryption key, verifying the consistency of a first random number in the identity ciphertext message and a first random number generated by the authentication access controller; and if the verification is passed, the calculation module recalculates the message encryption key.
Optionally, the key request message further includes an identity of at least one authentication server trusted by the authentication access controller; the identity ciphertext message also comprises an identity of at least one authentication server trusted by the request equipment; the determination module 650 is further operable to: and determining the first authentication server according to the identity of the at least one authentication server trusted by the request equipment in the identity ciphertext message and the identity of the at least one authentication server trusted by the authentication access controller in the key request message.
Optionally, the identity ciphertext message further includes an identity of at least one authentication server trusted by the requesting device; the determination module 650 is further operable to: and determining the first authentication server according to the identity of at least one authentication server trusted by the request equipment and the identity of an authentication server trusted by the authentication access controller.
Optionally, the first authentication request message further includes an identity of the authentication access controller and/or a first random number generated by the authentication access controller; correspondingly, the first authentication response message further includes an identity of the authentication access controller and/or the first random number;
the verification module 640 is further configured to: verifying the identity of the authentication access controller in the first authentication response message and the identity of the authentication access controller, and/or verifying the identity of the first random number in the first authentication response message and the first random number generated by the authentication access controller; if the verification is passed, the determining module 650 determines the identity authentication result of the requesting device according to the second verification result in the second authentication result information.
Optionally, when the identity ciphertext message further includes the digital signature of the requesting device, the determining module 650 is further configured to: and determining whether the digital signature of the request equipment passes the verification, and if the digital signature of the request equipment passes the verification, determining the identity authentication result of the request equipment according to a second verification result in the second authentication result information.
Optionally, the determining module 650 determines whether the digital signature of the requesting device is verified to pass the verification specifically includes:
the second authentication server verifies the digital signature of the requesting device by using the acquired digital certificate of the requesting device, and if the receiving module 610 receives the first authentication response message, the determining module 650 determines that the digital signature of the requesting device is verified; or,
the verification module 640 verifies the digital signature of the requesting device by using the digital certificate of the requesting device obtained by decrypting the identity information ciphertext, and the determination module 650 determines whether the digital signature of the requesting device passes the verification according to the verification result; or,
when the second authentication result information further includes the digital certificate of the requesting device, the verifying module 640 verifies the digital signature of the requesting device by using the digital certificate of the requesting device in the second authentication result information, and the determining module 650 determines whether the digital signature of the requesting device passes verification according to the verification result; or,
when the second authentication result information further includes the digital certificate of the requesting device, the verifying module 640 verifies the consistency between the digital certificate of the requesting device in the second authentication result information and the digital certificate of the requesting device obtained by decrypting the identity information ciphertext, if the consistency is met, the digital certificate of the requesting device is used to verify the digital signature of the requesting device, and the determining module 650 determines whether the digital signature of the requesting device passes the verification according to the verification result.
Optionally, the third authentication response message sent by the sending module 630 further includes a message integrity check code, where the message integrity check code is generated by the authentication access controller through calculation of a message integrity check key on fields including the third authentication response message except the message integrity check code; the message integrity check key is generated in the same manner as the message encryption key.
Optionally, the message sent by the authentication access controller to the requesting device further includes a hash value calculated by the authentication access controller for the latest preamble message sent by the requesting device; the message sent by the authentication access controller to the first authentication server further comprises a hash value calculated by the authentication access controller on the received latest preamble message sent by the first authentication server.
Referring to fig. 7, an embodiment of the present application further provides a first authentication server 700, including:
a receiving module 710, configured to receive a first authentication request message sent by an authentication access controller, where the first authentication request message includes a digital certificate of a requesting device and an identity authentication code of the authentication access controller; the identity authentication code of the authentication access controller is generated by the authentication access controller through calculation on information including the digital certificate of the request equipment by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server;
a sending module 720, configured to send a first authentication response message to the authentication access controller, where the first authentication response message includes first authentication result information, a first digital signature of a second authentication server, second authentication result information, and a first message authentication code of the first authentication server; the first authentication result information includes a first verification result of an identity authentication code of the authentication access controller, the first digital signature is a digital signature generated by the second authentication server through calculation of signature data including the first authentication result information, the second authentication result information includes a second verification result of a digital certificate of the requesting device, and the first message authentication code of the first authentication server is generated by the first authentication server through calculation of information including the second authentication result information through a pre-shared key with the authentication access controller through a cryptographic algorithm agreed with the authentication access controller.
Optionally, the first authentication server 700 further includes:
the first verification module is used for verifying the identity authentication code of the authentication access controller to obtain a first verification result and verifying the validity of the digital certificate of the request equipment to obtain a second verification result;
a first generation module, configured to generate the first authentication result information according to information including the first verification result, generate the second authentication result information according to information including the second verification result, calculate and generate a first message authentication code of a first authentication server for the information including the second authentication result information, and calculate and generate the first digital signature for signature data including the first authentication result information;
a second generating module, configured to calculate and generate the first authentication response message according to information including the first authentication result information, the first digital signature, the second authentication result information, and a first message authentication code of the first authentication server.
Optionally, the first authentication server 700 further includes:
the second verification module is used for verifying the identity authentication code of the authentication access controller to obtain a first verification result;
a third generating module, configured to generate the first authentication result information according to information including the first verification result, calculate and generate a second digital signature for signature data including the first authentication result information and the digital certificate of the requesting device, or calculate and generate a second message authentication code for information including the first authentication result information and the digital certificate of the requesting device by using a cryptographic algorithm agreed with the second authentication server by using a pre-shared key of the second authentication server;
the sending module is further configured to send a second authentication request message to the second authentication server, where the second authentication request message includes the first authentication result information, the digital certificate of the requesting device, and the second digital signature, or the second authentication request message includes the first authentication result information, the digital certificate of the requesting device, and the second message authentication code;
the receiving module is further configured to receive a second authentication response message sent by the second authentication server, where the second authentication response message includes the first authentication result information, the first digital signature, the second authentication result information, and the third digital signature, or the second authentication response message includes the first authentication result information, the first digital signature, the second authentication result information, and the third message authentication code; the second authentication result information is generated by the second authentication server according to information including a second verification result, and the second verification result is obtained by performing validity verification on the digital certificate of the requesting device by the second authentication server; the first digital signature is generated by the second authentication server through calculation of signature data including the first authentication result information; the third digital signature is generated by the second authentication server through calculation of signature data including the second authentication result information, or the third message authentication code is generated by the second authentication server through calculation of information including the second authentication result information by using a cryptographic algorithm agreed with the first authentication server by using a pre-shared key of the first authentication server;
a third verification module, configured to verify the third digital signature using the public key of the second authentication server or verify the third message authentication code using a cryptographic algorithm agreed with the second authentication server using a pre-shared key of the second authentication server;
and a fourth generating module, configured to calculate, if the verification passes, a first message authentication code of the first authentication server from information including the second authentication result information, and generate the first authentication response message according to information including the first authentication result information, the first digital signature, the second authentication result information, and the first message authentication code of the first authentication server.
Optionally, the message sent by the first authentication server to the authentication access controller further includes a hash value calculated by the first authentication server on the received latest preamble message sent by the authentication access controller; the message sent by the first authentication server to the second authentication server further includes a hash value calculated by the first authentication server for the received latest preamble message sent by the second authentication server.
Referring to fig. 8, an embodiment of the present application further provides a second authentication server 800, including:
a receiving module 810, configured to receive a second authentication request message sent by the first authentication server, where the second authentication request message includes the first authentication result information, the digital certificate of the requesting device, and the second digital signature, or the second authentication request message includes the first authentication result information, the digital certificate of the requesting device, and the second message authentication code; the second digital signature is generated by the first authentication server through calculation of signature data including the first authentication result information and the digital certificate of the requesting device, or the second message authentication code is generated by the first authentication server through calculation of information including the first authentication result information and the digital certificate of the requesting device through a pre-shared key with the second authentication server by using a cryptographic algorithm agreed with the second authentication server;
a verification module 820, configured to verify the second digital signature using a public key of the first authentication server or verify the second message authentication code using a cryptographic algorithm agreed with the first authentication server using a pre-shared key of the first authentication server;
a generating module 830, configured to, if the verification passes, perform validity verification on the digital certificate of the requesting device to obtain a second verification result, generate second authentication result information according to information including the second verification result, calculate signature data including the first authentication result information to generate the first digital signature, calculate signature data including the second authentication result information to generate a third digital signature, or calculate information including the second authentication result information to generate a third message authentication code by using a cryptographic algorithm agreed with the first authentication server by using a pre-shared key of the first authentication server;
a sending module 840, configured to send a second authentication response message to the first authentication server, where the second authentication response message includes the first authentication result information, the first digital signature, the second authentication result information, and the third digital signature, or the second authentication response message includes the first authentication result information, the first digital signature, the second authentication result information, and the third message authentication code.
Optionally, the message sent by the second authentication server to the first authentication server further includes a hash value calculated by the second authentication server on the received latest preamble message sent by the first authentication server.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium may be at least one of the following media: various media capable of storing program codes, such as Read-Only Memory (ROM), RAM, magnetic disk, or optical disk.
It should be noted that, in the present specification, all the embodiments are described in a progressive manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the apparatus and system embodiments are described in a relatively simple manner since they correspond to and are consistent with the method embodiments, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described embodiments of the apparatus and system are only illustrative, and the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one position, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only one specific embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (42)
1. A method of identity authentication, the method comprising:
an authentication access controller receives an identity ciphertext message sent by a request device, wherein the identity ciphertext message comprises an identity information ciphertext of the request device, and the identity information ciphertext of the request device is generated by encrypting encrypted data including a digital certificate of the request device by using a message encryption key;
the authentication access controller decrypts the identity information ciphertext of the request device by using the message encryption key to obtain a digital certificate of the request device, and sends a first authentication request message to a trusted first authentication server, wherein the first authentication request message comprises the digital certificate of the request device and an identity authentication code of the authentication access controller; the identity authentication code of the authentication access controller is generated by the authentication access controller through calculation of information including the digital certificate of the request equipment by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server;
the authentication access controller receives a first authentication response message sent by the first authentication server, wherein the first authentication response message comprises first authentication result information, a first digital signature of a second authentication server trusted by the request device, second authentication result information and a first message authentication code of the first authentication server; the first authentication result information comprises a first verification result of an identity authentication code of the authentication access controller, the first digital signature is a digital signature generated by the second authentication server through calculation on signature data comprising the first authentication result information, the second authentication result information comprises a second verification result of a digital certificate of the request device, and a first message authentication code of the first authentication server is generated by the first authentication server through calculation on information comprising the second authentication result information by using a pre-shared key with the authentication access controller and a cryptographic algorithm agreed with the authentication access controller;
the authentication access controller verifies a first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server, and if the verification is passed, the authentication access controller determines an identity authentication result of the request device according to a second verification result in the second authentication result information; when the authentication access controller determines that the identity authentication result of the request equipment is legal, a third authentication response message is sent to the request equipment; or,
the authentication access controller verifies a first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server, and if the verification is passed, the authentication access controller sends a third authentication response message to the request device and determines an identity authentication result of the request device according to a second verification result in the second authentication result information; or,
the authentication access controller verifies a first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server; if the first message authentication code of the first authentication server passes the authentication, the authentication access controller determines the identity authentication result of the request device according to a second authentication result in the second authentication result information; the authentication access controller sends a third authentication response message to the requesting device;
wherein the third authentication response message includes an authentication result information ciphertext generated by the authentication access controller encrypting, with the message encryption key, encrypted data including the first authentication result information and the first digital signature;
and after receiving the third authentication response message, the requesting device decrypts the authentication result information ciphertext by using the message encryption key to obtain the first authentication result information and the first digital signature, verifies the first digital signature by using the public key of the second authentication server, and determines the identity authentication result of the authentication access controller according to the first verification result in the first authentication result information if the verification is passed.
2. The method of claim 1, wherein before the authenticating access controller receives an identity ciphertext message sent by a requesting device, the method further comprises:
the authentication access controller sends a key request message to the request device, wherein the key request message comprises a key exchange parameter of the authentication access controller;
the request equipment performs key exchange calculation according to a temporary private key corresponding to key exchange parameters of the request equipment and a temporary public key included in the key exchange parameters of the authentication access controller to generate a first key, and calculates the message encryption key by using a key derivation algorithm according to information including the first key;
the identity ciphertext message further includes a key exchange parameter of the requesting device;
and the authentication access controller performs key exchange calculation according to a temporary private key corresponding to key exchange parameters of the authentication access controller and a temporary public key included in the key exchange parameters of the request equipment to generate the first key, and calculates the message encryption key by using the key derivation algorithm according to information including the first key.
3. The method of claim 2, wherein the key request message further includes a first random number generated by the authentication access controller;
the step of calculating, by the requesting device, the message encryption key specifically includes:
the request device calculates the message encryption key according to information including the first key, the first random number and a second random number generated by the request device;
correspondingly, the identity ciphertext message further comprises the second random number;
the calculating, by the authentication access controller, the message encryption key specifically includes:
the authentication access controller calculates the message encryption key based on information including the first key, the first random number, and the second random number.
4. The method of claim 3, wherein the identity ciphertext message further comprises the first nonce;
before the authenticating access controller calculates the message encryption key, the method further comprises:
the authentication access controller verifies the consistency of the first random number in the identity ciphertext message and the first random number generated by the authentication access controller;
and if the verification is passed, the authentication access controller calculates the message encryption key again.
5. The method according to claim 2, wherein the key request message further includes security capability parameter information supported by the authentication access controller; the method further comprises the following steps:
the request equipment determines a specific security policy used by the request equipment according to the security capability parameter information;
the particular security policy is also included in the identity ciphertext message.
6. The method according to claim 2, wherein the key request message further includes an identity of at least one authentication server trusted by the authentication access controller; the method further comprises:
the request equipment determines the identity of at least one authentication server trusted by the request equipment according to the identity of at least one authentication server trusted by the authentication access controller;
the identity cryptograph message further includes an identity of at least one authentication server trusted by the requesting device; the method further comprises the following steps:
and the authentication access controller determines the first authentication server according to the identity of the at least one authentication server trusted by the request equipment in the identity ciphertext message and the identity of the at least one authentication server trusted by the authentication access controller in the key request message.
7. The method according to claim 1, wherein the identity ciphertext message further includes an identity of at least one authentication server trusted by the requesting device; the method further comprises:
and the authentication access controller determines the first authentication server according to the identity of at least one authentication server trusted by the request equipment and the identity of an authentication server trusted by the authentication access controller.
8. The method according to claim 1, wherein the first authentication request message further includes an identity of the authentication access controller and/or a first random number generated by the authentication access controller;
correspondingly, the first authentication response message further includes an identity of the authentication access controller and/or the first random number;
before the authenticating access controller determines the identity authentication result of the requesting device, the method further comprises:
the authentication access controller verifies the consistency of the identity of the authentication access controller in the first authentication response message and the identity of the authentication access controller; and/or verifying the consistency of the first random number in the first authentication response message and the first random number generated by the authentication access controller;
and if the authentication is passed, the authentication access controller determines the identity authentication result of the request equipment according to a second authentication result in the second authentication result information.
9. The method according to claim 1, wherein the first authentication request message further includes an identity of the requesting device, and/or a second random number generated by the requesting device; the identity of the requesting device is obtained by the access controller decrypting the identity information ciphertext of the requesting device, and the second random number is obtained by the authentication access controller from the identity ciphertext message;
correspondingly, the first authentication response message further includes the identity of the requesting device and/or the second random number; and the encrypted data of the authentication result information ciphertext in the third authentication response message further comprises the identity of the requesting device and/or the second random number;
correspondingly, the requesting device decrypts the authentication result information ciphertext in the third authentication response message to obtain the identity of the requesting device and/or the second random number;
before the requesting device determines the result of the authentication of the identity of the authenticated access controller, the method further comprises:
the request equipment verifies the consistency of the identity of the request equipment obtained by decrypting the authentication result information ciphertext and the identity of the request equipment, and/or verifies the consistency of the second random number obtained by decrypting the authentication result information ciphertext and the second random number generated by the request equipment;
and if the authentication is passed, the requesting equipment determines the identity authentication result of the authentication access controller according to the first authentication result in the first authentication result information.
10. The method of claim 1, wherein when the identity cryptogram message further includes a digital signature of the requesting device, before the authenticating access controller determines the identity authentication result of the requesting device, the method further comprises:
and the authentication access controller determines whether the digital signature of the request equipment passes the verification, and if the digital signature of the request equipment passes the verification, the authentication access controller determines the identity authentication result of the request equipment according to a second verification result in the second authentication result information.
11. The method of claim 10, wherein the authenticating access controller determining whether the digital signature of the requesting device is verified comprises:
the second authentication server verifies the digital signature of the request device by using the acquired digital certificate of the request device, and if the authentication access controller receives the first authentication response message, the second authentication server determines that the digital signature of the request device is verified; or,
the authentication access controller verifies the digital signature of the request equipment by using the digital certificate of the request equipment obtained by decrypting the identity information ciphertext, and determines whether the digital signature of the request equipment passes the verification according to a verification result; or,
when the second authentication result information further comprises the digital certificate of the request device, the authentication access controller verifies the digital signature of the request device by using the digital certificate of the request device in the second authentication result information, and determines whether the digital signature of the request device passes the verification according to the verification result; or,
when the second authentication result information further comprises the digital certificate of the requesting device, the authentication access controller verifies the consistency of the digital certificate of the requesting device in the second authentication result information and the digital certificate of the requesting device obtained by decrypting the identity information ciphertext; and if so, the authentication access controller verifies the digital signature of the request equipment by using the digital certificate of the request equipment, and determines whether the digital signature of the request equipment passes the verification according to the verification result.
12. The method according to claim 1, wherein the third authentication response message further includes a message integrity check code, and the message integrity check code is calculated by the authentication access controller using a message integrity check key for fields including the third authentication response message except the message integrity check code; the generation mode of the message integrity check key used by the authentication access controller is the same as the generation mode of the message encryption key by the authentication access controller;
before the requesting device determines the authentication result of the authenticating access controller, the method further comprises:
the request equipment verifies the message integrity check code by using a message integrity check key; if the authentication is passed, the step of determining the identity authentication result of the authentication access controller is executed again; the message integrity check key utilized by the requesting device is generated in the same manner as the message encryption key generated by the requesting device.
13. The method according to any of claims 1 to 12, wherein the first authentication server trusted by the authentication access controller and the second authentication server trusted by the requesting device are the same authentication server; the method further comprises:
the first authentication server verifies the identity authentication code of the authentication access controller to obtain a first verification result, the legality of the digital certificate of the requesting device is verified to obtain a second verification result, the first authentication result information is generated according to the information including the first verification result, generating the second authentication result information based on information including the second verification result, a first message authentication code of the first authentication server is generated by calculation for information including the second authentication result information, generating the first digital signature by computing signature data including the first authentication result information, generating the first authentication response message according to information including the first authentication result information, the first digital signature, the second authentication result information, and a first message authentication code of the first authentication server.
14. The method according to any of claims 1 to 12, wherein the first authentication server trusted by the authentication access controller and the second authentication server trusted by the requesting device are two different authentication servers; the method further comprises:
the first authentication server verifies the identity authentication code of the authentication access controller to obtain a first verification result, generates first authentication result information according to information including the first verification result, calculates and generates a second digital signature on signature data including the first authentication result information and the digital certificate of the requesting device or calculates and generates a second message authentication code on the information including the first authentication result information and the digital certificate of the requesting device by using a pre-shared key of the second authentication server and a cryptographic algorithm agreed with the second authentication server;
the first authentication server sends a second authentication request message to a second authentication server, wherein the second authentication request message comprises the first authentication result information, the digital certificate of the requesting device and the second digital signature, or the second authentication request message comprises the first authentication result information, the digital certificate of the requesting device and the second message authentication code; verifying the second digital signature by the second authentication server using the public key of the first authentication server or verifying the second message authentication code by the second authentication server using the pre-shared key with the first authentication server using the cryptographic algorithm agreed with the first authentication server, if the verification is passed, performing validity verification on the digital certificate of the requesting device by the second authentication server to obtain a second verification result, generating the second authentication result information according to information including the second verification result, calculating signature data including the first authentication result information to generate the first digital signature, calculating signature data including the second authentication result information to generate a third digital signature or using the pre-shared key with the first authentication server, and calculating the information including the second authentication result information using the cryptographic algorithm agreed with the first authentication server Calculating to generate a third message authentication code;
the first authentication server receives a second authentication response message sent by the second authentication server, wherein the second authentication response message comprises the first authentication result information, the first digital signature, the second authentication result information and the third digital signature, or the second authentication response message comprises the first authentication result information, the first digital signature, the second authentication result information and the third message authentication code;
the first authentication server verifies the third digital signature by using a public key of the second authentication server or verifies the third message authentication code by using a pre-shared key of the second authentication server through a cryptographic algorithm agreed with the second authentication server, if the third message authentication code passes the verification, a first message authentication code of the first authentication server is generated by calculating information including the second authentication result information, and the first authentication response message is generated according to the information including the first authentication result information, the first digital signature, the second authentication result information and the first message authentication code of the first authentication server.
15. The method according to any of claims 1 to 12, wherein the message sent by said requesting device to said authenticating access controller further comprises a hash value computed by said requesting device on the latest preamble message received from said authenticating access controller;
when the authentication access controller receives the message sent by the request device, the hash value in the received message is verified first, and the subsequent operation is executed after the verification is passed;
the message sent by the authentication access controller to the request device also comprises a hash value calculated by the authentication access controller on the latest preamble message sent by the request device;
when the request device receives the message sent by the authentication access controller, the hash value in the received message is verified first, and the subsequent operation is executed after the verification is passed;
the message sent by the authentication access controller to the first authentication server further comprises a hash value calculated by the authentication access controller on the received latest preorder message sent by the first authentication server;
when the first authentication server receives the message sent by the authentication access controller, the hash value in the received message is verified, and the subsequent operation is executed after the verification is passed;
the message sent by the first authentication server to the authentication access controller also comprises a hash value calculated by the first authentication server on the received latest preorder message sent by the authentication access controller;
when the authentication access controller receives the message sent by the first authentication server, the hash value in the received message is verified, and the subsequent operation is executed after the verification is passed;
the message sent by the first authentication server to the second authentication server also comprises a hash value calculated by the first authentication server on the received latest preorder message sent by the second authentication server;
when the second authentication server receives the message sent by the first authentication server, the hash value in the received message is verified, and the subsequent operation is executed after the verification is passed;
the message sent by the second authentication server to the first authentication server further comprises a hash value calculated by the second authentication server on the received latest preamble message sent by the first authentication server;
when the first authentication server receives the message sent by the second authentication server, the hash value in the received message is verified first, and the subsequent operation is executed after the verification is passed.
16. A requesting device, the requesting device comprising:
a sending module, configured to send an identity ciphertext message to an authentication access controller, where the identity ciphertext message includes an identity information ciphertext of the requesting device, and the identity information ciphertext of the requesting device is generated by encrypting, by the requesting device, encrypted data that includes a digital certificate of the requesting device by using a message encryption key;
a receiving module, configured to receive a third authentication response message sent by the authentication access controller, where the third authentication response message includes an authentication result information ciphertext generated by the authentication access controller encrypting, by using the message encryption key, encrypted data that includes the first authentication result information and the first digital signature; the first authentication result information comprises a first verification result of an identity authentication code of the authentication access controller, and the first digital signature is a digital signature generated by a second authentication server through calculation on signature data comprising the first authentication result information;
the decryption module is used for decrypting the authentication result information ciphertext by using the message encryption key to obtain the first authentication result information and the first digital signature;
the verification module is used for verifying the first digital signature by utilizing the public key of the second authentication server;
and the determining module is used for determining the identity authentication result of the authentication access controller according to the first authentication result in the first authentication result information if the authentication is passed.
17. The requesting device of claim 16, wherein the receiving module is further configured to: before the sending module sends the identity ciphertext message, receiving a key request message sent by the authentication access controller, wherein the key request message comprises a key exchange parameter of the authentication access controller; the requesting device further includes:
a calculation module, configured to perform key exchange calculation according to a temporary private key corresponding to a key exchange parameter of the requesting device and a temporary public key included in a key exchange parameter of the authentication access controller to generate a first key, and calculate the message encryption key according to information including the first key by using a key derivation algorithm;
the identity cryptogram message also includes the key exchange parameters of the requesting device.
18. The requesting device of claim 17, wherein the key request message further includes a first random number generated by the authentication access controller;
the calculation module is specifically configured to: calculating the message encryption key from information including the first key, the first random number, and a second random number generated by the requesting device;
correspondingly, the identity ciphertext message further includes the second random number.
19. The requesting device of claim 18, wherein the identity ciphertext message sent by the sending module further comprises the first nonce.
20. The requesting device of claim 17, wherein the key request message further includes security capability parameter information supported by the authentication access controller;
the determination module is further to: determining a specific security policy used by the requesting device according to the security capability parameter information; the particular security policy is also included in the identity ciphertext message.
21. The requesting device of claim 17, wherein the key request message further includes an identity of at least one authentication server trusted by the authentication access controller;
the determination module is further to: determining the identity of at least one authentication server trusted by the request equipment according to the identity of at least one authentication server trusted by the authentication access controller; the identity cryptogram message further includes an identity of at least one authentication server trusted by the requesting device.
22. The requesting device of claim 17, wherein the identity ciphertext message sent by the sending module further includes an identity of at least one authentication server trusted by the requesting device.
23. The requesting device according to claim 16, wherein the encrypted data of the identity information ciphertext of the requesting device further includes an identity of the requesting device, and the identity ciphertext message further includes a second random number generated by the requesting device;
correspondingly, the encrypted data of the authentication result information ciphertext in the third authentication response message further includes the identity of the requesting device and/or the second random number;
correspondingly, the decryption module decrypts the authentication result information ciphertext in the third authentication response message to obtain the identity of the requesting device and/or the second random number;
the verification module is further configured to: before the determining module determines the identity authentication result of the authentication access controller, verifying the consistency between the identity identifier of the request device obtained by decrypting the authentication result information ciphertext and the identity identifier of the request device, and/or verifying the consistency between the second random number obtained by decrypting the authentication result information ciphertext and the second random number generated by the request device; if the authentication is passed, the determining module determines the identity authentication result of the authentication access controller according to the first authentication result in the first authentication result information.
24. The requesting device of claim 17, wherein the third authentication response message further includes a message integrity check code; the verification module is further to: before the determining module determines the identity authentication result of the authentication access controller, verifying the message integrity check code by using a message integrity check key; if the authentication is passed, the determining module determines the identity authentication result of the authentication access controller according to the first authentication result in the first authentication result information; the message integrity check key is generated in the same manner as the message encryption key.
25. The requesting device of any of claims 16-24, wherein the message sent by said requesting device to said authenticating access controller further comprises a hash value computed by said requesting device on the latest preamble message received from said authenticating access controller.
26. An authenticated access controller, characterized in that the authenticated access controller comprises:
a receiving module, configured to receive an identity ciphertext message sent by a requesting device, where the identity ciphertext message includes an identity information ciphertext of the requesting device, and the identity information ciphertext of the requesting device is generated by encrypting, by the requesting device, encrypted data that includes a digital certificate of the requesting device by using a message encryption key;
the decryption module is used for decrypting the identity information ciphertext of the request equipment by using the message encryption key to obtain the digital certificate of the request equipment;
a sending module, configured to send a first authentication request message to a first authentication server trusted by the authentication access controller, where the first authentication request message includes a digital certificate of the requesting device and an identity authentication code of the authentication access controller; the identity authentication code of the authentication access controller is generated by the authentication access controller through calculation on information including the digital certificate of the request equipment by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server;
the receiving module is further configured to receive a first authentication response message sent by the first authentication server, where the first authentication response message includes first authentication result information, a first digital signature of a second authentication server trusted by the requesting device, second authentication result information, and a first message authentication code of the first authentication server; the first authentication result information comprises a first verification result of an identity authentication code of the authentication access controller, the first digital signature is a digital signature generated by the second authentication server through calculation on signature data comprising the first authentication result information, the second authentication result information comprises a second verification result of a digital certificate of the request device, and a first message authentication code of the first authentication server is generated by the first authentication server through calculation on information comprising the second authentication result information by using a pre-shared key with the authentication access controller and a cryptographic algorithm agreed with the authentication access controller;
the verification module is used for verifying the first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server, and if the verification is passed, the determining module determines the identity authentication result of the request equipment according to a second verification result in the second authentication result information; when the determining module determines that the identity authentication result of the requesting device is legal, the sending module sends a third authentication response message to the requesting device; or,
the authentication module is used for verifying a first message authentication code of the first authentication server by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server, and if the authentication is passed, the sending module sends a third authentication response message to the request device and the determining module determines the identity authentication result of the request device according to a second authentication result in the second authentication result information; or,
a first message authentication code for verifying the first authentication server using a cryptographic algorithm agreed with the first authentication server using a pre-shared key with the first authentication server; if the first message authentication code of the first authentication server passes the verification, the determining module determines the identity authentication result of the request device according to a second verification result in the second authentication result information; the sending module sends a third authentication response message to the requesting device;
wherein the third authentication response message includes an authentication result information ciphertext generated by the authentication access controller encrypting, with the message encryption key, encrypted data including the first authentication result information and the first digital signature.
27. The authenticated access controller of claim 26, wherein said sending module is further configured to: before the receiving module receives the identity ciphertext message, sending a key request message to the request device, wherein the key request message comprises a key exchange parameter of the authentication access controller; the identity ciphertext message further comprises a key exchange parameter of the request device;
the authentication access controller further comprises:
and the calculation module is used for performing key exchange calculation according to a temporary private key corresponding to the key exchange parameters of the authentication access controller and a temporary public key included in the key exchange parameters of the request equipment to generate a first key, and calculating the message encryption key by using a key derivation algorithm according to information including the first key.
28. The authenticated access controller of claim 27, wherein the key request message further includes a first random number generated by the authenticated access controller; the identity ciphertext message further comprises a second random number generated by the request device;
the calculation module is specifically configured to: calculating the message encryption key from information including the first key, the first random number, and the second random number.
29. The authentication access controller of claim 28, wherein the identity ciphertext message further comprises the first nonce; the verification module is further to: before the calculation module calculates the message encryption key, verifying the consistency of a first random number in the identity ciphertext message and a first random number generated by the authentication access controller; and if the verification is passed, the calculation module recalculates the message encryption key.
30. The authenticated access controller of claim 27, wherein the key request message further includes an identity of at least one authentication server trusted by the authenticated access controller; the identity ciphertext message also comprises an identity of at least one authentication server trusted by the request equipment;
the determining module is further configured to: and determining the first authentication server according to the identity of the at least one authentication server trusted by the requesting device in the identity ciphertext message and the identity of the at least one authentication server trusted by the authentication access controller in the key request message.
31. The authentication access controller of claim 26, wherein the identity ciphertext message further comprises an identity of at least one authentication server trusted by the requesting device; the determining module is further configured to: and determining the first authentication server according to the identity of at least one authentication server trusted by the request equipment and the identity of an authentication server trusted by the authentication access controller.
32. The authentication access controller according to claim 26, further comprising an identity of the authentication access controller and/or a first random number generated by the authentication access controller in the first authentication request message;
correspondingly, the first authentication response message further includes an identity of the authentication access controller and/or the first random number;
the verification module is further to: verifying the identity of the authentication access controller in the first authentication response message and the identity of the authentication access controller, and/or verifying the identity of the first random number in the first authentication response message and the first random number generated by the authentication access controller; and if the verification is passed, the determining module determines the identity authentication result of the request equipment according to the second verification result in the second authentication result information.
33. The authenticated access controller of claim 26, wherein when the identity ciphertext message further comprises a digital signature of the requesting device, the determining module is further configured to: and determining whether the digital signature of the request equipment passes the verification, and if the digital signature of the request equipment passes the verification, determining the identity authentication result of the request equipment according to a second authentication result in the second authentication result information.
34. The authenticated access controller of claim 33, wherein said means for determining whether the digital signature of the requesting device verifies specifically comprises:
the second authentication server verifies the digital signature of the request device by using the acquired digital certificate of the request device, and if the receiving module receives the first authentication response message, the determining module determines that the digital signature of the request device is verified; or,
the verification module verifies the digital signature of the request equipment by using the digital certificate of the request equipment obtained by decrypting the identity information ciphertext, and the determination module determines whether the digital signature of the request equipment passes the verification according to the verification result; or,
when the second authentication result information further includes the digital certificate of the requesting device, the verification module verifies the digital signature of the requesting device by using the digital certificate of the requesting device in the second authentication result information, and the determination module determines whether the digital signature of the requesting device passes the verification according to the verification result; or,
when the second authentication result information further includes the digital certificate of the request device, the verification module verifies the consistency between the digital certificate of the request device in the second authentication result information and the digital certificate of the request device obtained by decrypting the identity information ciphertext, if the consistency is consistent, the digital certificate of the request device is used for verifying the digital signature of the request device, and the determination module determines whether the digital signature of the request device passes verification according to the verification result.
35. The authentication access controller according to claim 27, wherein the third authentication response message sent by the sending module further includes a message integrity check code, and the message integrity check code is generated by the authentication access controller by calculating, by using a message integrity check key, fields included in the third authentication response message except for the message integrity check code; the message integrity check key is generated in the same manner as the message encryption key.
36. An authenticating access controller according to any one of claims 26 to 35, wherein the message sent by the authenticating access controller to the requesting device further includes a hash value calculated by the authenticating access controller on the latest preamble message received from the requesting device; the message sent by the authentication access controller to the first authentication server further comprises a hash value calculated by the authentication access controller on the received latest preamble message sent by the first authentication server.
37. A first authentication server, the first authentication server comprising:
a receiving module, configured to receive a first authentication request message sent by an authentication access controller, where the first authentication request message includes a digital certificate of a requesting device and an identity authentication code of the authentication access controller; the identity authentication code of the authentication access controller is generated by the authentication access controller through calculation on information including the digital certificate of the request equipment by using a pre-shared key of the first authentication server and a cryptographic algorithm agreed with the first authentication server;
a sending module, configured to send a first authentication response message to the authentication access controller, where the first authentication response message includes first authentication result information, a first digital signature of a second authentication server, second authentication result information, and a first message authentication code of the first authentication server; the first authentication result information includes a first verification result of an identity authentication code of the authentication access controller, the first digital signature is a digital signature generated by the second authentication server through calculation of signature data including the first authentication result information, the second authentication result information includes a second verification result of a digital certificate of the requesting device, and the first message authentication code of the first authentication server is generated by the first authentication server through calculation of information including the second authentication result information through a pre-shared key with the authentication access controller through a cryptographic algorithm agreed with the authentication access controller.
38. The first authentication server of claim 37, further comprising:
the first verification module is used for verifying the identity authentication code of the authentication access controller to obtain a first verification result and verifying the validity of the digital certificate of the request equipment to obtain a second verification result;
a first generation module, configured to generate the first authentication result information according to information including the first verification result, generate the second authentication result information according to information including the second verification result, calculate and generate a first message authentication code of a first authentication server for the information including the second authentication result information, and calculate and generate the first digital signature for signature data including the first authentication result information;
a second generating module, configured to calculate and generate the first authentication response message according to information that includes the first authentication result information, the first digital signature, the second authentication result information, and a first message authentication code of the first authentication server.
39. The first authentication server of claim 37, further comprising:
the second verification module is used for verifying the identity authentication code of the authentication access controller to obtain a first verification result;
a third generating module, configured to generate the first authentication result information according to information including the first verification result, calculate and generate a second digital signature for signature data including the first authentication result information and the digital certificate of the requesting device, or calculate and generate a second message authentication code for information including the first authentication result information and the digital certificate of the requesting device by using a cryptographic algorithm agreed with the second authentication server by using a pre-shared key of the second authentication server;
the sending module is further configured to send a second authentication request message to the second authentication server, where the second authentication request message includes the first authentication result information, the digital certificate of the requesting device, and the second digital signature, or the second authentication request message includes the first authentication result information, the digital certificate of the requesting device, and the second message authentication code;
the receiving module is further configured to receive a second authentication response message sent by the second authentication server, where the second authentication response message includes the first authentication result information, the first digital signature, the second authentication result information, and the third digital signature, or the second authentication response message includes the first authentication result information, the first digital signature, the second authentication result information, and the third message authentication code; the second authentication result information is generated by the second authentication server according to information including a second verification result, and the second verification result is obtained by performing validity verification on the digital certificate of the requesting device by the second authentication server; the first digital signature is generated by the second authentication server through calculation of signature data including the first authentication result information; the third digital signature is generated by the second authentication server through calculation of signature data including the second authentication result information, or the third message authentication code is generated by the second authentication server through calculation of information including the second authentication result information by using a cryptographic algorithm agreed with the first authentication server by using a pre-shared key of the first authentication server;
a third verification module, configured to verify the third digital signature using the public key of the second authentication server or verify the third message authentication code using a cryptographic algorithm agreed with the second authentication server using a pre-shared key of the second authentication server;
and a fourth generating module, configured to calculate, if the verification passes, a first message authentication code of the first authentication server for information including the second authentication result information, and generate the first authentication response message according to information including the first authentication result information, the first digital signature, the second authentication result information, and the first message authentication code of the first authentication server.
40. The first authentication server according to any of claims 37 to 39, wherein the message sent by the first authentication server to the authentication access controller further comprises a hash value calculated by the first authentication server on the received latest preamble message sent by the authentication access controller; the message sent by the first authentication server to the second authentication server further includes a hash value calculated by the first authentication server for the received latest preamble message sent by the second authentication server.
41. A second authentication server, characterized in that the second authentication server comprises:
a receiving module, configured to receive a second authentication request message sent by the first authentication server, where the second authentication request message includes the first authentication result information, the digital certificate of the requesting device, and the second digital signature, or the second authentication request message includes the first authentication result information, the digital certificate of the requesting device, and the second message authentication code; the second digital signature is generated by the first authentication server through calculation of signature data including the first authentication result information and the digital certificate of the requesting device, or the second message authentication code is generated by the first authentication server through calculation of information including the first authentication result information and the digital certificate of the requesting device through a pre-shared key with the second authentication server by using a cryptographic algorithm agreed with the second authentication server;
a verification module, configured to verify the second digital signature using a public key of the first authentication server or verify the second message authentication code using a cryptographic algorithm agreed with the first authentication server using a pre-shared key of the first authentication server;
a generating module, configured to perform validity verification on the digital certificate of the requesting device to obtain a second verification result if the verification passes, generate second authentication result information according to information including the second verification result, calculate signature data including the first authentication result information to generate the first digital signature, calculate signature data including the second authentication result information to generate a third digital signature, or calculate information including the second authentication result information to generate a third message authentication code by using a cryptographic algorithm agreed with the first authentication server by using a pre-shared key of the first authentication server;
a sending module, configured to send a second authentication response message to the first authentication server, where the second authentication response message includes the first authentication result information, the first digital signature, the second authentication result information, and the third digital signature, or the second authentication response message includes the first authentication result information, the first digital signature, the second authentication result information, and the third message authentication code.
42. The second authentication server of claim 41, wherein the message sent by the second authentication server to the first authentication server further comprises a hash value calculated by the second authentication server on the latest preamble message received from the first authentication server.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011569180.7A CN114760027A (en) | 2020-12-26 | 2020-12-26 | Identity authentication method and device |
PCT/CN2021/140036 WO2022135384A1 (en) | 2020-12-26 | 2021-12-21 | Identity authentication method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011569180.7A CN114760027A (en) | 2020-12-26 | 2020-12-26 | Identity authentication method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114760027A true CN114760027A (en) | 2022-07-15 |
Family
ID=82158814
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011569180.7A Pending CN114760027A (en) | 2020-12-26 | 2020-12-26 | Identity authentication method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114760027A (en) |
WO (1) | WO2022135384A1 (en) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101409621B (en) * | 2008-11-13 | 2011-05-11 | 中国移动通信集团北京有限公司 | Multipart identification authentication method and system base on equipment |
CN101616410B (en) * | 2009-06-25 | 2011-08-10 | 中兴通讯股份有限公司 | Access method and access system for cellular mobile communication network |
CN101631113B (en) * | 2009-08-19 | 2011-04-06 | 西安西电捷通无线网络通信股份有限公司 | Security access control method of wired LAN and system thereof |
US20140133656A1 (en) * | 2012-02-22 | 2014-05-15 | Qualcomm Incorporated | Preserving Security by Synchronizing a Nonce or Counter Between Systems |
CN102739687B (en) * | 2012-07-09 | 2016-03-23 | 广州杰赛科技股份有限公司 | Based on application service Network Access Method and the system of mark |
-
2020
- 2020-12-26 CN CN202011569180.7A patent/CN114760027A/en active Pending
-
2021
- 2021-12-21 WO PCT/CN2021/140036 patent/WO2022135384A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2022135384A1 (en) | 2022-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103532713B (en) | Sensor authentication and shared key production method and system and sensor | |
CN111654481B (en) | Identity authentication method, identity authentication device and storage medium | |
WO2022135391A1 (en) | Identity authentication method and apparatus, and storage medium, program and program product | |
WO2022135399A1 (en) | Identity authentication method, authentication access controller, request device, storage medium, program, and program product | |
CN103138923B (en) | A kind of internodal authentication, Apparatus and system | |
CN114696999A (en) | Identity authentication method and device | |
WO2022135379A1 (en) | Identity authentication method and apparatus | |
WO2022135388A1 (en) | Identity authentication method and apparatus, device, chip, storage medium, and program | |
WO2022135383A1 (en) | Identity authentication method and apparatus | |
WO2022135394A1 (en) | Identity authentication method and apparatus, storage medium, program, and program product | |
CN114760035A (en) | Identity authentication method and device | |
WO2022135384A1 (en) | Identity authentication method and apparatus | |
WO2022135418A1 (en) | Identity authentication method and apparatus | |
WO2022135387A1 (en) | Identity authentication method and apparatus | |
WO2022135385A1 (en) | Identity authentication method and apparatus | |
WO2022135386A1 (en) | Method and device for identity authentication | |
WO2022135404A1 (en) | Identity authentication method and device, storage medium, program, and program product | |
WO2022135382A1 (en) | Identity authentication method and apparatus | |
WO2022135378A1 (en) | Identity authentication method and apparatus | |
CN114760031A (en) | Identity authentication method and device | |
WO2022135380A1 (en) | Identity authentication method and apparatus | |
WO2022135377A1 (en) | Identity authentication method and apparatus, and device, chip, storage medium and program | |
CN114760033A (en) | Identity authentication method and device | |
CN114760039A (en) | Identity authentication method and device | |
CN118450383A (en) | Network access method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |