CN115225323A - Public certificate-based password-free authentication method - Google Patents

Public certificate-based password-free authentication method Download PDF

Info

Publication number
CN115225323A
CN115225323A CN202210675293.8A CN202210675293A CN115225323A CN 115225323 A CN115225323 A CN 115225323A CN 202210675293 A CN202210675293 A CN 202210675293A CN 115225323 A CN115225323 A CN 115225323A
Authority
CN
China
Prior art keywords
authentication
security terminal
password
unified
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210675293.8A
Other languages
Chinese (zh)
Inventor
王良霖
余力
陈晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Strait Cornerstone Technology Group Co ltd
Original Assignee
Fujian Strait Cornerstone Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Strait Cornerstone Technology Group Co ltd filed Critical Fujian Strait Cornerstone Technology Group Co ltd
Priority to CN202210675293.8A priority Critical patent/CN115225323A/en
Publication of CN115225323A publication Critical patent/CN115225323A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a password-free authentication method based on a public certificate, which comprises the following steps: s1: constructing a password-free authentication system, wherein the password-free authentication system consists of a uniform security terminal, an authentication agent, a zero trust gateway, a uniform authentication service platform and system background services; s2: the user registers through the unified security terminal, the authentication agent sends an authentication request to the unified security terminal, and the unified security terminal performs entity authentication according to user selection. The invention is based on public key algorithm, and utilizes public cipher certificate mechanism to realize the non-encryption of user identity authentication, because the non-encryption eliminates the potential safety hazard of the account related to the cipher, and at the same time, the invention is not afraid of the violent cracking means of the cipher in any form, and supports the non-invasive upgrade and reconstruction of the existing system by providing a unified authentication service platform.

Description

Public certificate-based password-free authentication method
Technical Field
The invention relates to the technical field of password-free authentication, in particular to a password-free authentication method based on a public certificate.
Background
The existing system generally adopts a private key technology-based account and password pairing mode to perform user identity authentication, and has several problems: for a system user, the password is simple and easy to leak, the password is complex and easy to lose, and whether the password is leaked or not cannot be known; for system developers, the non-functional safety requirements such as whether password storage is safe, whether password transmission is safe, whether passwords record logs in a plaintext mode and the like are met, and the system development difficulty and workload are increased; for system operation and maintenance personnel, the frequent occurrence of security events caused by password leakage or password loss is tired of coping with various passwords and security problems caused by passwords provided by system users, and based on the situation, a password-free authentication method based on a public certificate is provided.
Disclosure of Invention
Based on the technical problems in the background art, the invention provides a password-free authentication method based on a public certificate.
The invention provides a password-free authentication method based on a public certificate, which comprises the following steps:
s1: constructing a password-free authentication system, wherein the password-free authentication system consists of a uniform security terminal, an authentication agent, a zero trust gateway, a uniform authentication service platform and system background services;
s2: the user registers through the unified security terminal, the authentication agent sends an authentication request to the unified security terminal, and the unified security terminal performs entity authentication according to user selection;
s3: after the entity authentication is completed by the unified security terminal in the S2, the unified security terminal starts a public key algorithm and dynamically generates a public key certificate;
s4: the unified security terminal sends the public key certificate dynamically generated in the step S3 to the authentication agent;
s5: the authentication agent forwards the public key certificate dynamically generated in the step 3 to the zero trust gateway;
s6: the zero-trust gateway registers the public key certificate in S5 to the unified authentication service platform;
s7: s6, after the public key certificate is registered, the unified authentication service platform issues a system access token to the zero trust gateway;
s8, the zero trust gateway issues an access token to the authentication proxy forwarding system;
s9: the user can log in through the uniform security terminal and then can access the background service of the existing system after the user is successfully registered;
s10: the authentication agent forwards the access request to the zero trust gateway;
s11, the zero trust gateway verifies whether the access token is legal and valid, if the token is invalid, further access is refused, and if the token passes the verification, the zero trust gateway forwards a service request to a system background service;
s12: the user access is successful.
Preferably, in S2, the entity authentication method of the unified security terminal includes fingerprint authentication, iris authentication, portrait authentication and mobile phone authentication, and the entity authentication method of the unified security terminal further supports plug-in authentication.
Preferably, in S2, the entity authentication mode supports predefinition.
Preferably, in S3, the unified security terminal further detects its own unique identification, secure generation, storage, invocation of the public certificate, and a secure environment.
Preferably, in S1, the password-less authentication system is a password-less system that uses a public password certificate mechanism to implement user identity authentication based on a public key algorithm.
Preferably, in S1, the unified security terminal, the authentication proxy, the zero trust gateway, the unified authentication service platform, and the system background service are independent from each other.
Compared with the prior art, the invention is based on the public key algorithm, utilizes the public password certificate mechanism, realizes the password-free user identity authentication, eliminates the password-related account potential safety hazard due to the password-free password, is not afraid of the password brute-force cracking means in any form, and supports the non-invasive upgrading and reconstruction of the prior system by providing the unified authentication service platform.
Drawings
Fig. 1 is a connection diagram of a public certificate-based password-less authentication method according to the present invention.
Detailed Description
The present invention will be further illustrated with reference to the following specific examples.
Examples
Referring to fig. 1, this embodiment proposes a public certificate-based password-less authentication method, which includes the following steps:
s1: the method comprises the following steps of constructing a password-free authentication system, wherein the password-free authentication system is a password-free system which is based on a public key algorithm and utilizes a public password certificate mechanism to realize user identity authentication, the password-free authentication system consists of a uniform security terminal, an authentication proxy, a zero trust gateway, a uniform authentication service platform and system background services, and the uniform security terminal, the authentication proxy, the zero trust gateway, the uniform authentication service platform and the system background services are mutually independent;
s2: the user registers through the unified security terminal, the authentication agent sends an authentication request to the unified security terminal, and the unified security terminal performs entity authentication according to user selection, wherein an entity authentication mode supports predefinition, the entity authentication mode of the unified security terminal comprises fingerprint authentication, iris authentication, portrait authentication and mobile phone authentication, and the entity authentication mode of the unified security terminal also supports plug-in type authentication;
s3: after the entity authentication is completed by the unified security terminal in the S2, the unified security terminal starts a public key algorithm and dynamically generates a public key certificate;
s4: the unified security terminal sends the public key certificate dynamically generated in the step S3 to the authentication agent;
s5: the authentication agent forwards the public key certificate dynamically generated in the S3 to the zero trust gateway;
s6: the zero trust gateway registers the public key certificate in S5 to the unified authentication service platform;
s7: after the registration of the public key certificate in the S6 is completed, the unified authentication service platform issues a system access token to the zero trust gateway;
s8, the zero trust gateway issues an access token to the authentication proxy forwarding system;
s9: the user can log in through the uniform security terminal and then can access background services of the existing system after the user is successfully registered;
s10: the authentication agent forwards the access request to the zero trust gateway;
s11, the zero trust gateway verifies whether the access token is legal and valid, if the token is invalid, further access is refused, and if the token passes the verification, the zero trust gateway forwards a service request to a system background service;
s12: the user access is successful.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (6)

1. A password-free authentication method based on public certificates is characterized by comprising the following steps:
s1: constructing a password-free authentication system, wherein the password-free authentication system consists of a uniform security terminal, an authentication agent, a zero trust gateway, a uniform authentication service platform and system background services;
s2: the user registers through the unified security terminal, the authentication agent sends an authentication request to the unified security terminal, and the unified security terminal performs entity authentication according to user selection;
s3: after the entity authentication is completed by the unified security terminal in the S2, the unified security terminal starts a public key algorithm and dynamically generates a public key certificate;
s4: the unified security terminal sends the public key certificate dynamically generated in the step S3 to the authentication agent;
s5: the authentication agent forwards the public key certificate dynamically generated in the step 3 to the zero trust gateway;
s6: the zero-trust gateway registers the public key certificate in S5 to the unified authentication service platform;
s7: after the registration of the public key certificate in the S6 is completed, the unified authentication service platform issues a system access token to the zero trust gateway;
s8, the zero trust gateway issues an access token to the authentication proxy forwarding system;
s9: the user can log in through the uniform security terminal and then can access the background service of the existing system after the user is successfully registered;
s10: the authentication agent forwards the access request to the zero trust gateway;
s11, the zero trust gateway verifies whether the access token is legal and valid, if the token is invalid, further access is refused, and if the token passes the verification, the zero trust gateway forwards a service request to a system background service;
s12: the user access is successful.
2. The public certificate-based password-free authentication method according to claim 1, wherein in S2, the entity authentication mode of the unified security terminal includes fingerprint authentication, iris authentication, portrait authentication and mobile phone authentication, and the entity authentication mode of the unified security terminal further supports plug-in type authentication.
3. A public certificate-based password-less authentication method according to claim 1, wherein in S2, the entity authentication mode supports predefinition.
4. The public certificate-based password-free authentication method according to claim 1, wherein in S3, the unified security terminal further detects its unique identification, secure generation, storage, invocation of the public certificate, and the secure environment.
5. The public certificate-based password-less authentication method according to claim 1, wherein in S1, the password-less authentication system is a password-less system that uses a public certificate mechanism to authenticate the identity of the user based on a public key algorithm.
6. The public certificate-based password-free authentication method according to claim 1, wherein in S1, the unified security terminal, the authentication agent, the zero trust gateway, the unified authentication service platform and the system background service are independent from each other.
CN202210675293.8A 2022-06-15 2022-06-15 Public certificate-based password-free authentication method Pending CN115225323A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210675293.8A CN115225323A (en) 2022-06-15 2022-06-15 Public certificate-based password-free authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210675293.8A CN115225323A (en) 2022-06-15 2022-06-15 Public certificate-based password-free authentication method

Publications (1)

Publication Number Publication Date
CN115225323A true CN115225323A (en) 2022-10-21

Family

ID=83607466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210675293.8A Pending CN115225323A (en) 2022-06-15 2022-06-15 Public certificate-based password-free authentication method

Country Status (1)

Country Link
CN (1) CN115225323A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483513A (en) * 2009-02-09 2009-07-15 上海爱数软件有限公司 Network backup system, data backup and recovery method
US20140075524A1 (en) * 2012-09-11 2014-03-13 Authenticade Llc System and method to establish and use credentials for a common lightweight identity through digital certificates
US20150304847A1 (en) * 2014-04-17 2015-10-22 Guang Gong Password-less Authentication System, Method and Device
CN107395622A (en) * 2017-08-18 2017-11-24 四川长虹电器股份有限公司 Method without cipher safety authentication
CN107508837A (en) * 2017-09-28 2017-12-22 山东浪潮通软信息科技有限公司 A kind of cross-platform heterogeneous system login method based on intelligent code key certification
CN108512862A (en) * 2018-05-30 2018-09-07 博潮科技(北京)有限公司 Internet-of-things terminal safety certification control platform based on no certificates identified authentication techniques
CN108830587A (en) * 2018-04-28 2018-11-16 广东工业大学 A kind of NFC method of mobile payment based on no certificate signature
US20200327219A1 (en) * 2019-04-11 2020-10-15 Herbert Bolimovsky Passwordless authentication

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483513A (en) * 2009-02-09 2009-07-15 上海爱数软件有限公司 Network backup system, data backup and recovery method
US20140075524A1 (en) * 2012-09-11 2014-03-13 Authenticade Llc System and method to establish and use credentials for a common lightweight identity through digital certificates
US20150304847A1 (en) * 2014-04-17 2015-10-22 Guang Gong Password-less Authentication System, Method and Device
CN107395622A (en) * 2017-08-18 2017-11-24 四川长虹电器股份有限公司 Method without cipher safety authentication
CN107508837A (en) * 2017-09-28 2017-12-22 山东浪潮通软信息科技有限公司 A kind of cross-platform heterogeneous system login method based on intelligent code key certification
CN108830587A (en) * 2018-04-28 2018-11-16 广东工业大学 A kind of NFC method of mobile payment based on no certificate signature
CN108512862A (en) * 2018-05-30 2018-09-07 博潮科技(北京)有限公司 Internet-of-things terminal safety certification control platform based on no certificates identified authentication techniques
US20200327219A1 (en) * 2019-04-11 2020-10-15 Herbert Bolimovsky Passwordless authentication

Similar Documents

Publication Publication Date Title
US9722984B2 (en) Proximity-based authentication
RU2414086C2 (en) Application authentication
CN110061842B (en) Out-of-band remote authentication
EP1254547B1 (en) Single sign-on process
CA2744971C (en) Secure transaction authentication
JP5744915B2 (en) Trusted federated identity management and data access authorization method and apparatus
CN103597799B (en) service access authentication method and system
US8769289B1 (en) Authentication of a user accessing a protected resource using multi-channel protocol
US20100058064A1 (en) Login authentication using a trusted device
CN111600869B (en) Verification code authentication method and system based on biological characteristics
JP2018504789A (en) Payment authentication system, method and apparatus
CN110278084B (en) eID establishing method, related device and system
WO2017076216A1 (en) Server, mobile terminal, and internet real name authentication system and method
JP2015053674A (en) Method for safely accessing network from personal device, personal device, network server, and access point
WO2020020008A1 (en) Authentication method and authentication system
CN108604990A (en) The application method and device of local authorized certificate in terminal
CN108040044A (en) A kind of management method and system for realizing eSIM card security authentications
CN112020716A (en) Remote biometric identification
KR20180087543A (en) Key management method and fido authenticator software authenticator
TW202207667A (en) Authentication and validation procedure for improved security in communications systems
CN102404112A (en) Access authentication method for credible terminal
CN107070918B (en) A kind of network application login method and system
CN104753886B (en) It is a kind of to the locking method of remote user, unlocking method and device
CN105873059A (en) Joint identity authentication method and system for power distribution communication wireless private network
CN110891067B (en) Revocable multi-server privacy protection authentication method and revocable multi-server privacy protection authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination