CN1601490A - Information security authentication and method for its encrypting device - Google Patents

Information security authentication and method for its encrypting device Download PDF

Info

Publication number
CN1601490A
CN1601490A CN 03134683 CN03134683A CN1601490A CN 1601490 A CN1601490 A CN 1601490A CN 03134683 CN03134683 CN 03134683 CN 03134683 A CN03134683 A CN 03134683A CN 1601490 A CN1601490 A CN 1601490A
Authority
CN
China
Prior art keywords
password
information
digital
code set
numbering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 03134683
Other languages
Chinese (zh)
Inventor
刘任
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU TONGYING INFORMATION TECHNOLOGY Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 03134683 priority Critical patent/CN1601490A/en
Priority to PCT/CN2004/001101 priority patent/WO2005031619A2/en
Publication of CN1601490A publication Critical patent/CN1601490A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention realizes information security service, safety identity authentication conveniently and insures information integrality and validity. Main techniques utilized in the invention includes: one-off numbering cipher group, one-off digital signature, multiple step binding processing technique, controllable enciphering method and controllable enciphering device. One-off digital signature closely combined other techniques, and one-off digital signature device under control of controllable enciphering device complete procedure of information identity authentication. The invention independent on communication terminals and communication modes is a protocol of user safety and possible to realize information authentication on simple terminal and under simple communication mode. The invention realizes isolation of protocol and high security of service.

Description

The method of information security certification and encryption device thereof
Technical field
The present invention program belongs to areas of information technology, relates to the information security service: authentication, information integrity authentication and the non-property denied.
Background technology
Along with the progress of science and technology and the widespread usage of electronic technology, information security service method and product are more and more, in open communication system, such as the Internet internet, much are based on the application of public key cryptography technology.
The authentication of identity has identity documents, chapter seal or handwritten signature, user ID and simple password, biometric system (authentications such as fingerprint, iris), authentication token, smart card and combination authentication usually, also has the digital signature based on Public Key Infrastructure(PKI).Identity documents and handwritten signature exist with physical form usually, are easy to forge, and are difficult to differentiate the exchange of inconvenient information; Simple password is given away secrets easily or is stolen; Biostatistics, authentication token, smart card all are subjected to a series of attacks easily, and use cost is higher; The combination authentication method is that authentication methods such as password and authentication token are made up, and has improved security relatively.Public Key Infrastructure(PKI) is the previous more feasible scheme of order, but implements more complicated, need increase complex measures such as time stamp for tight transaction, and common people beyond one's depth, and have potential safety hazard too in the application of reality.
Information integrity can be checked with message digest code usually, use public-key the usually digital signature method of cryptographic technique of the data of transmitting in network realizes that perhaps using provides the secure sockets layer (SSL) of security service or Internet security protocol (IPSec) to realize.Ssl protocol and ipsec protocol have mainly provided confidentiality, integrality and the authenticity that guarantees the Internet Data Communication in Computer Networks, and ssl protocol works in the communications layer, and ipsec protocol works in communication network layer.
Use public-key the usually digital signature method of cryptographic technique of the non-property denied is realized.
The application layer security agreement has in the Internet network:
1, safety/common the Internet mail expands service (S/MIME).
This is a specification protocol that is used to protect safety of electronic mail, and it has described an agreement that increases the cryptosecurity service by the mode of the object through digital signature and encryption being carried out the MIME encapsulation.
2, secure electronic transaction (SET).
Secure electronic transaction is for doing shopping in open network Internet e-commerce transaction and payment provides
The agreement of a security framework.It is based on digital signature technology, and introduces and used dual signature.
In open network system, network communication is the most open part, has emphasized the safety of data communication at present more, has used various high strength encrypting methods.But the network terminal is failed the measure of safe enough, be used for protecting possible hacker attacks, may your information be exposed a trojan horse program fully, password can be revealed, certificate also may be stolen, even the software program interface that you use looks the same, but also may be replaced.For service side, can drop into great amount of manpower and material resources, technology, by the support of substantial contribution, set up the fire wall or the agreement of high security and isolate, even so, yet not the safety of one of percentage hundred.And for countless client terminals, can not have powerful fund and strength to set up the network firewall of high strength safety, even most client knows little to the understanding of safety.So in actual applications, how to ensure information security, client terminal and communication security are used trustworthily, become the major issue of open system safety.
With the present invention program near or relevant technology:
1, one-time pad system.
One-time pad system expressly sequence is transformed to isometric ciphertext sequence with isometric key sequence, uses Caesar's method of substitution usually, and binary data is encrypted XOR algorithm commonly used, knows that ciphertext sequence and corresponding key sequence can revert back isometric plaintext sequence.The one-time pad system is the cryptographic system that can not break through in theory, and its plaintext, key, ciphertext sequence are isometric.Because algorithm is ostensible, expressly, in the key, these three sequences of ciphertext, know wherein two, can derive the 3rd sequence.
(reference: " cryptography and computer network security " chapter 2, " applied cryptography is learned: agreement, algorithm and C source program " chapter 1)
2, eap-message digest.
Eap-message digest is the algorithm that a kind of pseudorandom that the input of random length kneading is produced regular length is exported, and also is called hash or hash.
3, based on the message authentication verification of one-way hash function (hash function) and (HMAC).
Both sides adopt same key, and message and key are put together with hash function calculating summary, and the verification summary is with the integrality of check message.
(reference: " password engineering practice guide " chapter 5, " applied cryptography is learned: agreement, algorithm and C source program " the 18th chapter)
4, digital signature.
Message producer's cryptographic algorithm that uses public-key is encrypted eap-message digest with private key, just obtains digital signature, and message and digital signature are transmitted together; During recipient's verification msg signature, with PKI the data signature of receiving is decrypted and obtains encrypted eap-message digest, if the eap-message digest of calculating is identical with the decrypted eap-message digest that obtains, integrality and the non-property denied that so just can acknowledge message: message be changed in transmission, and can only be that the people who grasps private key signs and issues.The application of digital signature will possess Public Key Infrastructure(PKI) and time stamp service (TSS) usually.
List of references:
1, " password engineering practice guide "
Author: (U.S.) Steve Burnett ﹠amp; Stephen Paine
Translate: Feng Deng state Zhou Yongbin Zhang Zhen peak Li De congruence is translated
Publish: publishing house of Tsing-Hua University
2, " applied cryptography is learned: agreement, algorithm and C source program "
Author: (U.S.) Bruce Schneier
Translate: Wu Shizhong wishes that the male Zhang Wenzheng of generation etc. translates
Publish: China Machine Press
3, " cryptography and computer network security "
Author: minister in ancient times's Si Chinese
Publish: publishing house of Tsing-Hua University, Guangxi science tech publishing house
Summary of the invention
The technical matters that solves:
The present invention program's technical matters to be solved mainly is the security service of information in open environment, comprises safety identification authentication, security information exchange, guarantees information integrity and the non-property denied, this technology also can be applied to closed environment.So-called open environment, the information that is meant temporarily deposit or communication process in the place of process not concealed, a kind of like this state that outer bound pair information acquires easily, duplicates easily or does to change.Such as internet internet, telephone line, radio communication, public terminals etc., all belong to open environment.And closed environment is for open environment, and information is not easy to expose, be replicated and reformed environment.
Current Information Security in open environment all has to be strengthened, some system even lack basic security.Basically all do not encrypt in the present phone trading, password or password are easy to be stolen.In the internet internet, major part is to use based on the public key cryptography technology communication carries out key change, carries out encryption communication again; Public key cryptography technology is a technology comparatively safe in the practical application, usually in the internet, all can adopt high-intensity encryption technology, this just makes to encrypt with communication and can put together in software or equipment usually, but because employed operating system is generally all used general open-system interconnection protocol, so system is invaded easily; In addition, to important information, except yourself's computer, you can not use any other people computer, because you can not determine security.How to make client terminal and easy communication, safety, use trustworthily, become the major issue of Open System Security.
Technical scheme:
The both sides that technical solution of the present invention will directly be carried out security information exchange are divided into customer and service side.The customer is a side who initiatively initiates information exchange requests, normally a side of demand for services.Service side is relative passive response request, and a side of message exchange is provided, and a side of information service normally is provided, and service side is reliable main body.Believable message exchange between each customer's individuality can be undertaken by the side's of service main body, can not directly carry out believable message exchange between each client's individuality, but can carry out the general information exchange, and information reliability can be verified by the side of service again.
The major technique of using in the present invention program's information safety service method has: disposable numbering cipher code set, and the digital one time signature, substep is bound treatment technology, controlled encryption method.Use these technology to be closely connected jointly and act on, finish with the safety that reaches authentification of message.Below discuss every technology respectively:
Disposable numbering cipher code set: the customer authenticates mutually with service side and disposable numbering cipher code set is used in the security information exchange authentication.Disposable numbering cipher code set has following feature:
1, be a kind of numbering cipher code set, each cipher code set has been compiled and edited a numbering, can number according to this preserve, use and this cipher code set of index.Each client has a plurality of cipher code set simultaneously, must use different numberings to distinguish.
2, each cipher code set is made up of one or more orderly password, and a cipher code set can be finished an information task, and each password is finished different functions.So-called information task is meant by message exchange repeatedly and goes to reach to finishing an incident.In a cipher code set, primary information exchanges successfully (or information request and successful replying) available two passwords and finishes: first password, and the customer is used for encrypting the request of transmission, and the checking of service side is asked; Second password, service side is used for encrypting successful respond, and the customer is proved to be successful and replys.Each information task can be used as an information transaction, in an information transaction, and replying in the time of can being used for specially encrypting the response failure with a password.What orderly passwords are a concrete cipher code set need, and can finishing as required of task is determined.Usually reply with a pair of password at every turn finish, respond with a special password when makeing mistakes.When makeing mistakes usually, last password that is used for correctly responding does not use, so can be by doing conversion (such as the increment transformation that fixes) as all response passwords of makeing mistakes to last correct password of responding.This just makes each request or reply can be corresponding with a password, and each success or replying of failure all must have a password corresponding.
3, each cipher code set all has a service marking state, and every kind of state can be indicated progress, the step of authentication tasks, perhaps should organize the situation that password uses.Each cipher code set also can be registered the current access times that access to your password.
4, each password of cipher code set can only be used for using effective authentication information once, and each password can be registered access times, can cancel according to fault-tolerant number of times.Still incorrect such as use above three times, then cancel." effectively authentication information once " can not re-use this password other information are authenticated after being meant and with a password one or one group of information being authenticated, and authenticates but can carry out double counting to the information that has authenticated.
5, all passwords on the same group are except belonging to same cipher code set, has common numbering, have outside the relatively-stationary ordinal position, their password content is contact not, crossing the different random seed of collection by the service square tube and generate at random, is random number (in fact repeatability is arranged, and should be pseudo random number strictly speaking), have randomness, they have different random seeds.The length of password and the space of password can be decided according to safe requirement.Attack for avoiding being subjected to the cipher random seed, require service side should as often as possible collect random seed, the random seed number is The more the better.
6, every client can have a lot of groups of disposable numbering cipher code set usually simultaneously, can replenish at any time after using calcellation, can adopt the switching method of directly sharing to share disposable numbering cipher code set with service side usually.
Disposable numbering cipher code set is different from the main place of the general password of tradition:
1, general password does not use numbering, and disposable numbering cipher code set must number according to cipher code set preserve, index and use.
2, general password can make and be used for authentication repeatedly, and the password of disposable numbering cipher code set only is used for effectively authentication once.
3, general password uses single password to authenticate a plurality of information, and disposable numbering cipher code set often is made up of a plurality of passwords, uses a plurality of passwords to authenticate one or several information, is commonly used to finish an information task.
4, general password is generated by artificial appointment usually, guessed right easily, and the password of disposable numbering cipher code set has randomness all by generating at random, and each password has different random seeds usually, has better security.
The digital one time signature: the authentication of all information is confirmed by " digital one time signature " technology, the digital one time signature technology be calculate eap-message digest use based on the message authentication verification of the one-way hash function of disposal password or disposable numbering cipher code set and, it has following feature:
That 1, uses one-way hash function calculates message authentication verification and (HMAC) together to message and disposal password, and this point is similar with the summary (HMAC) of common band password, and password and message for definite have unique message digest code.So-called disposal password is meant that password can only be used for effective authentication information once; Require employed one-way hash function to have enough diffusions and confusion, the summary sign indicating number that generates has randomness, the minor alteration of message all can cause huge complicated variation of summary sign indicating number, and a small amount of change of message is difficult to produce identical summary sign indicating number, has anti-collision; Because the character of one-way hash function has one-way, can not derive corresponding password by the summary sign indicating number; Usually use more one-way hash function digest algorithm MD2, MD5, SHA-1 or the like are arranged.
2, employed one-way hash function has the enough diffusion and confusion except the same with common one-way hash function, eap-message digest for length-specific, in the password space of using, there is abundant collision, make the collision space near or greater than the eap-message digest space, also just can not attack the security that reach by the method for exhaustion from message digest code to the minimizing password.On the one hand, " enough diffusions and confusion " is meant that the eap-message digest that this one-way hash function produces has pseudo-randomness, each minor alteration of information, the capital causes huge variation in the eap-message digest result, all result of variations are pseudorandom, and the less change of message are difficult for causing the collision of making a summary; So-called collision is meant that different message and password have generated identical summary sign indicating number; On the other hand, for each message digest computation result who determines, in the password space of using, can find abundant collision.So-called abundant collision is meant in specific digest space and password space, and the space of collision password and the space parallax of eap-message digest are few, and perhaps the former more strengthens than the latter.Method is exactly for given password specifically, and specific message is generated unique eap-message digest, and this summary is A at the probability of digest space, if digest space is M, A=1/M so; If in the password space, use the method for exhaustion to search corresponding possible password to this eap-message digest, can arrive a lot of satisfactory passwords so, just there is a lot of collisions, these password numbers that produce collision are N, and the probability of given password in the space of these collision passwords is that B (notices that this is not the password space, be the space that the password that bumps is formed), be B=1/N, so A and B should be very near or A greater than B, N should near or greater than M.For the one-way hash function with good randomness, it should be uniformly that its summary distributes in huge space, when digest space is identical with the password space, collides rarely, otherwise will be partial to certain trend and becomes not at random.There is abundant collision, under the situation that the summary code space is determined, just necessarily can reaches as long as increase the password space.Usually to make that the exponential depth in password space time should be the twice of summary code space power time or more.Such as for specific summary code space M, definite message and password generate a summary sign indicating number, a careless selected summary sign indicating number in M, and its correct chance is 1/M; In the K of password space, carry out exhaustive computations so, similar M is arranged or more than M password, they have generated identical summary sign indicating number, i.e. collision be M time almost, or more than M time, though this with regard to feasible carry out exhaustive computations after, from result of calculation, at will select one, its correct chance still is not more than 1/M, reach this requirement, and the exponential depth of K is inferior usually should be the inferior twice of exponential depth of the same end of M.Be that ASCII character, length are the eap-message digest of 16 bytes for character set for example, its space is 2 128, Password Length should be and is no less than 32 bytes so, and the password space is for being not less than 2 256, and be arabic numeral for character set, length is the eap-message digest of 8 bit digital, it may digest space be 10 8, Password Length should be and is no less than 16 bit digital so, and the password space is for being not less than 10 16As long as the space that the collision password is formed is approaching or greater than the eap-message digest space, just can not calculate real password by the method for exhaustion from message digest code.
3, use disposal password.Employed password can only be used for using effective authentication information once, after promptly with a password one or one group of information being authenticated, can not re-use this password other information are authenticated, but can carry out the double counting authentication to the information that has authenticated.
4, can use the password of the password of disposal password group, can come index and access to your password according to numbering as the digital one time signature.Use disposable numbering cipher code set to come one or more information are authenticated, different passwords in the password of different numberings or the same cipher code set of identical numbering have different digital one time signatures to same message, so use a plurality of passwords to realize repeatedly or multiple digital one time signature same message.
5, algorithm can public use.The digital one time signature is based on disposable numbering cipher code set and one-way hash function, has abundant collision in its password space, the open security that does not influence the digital one time signature of algorithm.
6, data integrity authentication: customer and the shared in advance disposable numbering cipher code set in service side, and password encryption deposits, and service side is as believable mechanism.The both sides of authentication sign to same information calculations digital one time by identical password, authenticating party is as long as the digital one time signature that relatively transmits is consistent with the digital one time signature that calculates, just can verify and know that information is complete, do not changed because any be not that the third party who shares cipher code set may obtain satisfactory digital one time signature hardly.
7, the third party authenticates.As first, second two sides that all are the customer, can not directly carry out believable message exchange, general message exchange can be carried out, but the trustworthiness of information must be can determined just now through service.Send an information to second such as first, but it must be that first sends that second can not be affirmed this information, so first must be carried out the digital one time signature to information, and sends to service side together to information and digital one time signature, behind the side's of service certifying signature information is preserved; The Party B sends the authentication request of this information to the side of service, use after service side accepts request with Party B's shared cipher code set this information is signed, and return to the Party B, after the Party B receives information and signature, the digital one time signature is verified, to determine the reliability of information.
8, the non-property denied.As the customer and the service side of authentification of message, service side must be reliable, and it goes to guarantee its trustworthiness by a series of measures and system, is similar to public key certificate issuing organization (CA).Because both sides share cipher code set, the third party can not learn that either party receives the correct information of digital one time signature, must be to sign and issue from the opposing party, has non-repudiation.
9, with the similarities and differences of general eap-message digest: for not with the eap-message digest of password, as long as anyone knows that algorithm can calculate the eap-message digest of particular message; And for the eap-message digest (HMAC) of general band password, it has two characteristics usually: 1) adopt fixing password, or based on the password after the identical variations of algorithms of the process of same seed, one or more message are calculated eap-message digests; 2) require eap-message digest in its possible space, not produce collision as far as possible.Eap-message digest itself not only can not be protected its secret information, and the information that can probably betray the pot to the roses, and eap-message digest often needs other algorithm to carry out encipherment protection, such as the digital signature based on public key algorithm.Digital one time signature is a kind of eap-message digest of very special, novel concept, it is based on disposable numbering cipher code set, be associated with numbering, it requires disposable effective authentication, it is a kind of dynamic eap-message digest, it requires to have abundant collision in possible space, and these characteristics make the information that it can not betray the pot to the roses just; Make it more safe and effective and can apply in a flexible way and can repeatedly sign.
10, with the general digital signature difference of tradition.The general digital signature of tradition is based on eap-message digest and public key encryption algorithm, its believable mechanism is a licence issuing authority, its signature to identical message is always identical, many times cooperate time stamp to use, use comparatively safe high strength encrypting algorithm during specific implementation, its password repeatedly uses, and can be broken in theory.Digital one time signature be based on disposable numbering cipher code set and one-way hash function the message authentication verification and, its believable mechanism is the service side of communication, its to the signature of identical message at every turn according to the difference of corresponding password and difference, repeatedly or multiple digital one time signature number corresponding with cipher code set, what the digital one time signature used is the one-way function algorithm, its password only effectively authenticates once, can not be broken in theory, and importantly, its algorithm is simple relatively, to the also just greatly reduction of requirement of hardware or software.
11, with the one-time pad system similarities and differences.The password difference of using: the key that the one-time pad system uses is a definite random series code book, and its length is all identical with the length of plaintext, ciphertext; And the digital one time signature uses disposable numbering cipher code set, its cipher code set has numbering, can arbitrarily use, but the password space is restricted, the password space index is the twice of digest space index or bigger normally, and just the length of password is twice than the length of summary sign indicating number usually or is bigger.Use algorithm difference: the one-time pad system algorithm uses Caesar's method of substitution, and expressly, the length of key, ciphertext is identical, and known wherein both can extrapolate the third party arbitrarily; The digital one time signature uses one-way hash function, and its one-way has determined that can only expressly extrapolate corresponding eap-message digest by password and information is the digital one time signature, can not extrapolate corresponding password by information plaintext and digital one time signature.With one-time pad system identical point: all use disposal password, algorithm can disclose, and in theory all cannot be broken.
The feature that substep is bound treatment technology:
1, the information task can be divided into a plurality of steps and finishes, and each step is associated with different password.Each step has the verification with the associated information of the employed different password of other steps.That is to say that some information (comprising eap-message digest) in each step must have relation with some password, and these passwords in the process of other steps be do not have used.Each step must have its special-purpose password, and this is a sign of distinguishing " step by step ".
2, each step of information task is finished by the order of agreement, just can be for further processing after having only previous step to finish; To each step, once finishing dealing with, the password of its use and respective encrypted information can not be used further to same or other processing, and Here it is, and binding is handled.
The effect that substep is bound treatment technology:
1, strengthened the password space, used safer.
2, cipher code set and information task are bound.All passwords relevant with the information task are for information about associated, can all not pass the information of the switching part cryptographic association of message exchange each time in the primary information exchange.Just can send the associated information of residue password after information task and the cipher code set binding, cipher code set can not be used further to other information tasks once binding.The assailant is if attack password, must obtain and whole information of cryptographic association, but when he obtains this information, this cipher code set can not have been done other uses, and this has just guaranteed the safety of information task and password.By cipher code set and the binding of information task, also can effectively prevent man-in-the-middle attack.
3, this information task and corresponding other information (such as transaction terminal number) can be bound.Trading stepwise carries out, even the information in a certain step is intercepted, still can not influence the security of information task integral body.In travelling, lost all indentations such as someone, he can phone household or friend in the strange land and obtain password (should be the digital one time signature strictly speaking), and on automatic teller machine that uses the present invention program's technology or other-end (this automatic teller machine or terminal only need be imported correct digital one time signature and can withdraw the money), withdraw the money, but also may someone will eavesdrop simultaneously, and on another automatic teller machine, withdraw the money, but, transaction binds treatment technology step by step because having used, bind with the terminal automatic teller machine, transaction branch multistep is carried out, when the first step, the two places automatic teller machine is success simultaneously, as eavesdrop people's first step success and just can not obtain complete encrypted message, because his household or friend only just can tell he next step encrypted message after the success of his back, have only this real talent might be above simultaneously successfully, so that whole transaction is still is safe in two steps.
4, can effectively prevent identity spoofing.In the information transaction process, just can discern identity by the step of beginning, if false identity, remaining secret information just can not send again, guarantees whole tasks secure.
5, can prevent mistake.The information task is divided into a plurality of steps, can finishes jointly by a plurality of clients.Can prevent mistake.Such as the account of first transfer funds to second, if all finished by first, possible first can be got account number wrong; If this task was divided into for two steps, after first is initiated transfer transactions, just can finish after confirming by second, this has just been avoided the possibility of mistake.
6, can be used to divide different transaction, use the cipher code set of difference in functionality.
7, can prevent because the appearance of the weakness of algorithm or weak key causes the influence to safety.
Controlled encryption technique method: be meant that whole ciphering process is can be by the method for manual control or supervision, its process can not be full automatic, it is characterized in that:
1, encrypted message has only the software of encryption or hardware to read.
2, ciphering process and encrypted content can manual control or manual oversight.If only the necessary information of may command encryption section is the controlled encryption of part, encrypt number of times such as regulation, enciphered data length, the particular content of encryption, or encrypt the partial content that must comprise, or be the certain content of data ad-hoc location, the account number and the amount of money in for example transferring accounts.Sometimes the controlled encryption of part promptly can be satisfied the needs of actual use.Must control encrypting number of times, must have encrypted content and all or part ofly carry out manual control or carry out manual oversight, encrypted content must be all before encryption or after encrypting or is necessaryly partly obtained affirmation.
Simple and easily controlled encryption method be to make information encryption and information transmission physical separation.The effect of controlled encryption method:
1, guarantees the safety of password.Used controlled encryption method, no matter other people make how can not read the password content.Even the client also need not read the password content, only needs quote password by encrypted body (software of encryption or hardware) when encrypting.So password can be outwards not open fully.
2, guarantee the safety of enciphered message.Because encrypted process and content can be controlled, so all enciphered messages must be to generate as required, all information all must be used on request.
The information security certification process:
The customer will do some preparation measures earlier before carrying out security information exchange with service side.At first, the customer offers customer ID in service side.Each customer sets up a customer ID in service side, the corresponding client of each customer ID, and service can be to index all information that are kept at relevant this client in service side according to customer ID.
Before the customer carried out security information exchange with service side, customer and service side shared a plurality of disposable numbering cipher code set.Can share hundreds of, thousands of even more as required to the disposable numbering cipher code set more than 10,000.Cipher code set is collected random seed by service side and is generated, and attacks in order to prevent seed, and more random seed should be collected by service side, and then by direct key change mode, the client directly obtains cipher code set after by authenticating identity from the side of service, and preservation; Service side is preserved after by high strength encrypting cipher code set simultaneously, and the customer is shared with service side realization cipher code set.After deposit password enforcement high strength encrypting service side, to possess perfect management and security system simultaneously, so just can guarantee the safety of encrypted message.
When the customer carries out the security information authentication with service side, the message exchange step process:
1, the customer is according to the verification mode of both sides' agreement, extract the password of first sequence number by the disposable numbering cipher code set of the selected corresponding numbering of numbering, with this password message (i.e. the information that will transmit) is calculated the digital one time signature, and ciphering process must use controlled encryption method.
2, after the customer calculates message digital one time signature, be sent to service side together with customer ID, message, cipher code set numbering and to the digital one time signature of this message.
3, after service side receives all information, number to retrieve and decipher according to client's cipher code set and obtain disposable numbering cipher code set, verify the digital one time signature of this message with same algorithm, if pass through, then can be sure of client identity authentication and information integrity, service can be to handle information.
4, behind the upright really process information of service, the password of the group that accesses to your password second sequence number calculates the digital one time signature to solicited message, and signs with accurate indication, correct information and with the digital one time that the second sequence number password generates and to return the customer; As can not correctly handling, then sign, and the digital one time signature that error flag, error message and wrong special purpose system generate is returned the customer to be used for the special-purpose cryptographic calculations digital one time of mistake (or failure).But because the digital one time signature is based on the many-to-one relationship of enough collisions, the digital one time signature that the mistake special purpose system generates might be identical with the digital one time signature of correctly finishing the password generation, when running into this situation, the mistake special purpose system can be done conversion by certain rule earlier, such as increasing progressively a certain constant, and then generation digital one time signature, so conversion, till the digital one time signature of digital one time when mistake signature when correct was different, the digital one time when guaranteeing right and wrong was signed different.
5, after the customer received return message, verification digital one time signature was to determine information processing whether success or failure.If when replying, check information is not inconsistent, neither success, neither fail, just may be to have gone out mistake in the message transmitting procedure, or by malicious modification, this can perhaps transmit information by other approach, otherwise the result will be uncertain by transmitting information again to determine the result.If middle check results is unsuccessful or verification is not inconsistent and then ends this information task, the information task can be used as an information transaction, this information transaction of rollback when ending midway usually.Be not inconsistent if last replys verification, then the result can not determine, should directly look for service side to verify.
6, above 1 to 5 step has been finished answering one time.But a common information task can be used substep and bind treatment technology and use repeatedly to reply and finish.Handle by the substep binding, the password in the group that accesses to your password according to the order of sequence repeats above 1 to 5 step and finishes up to all message exchange authenticating transactions.Because all passwords all are " effectively authentication information are once ", can not reuse authentication, even the second time of identical information, exchange can not be reused, this has just guaranteed the uniqueness of information task.Have only definite client to carry out correct calculating and verification digital one time signature, also just guaranteed the non-property denied of client identity correctness and information task information.
Above message exchange and verification process, used multinomial new technology: disposable numbering cipher code set, the digital one time signature, controlled encryption method is handled in the substep binding.They are indispensable parts of finishing whole technical proposal, and a complete skill scheme is finished in acting in conjunction.The present invention program only provides the Security Authentication Service of information, and the function of keeping secret of information data is not provided.
Above information security certification process, theory has been a feasible scheme, but also is difficult in actual applications use.Just think, if require you to remember thousands of cipher code set, you can not like using it, nor may make good use of it, and problem how to calculate the digital one time signature does not in addition yet solve.If we are as common way, embed the digital one time signature algorithm at computer or in communicating terminal, and then input corresponding password by craft or storer, this method is absolutely unsafe, and has run counter to controlled encryption method principle.
Be stored as thousands of information, storer to the current modern times has not been any difficult matter, and digital one time signature algorithm of the present invention can use relative simple algorithm, implement and relatively want easily simple, this just makes encryption with the storage of encrypted message and data be made in a small device or the device becomes possibility.And need information encrypted, can import by manual button, if need information encrypted many, can be behind the restrictive condition that manual typing is encrypted, encrypt number of times such as limiting, restriction needs a certain fixed part of enciphered message, or limits length of enciphered message or the like, behind the locking restrictive condition, can pass through other interfaces again, such as serial ports or USB interface, even use wireless telecommunications, transmitting all the other needs enciphered message; Information that obtains after the encryption or digital one time signature also can be by manual again transmission the after showing, this also helps manual monitoring, perhaps send out by serial ports or other interfaces such as USB interface, wireless communication interface, realize semi-automation, but whole process all can be controlled according to encrypting needs, perhaps display message is carried out manual monitoring after encryption, meets controlled encryption method principle, also can not be the process full-automation therefore.We make password storage and cryptographic algorithm and put together, and ciphering process meets the device of controlled encryption method principle, is called controlled encryption device.The feature of controlled encryption device is, password is kept in the device, can upgrade or replenishes password, and after password was preserved, encrypted message no longer directly exchanged outward installing, and has only software or the hardware encrypted in the device to read; In device, realize cryptographic algorithm, can extract password the information of input or locking is encrypted or verified; Encryption device has display device, can show encrypted all or part of information, so that carry out manual control or manual monitoring; Encrypting number of times can control, and must just can carry out by cryptographic operation after number of times is encrypted in control as required; Can realize semi-automatic encryption behind the necessary part encrypted content of control, also full content control is carried out in typing by hand; Use substep to bind treatment technology to the rapid task of multistep, finish and just can carry out next step after the encryption of previous step or the checking and handle.We make the storage of disposable numbering cipher code set and digital one time signature algorithm and put together, can calculate and verify that digital one time signs information, and ciphering process meets the device of controlled encryption method principle, is called the digital one time signature apparatus.As long as use the present invention program's information security certification process and digital one time signature apparatus, just can realize easily and safely comprising safety identification authentication by authentification of message, finish the information task safe ready.
Digital one time signature apparatus method has following feature:
1, this device can be by numbering storage, index and a large amount of disposable numbering cipher code set of use, cipher code set kept secure.Encrypted message is not necessarily visible, and normally sightless, has only ciphering process to use, and encrypted message can upgrade and replenish as required at any time.After cipher code set was preserved, encrypted message no longer directly exchanged outside installing, and has only software or the hardware encrypted in the device to read.
2, realize the digital one time signature algorithm, can use disposable numbering cipher code set information to be calculated and verified the digital one time signature according to the cipher code set numbering.
3, ciphering process meets controlled encryption method principle.Must after number of times is encrypted in control as required, just can carry out by cryptographic operation; Can all or part ofly carry out manual control to information encrypted or encryption condition, after encryption, can exercise supervision.
4, can need enciphered message by manual button input, perhaps the restrictive condition of encrypting by manual setting or typing.
5, after all or part of enciphered message of locking and encryption condition, can pass through other interfaces, such as serial ports or USB interface, radio communication interface etc., transmission and checking need information encrypted and digital one time signing messages, after encryption, can show information encrypted, to exercise supervision.
6, the application of binding treatment technology according to substep, after having only digital one time signature calculation that previous step replys and checking correct, just carry out the calculating and the checking of next step digital one time signature, also do not have authentication by just having revealed next step secret information to prevent artificial previous step checking.
7, for increasing the security of digital one time signature apparatus, device itself is provided with the locking password, could use after needing to remove password locking.
8, the digital one time signature apparatus can be preserved client's information simultaneously, uses with convenient.
Beneficial effect:
Various information security technologies before this, great majority all are the passages by high strength encrypting data message or high strength encrypting data communication, realizing the safety of message exchange, but the security needs of client terminal are protected by the client, and the fire wall of high safety also must be arranged in service side; On the one hand, high-intensity data encryption or communication channel need powerful hardware and software support, and the safety that adds one side client terminal and service side is difficult to guarantee.The present invention program can realize the information service of safety easily at various communicating terminals, information is in transmission course even can not use encryption, it is a kind of security protocol that does not rely on communication modes and communication process and communicating terminal, make Information Security be totally independent of communication and client terminal, to realize the safety of client, be a kind of agreement of client's safety, promptly can realize safe customer information authentication by comparatively simple client terminal and communication modes; Also can make things convenient for simultaneously, at low cost the service centre and the external world are carried out the agreement isolation, can use the agreement different during isolation with external communication, or custom protocol, certificate server and external communication are isolated, even the assailant has invaded all external environment conditions like this, comprise communicating terminal, communication line and communication server, also can not intrude into certificate server by custom protocol, can not puppet produce the legal information that does not meet user's wish, thereby it is convenient, construct the service centre of safety at low cost, according to the present invention program, even can go out more by low cost development, widely, new security information service.
Embodiment
Use 1: banking system Secure Transaction solution
In this scheme, we determine that bank side is service side, are reliable sides.Why do we deposit into bank to money, but bring Hard copy or plastic cards of bank? be because we believe bank, this is based on the reason of two aspects: 1) the institutional guarantee client's of bank fund security; 2) prestige of bank is also made same assurance for us.Here, we suppose that these two reasons still set up and exist.The each side of other participating banks business all is the customer, is demand for services side.The customer must open customer ID in bank, and related this client's account number.
The disposable numbering cipher code set that the client uses is provided with.The character set of password is decided to be arabic numeral, so almost any communication modes can use, the digital one time signature adopts 8 numerical characters, each password in the cipher code set adopts 16 numerals, can be according to the password number in the substep step setting code group of transaction needs, vanilla transaction can be divided into two steps or three steps usually.Each step is replied needs two passwords, determines during two steps that cipher code set needs four passwords, and cipher code set needs six passwords during three steps, and the password of replying when makeing mistakes is responded password with last and obtained after by increment transformation.If need verification account's remaining sum simultaneously, then each cipher code set also will increase a password, and the password number of cipher code set can be determined as required.When the client applies for disposable numbering cipher code set, bank's square tube is crossed and is gathered a plurality of random seeds, for this client generates disposable numbering cipher code set at random, by the client to the service point of bank by authentication after, directly share a plurality of disposable numbering cipher code set with direct key change mode and client, bank carries out disposable numbering cipher code set to be kept in the database behind the high strength encrypting, and when the client need serve, scheduling was come out to decipher the back and used.The client is kept at disposable numbering cipher code set in the digital one time signature apparatus, can use the digital one time signature apparatus that information is carried out digital one time signature and authentication at any time.
The setting of digital one time signature algorithm.Algorithm can adopt MD5 or SHA-1 algorithm to generate the summary sign indicating number under ascii character-set, and then ascii character is converted to gets remainder divided by 10 behind the integer and be converted to the arabic numeric characters collection, get the digital form summary of 8 characters of respective length by certain rule, such as getting next 8 arabic numeral, sign as digital one time, and this algorithm is can be disclosed, can not be cracked.
If transaction can be divided into for two steps, each password can fault-tolerant 3 times (uses three times incorrect then cancel), and the chance of being guessed right fully of so at every turn concluding the business is (3/10 8) * (3/10 8)=9/10 16≈ 1/10 15, i.e. 10 15 powers/one is provided with continuous 10 cryptographic signatures this client of back locking that makes mistakes, and the chance of successfully pretending to be the client to sign is 1/10 15* 10=1/10 14Security can reach (10 14-1)/10 14, be quite safe, and needed to improve the length that security can also increase the digital one time signature, perhaps increase the step of transaction.
We can be according to different transaction business kinds, the endorsement method of appointed information.
Now following three kinds of transaction authentications are enumerated the endorsement method that designs Transaction Information respectively according to the process and the requirement of transaction:
1, client identity authentication.
2, funds transfer transaction.
3, other authentification of messages.
Authentication is divided into two steps:
(1) initiates authentication;
(2) confirm authentication.
Carry out replying for twice promptly and can confirm client identity authentication safely, so each cipher code set needs two pairs of passwords, every pair of password carries out once correct replying.When the client initiates ID authentication request, the message of agreement is used first password of first pair of password of a certain numbering message is carried out the digital one time signature, the message of agreement must comprise the transaction code of authentication, the numbering of customer ID, message, disposable numbering cipher code set and signature are sent to bank service side together, and bank answers with second cryptographic signatures of first pair of password the checking back.Also do same authentication when confirming identity with second pair of password.Also need one to be specifically designed to when makeing mistakes the password of responding in addition, this password just can with last correct response password in addition conversion obtain because when makeing mistakes, last correct response password is use not.In replying, if all identical message is signed, this message only needs transmission primaries so, and when each time replied, only the transmission signature got final product.
Suppose that funds transfer can be divided into three steps by the account a transfer funds of the client A account b to client B:
(1) the account a of client A produces (or freezing) fund;
(2) the account b of client B changes (or changing account b again over to after the account a that freezes produces) fund over to, and simultaneously this fund is implemented to freeze;
(3) thaw and change the blocked funds of account b over to.
Each step all need be carried out authentication signature to account transfer information by having the client A that produces account a, needs the account transfer information of signature to comprise transaction code, change account number over to and change fund over to; The first step is submitted to by client A, and the information of submission has customer ID, the account transfer information (comprise transaction code, change account number over to and change fund over to) that needs signature, cipher code set numbering, corresponding digital one time signature; But second step, later signature can be submitted to by having the client A that produces account a, also can by client A with signature pass to have the client B that changes account b over to after, submit the checking of bank service side to by client B again, the latter's benefit is to cause fund to change the situation at errors of account family, even can when submitting to, client B increase the signature authentication of client B, safer to reach multiple signature authentication, and client B also cannot the deny knowledge of fund changes its account's the fact over to.So side of producing for complete funds transfer transaction, disposable numbering cipher code set needs three pairs of passwords at least, but some transfer transactions can be after finishing second step in (after) behind the certain hour fund of thawing automatically, so also can finish transfer transactions in two steps such as one day.Should be increased in the checking of finishing account transfer back account balance in addition, use so need password of other increase to make the verifying account remaining sum.Add totally seven passwords in addition so the transfer transactions cipher code set is set to three pairs, also can use two pairs to add totally five passwords.Can be provided with as required.The third party checks if desired, can carry out the digital one time signature by the third party to transaction after the first step produces and check authentication, only just can carry out next step the operation that changes over to after checking correctly.
Other authentification of messages, such as the loan authentication, refund and authenticate, account balance authentication or the like, similar with authentication, be the information of information that is authenticated for arranging, transaction code, loan account number, the amount of the loan etc., general need be just passable through two steps, just adopts the cipher code set that two pairs of passwords are arranged usually.
In order to increase safety, protect the use of disposable numbering cipher code set in addition, prevent Denial of Service attack, the customer need apply for landing password, uses when landing, with tightening security property; More greatly or all higher transaction of safety requirements, can also increase the measure of transaction back report, for the amount of money such as Advise By Wire, SMS notification, mail notification or the like.
By to above setting, just can obtain a lot of bankings and use, withdraw the money or the like such as telephone bank, the Internet bank, note bank, digital payment and settlement, pure digi-tal authentication in open, now enumerate the part service and use as follows:
1, telephone bank.
The client can carry out general message exchange with button and voice with after landing password and landing, and such as common information inquiry, but for important message exchange, needs through the digital one time signature authentication.Telephone bank outside agreement account account transfer, other agreement transaction, can also carry out following transaction except general traditional information inquiry:
(1) discretionary account's account transfer in the system.This is the account account transfer of bank native system inside, need be to transaction code during account transfer, change account number over to and transfer amount is carried out the digital one time signature.
(2) transfer accounts outside the system.This is that the account to other banks outside the bank is transferred accounts, usually outside the system account transfer need provide and produce account number, change over to row number, change account number over to, change name in an account book over to, transfer amount, but phone is difficult to provide name in an account book, the manual service so can make a telephone call to earlier, please bank clerk's typing relevant information, and to transaction code, change row number, account number, the transfer amount back of signing over to and submit to, carry out dual signature with the automatic telephone service again and confirm.
(3) phone remittance.Homologous ray is transferred accounts outward, but signature is payee's identity document numbering and amount information.
(4) phone pay down.Pay down is actually a kind of instant transfer transactions, but require payer and payee all to open customer ID in bank, the payer by to transaction code, change account number and the amount of money over to and carry out the digital one time signature and propose Payment Request, the payer carries out dual signature again as confirming signature then, and will confirm signature friendship payee, the payee lands telephone bank's service, with payer's dual signature and add and own the signature of the account number and the amount of money is confirmed, the payment both sides can confirm success or the failure paid like this, and all can not deny the transaction carried out.
2, the Internet bank.
Use the present invention program, can low-cost, high safety ground building network bank.As long as between the WEB of bank server and certificate server, isolate, just can realize the security of height by use agreement.Even the invador has invaded the WEB server, but he can not arrive certificate server, because realized the agreement isolation between two kinds of servers, isolate such as the custom protocol that is serial ports, even if the invador has controlled the WEB server, can revise all information on the WEB server arbitrarily, but still can not palm off identity or crack authentication relationship.Certainly, the WEB server also can increase fire wall, to improve security.Because the present invention program is based on client's safety, do not rely on any client's communicating terminal, so the client uses any communicating terminal not have security threat.In addition because the present invention program does not provide function of keeping secret, can be between WEB server and client terminal the safety communication passage that constitutes of application safety socket protocol layer (SSL), to increase security and function of keeping secret.The Internet bank almost can realize the most of bank service except that cash safely, such as information inquiry, account transfer, remit money, pay the fees, loan, payment and settlement or the like.
3, digital payment and settlement.
Payment and settlement is exactly the process of transfer transactions.General E-Payment clearing, need high-intensity encryption device, such as the POS machine that uses credit card (or magnetic card), both needed expensive purchase of equipment, need trade company that certain credit worthiness will be arranged again, and each bank increases a lot of links when interconnecting again, also just increased a lot of costs, and the information of credit card and password also leak easily.Use the present invention program's digital payment and settlement, the digital one time signature and the secondary of payment information are confirmed signature, just can realize by the communication modes of any transmitting digital information as long as the client provides.Because payment information and digital one time signature all are arabic numeric characters information, use phone or network communication all very convenient, the digital one time signing messages is not afraid of and is stolen, can public use, as long as can transmit the communication modes of arabic numeric characters information, can be used for realizing payment and settlement.In addition, the payment information or the payment terms that can encrypt needs in the digital one time signature apparatus lock, can only use a disposable numbering cipher code set to carry out ciphering signature this moment to the payment information of locking, use simple equipment just can automatically payment information and corresponding digital one time signature be sent to bank from interface, thereby realize automanual payment and settlement.The numeral payment and settlement also can be used for the shopping online payment, and when doing shopping on the net, the shopping people submits payment information and digital one time signature earlier to, to show the payment purpose, carries out the Signature Confirmation of secondary digital one time again to realize the clearing payment when receiving goods.Use the present invention program's digital payment and settlement really to be implemented in Anywhere, safe and reliable real-time payment and settlement any time because that terminal of using and communication apparatus require is simple relatively, can be low-cost, generally promote the use of on a large scale.This title of numeral payment and settlement has more properly embodied the essence of using, and is different from general conditional electronic payment and settlement.
4, the pure digi-tal authentication in open is withdrawn the money.
The process of withdrawing the money was divided into for two steps, and first step client submits the information of withdrawing the money and digital one time signature to, had bound the account number of withdrawing the money in the information of at this moment withdrawing the money, the withdraw the money amount of money and the end message of withdrawing the money, and bank authenticates client identity and the information of withdrawing the money; Second goes on foot the validation of information of withdrawing the money, and can get corresponding cash after correctly finishing.Use the present invention program, except I can directly carry out the digital one time signature authentication, you also can make a phone call to carry out authentification of message by household or friend.You can obtain the information of withdrawing the money and corresponding digital one time signature by phoning household or friend when the strange land, submit on a certain automatic teller machine or the terminal of withdrawing the money, and then carry out getting cash after dual signature is confirmed.If have someone to intercept all information simultaneously midway and on another terminal, operate, but,, just can not obtain the secondary affirmation and sign, also just can not get cash if the listener-in submits success to because same signature can only be submitted successfully on a terminal.
Use 2: open environment stock jobbery Secure Transaction solution
We determine that security side is service side, and the buyer of participation and the seller are as the customer.Security side provides the believable service side of bargain transaction always in fact, and this programme only provides the more convenient and safe approach of transaction.
The stock jobbery transaction has real-time, the characteristics that security requirement is high.According to these characteristics, we require stock jobbery transaction once to submit to finish, and in order to increase security, requiring before bargain transaction has strict authentication.According to above requirement, we are provided with disposable numbering cipher code set, and every group of cipher code set has a pair of i.e. two passwords, and disposable numbering cipher code set both can be used as authentication, also can use by bargain transaction.Use for convenient, we can be decided to be arabic numeral with the character set of password, and so almost any communication modes can use, and the digital one time signature adopts 8 numerical characters, and each password in the cipher code set adopts 16 numerical characters.Algorithm can adopt MD5 or SHA-1 to generate the arabic numeric characters form summary that is converted to respective length behind the summary sign indicating number again and sign as digital one time.
The customer opens customer ID to security side, and applying for that disposable numbering cipher code set, security side generate disposable numbering cipher code set at random and the client directly shares, security side is kept in the database after disposable numbering cipher code set is encrypted, when the client need serve, scheduling came out to use.The client is kept at password in the digital one time signature apparatus, can be at any time to after the release of digital one time signature apparatus information being carried out digital one time signature and authentication.The customer need apply for landing password in addition, uses when landing, with tightening security property.
When the customer uses service at every turn, must log on security service side by communication (using phone or network etc.), use is landed password and is authenticated, and this is a Weak authentication, can carry out general inquiry transaction.Carry on transactions if desired, also must use disposable numbering cipher code set to carry out strict authentication.During strict authentication, can use disposable numbering cipher code set that one piece of digital information (comprising the authentication transaction code) is carried out the digital one time signature, confirm to pass through behind the signature.
When carrying on transactions, must use disposable numbering cipher code set that bargain transaction sign indicating number, stock code, price are carried out the digital one time signature, the client also must provide the numbering and the digital one time signing messages of disposable numbering cipher code set except the securities information of submitting dealing to.Security side is after receiving stock jobbery Transaction Information, disposable numbering cipher code set and digital one time signing messages, digital one time signature to this client is verified, if it is correct, then this transaction is submitted to, and return to client's correct information and correct digital one time signature, otherwise return the digital one time signature of error message and failure.
Use this programme, help improving transaction security, and it is more simple and convenient to implement various modes of doing business.Such as realizing the phone trading mode safely and reliably, it is also more simple and safe that the network trading mode is set, this programme helps implementation agreement and isolates, as long as, just can realize the security of height with isolating by custom protocol between WEB server (or other connect the server of client terminal) and the certificate server.Because the present invention program does not provide function of keeping secret, can application safety socket protocol layer (SSL) safety communication passage between WEB server and client, increasing security and function of keeping secret, between WEB server and network that the outside is connected, also can use fire wall, with the increase security.

Claims (9)

1, a kind of password setting and using method: the numbering cipher code set is characterized in that:
Cipher code set by a password or more than two orderly password form; Each cipher code set has a numbering, number by this preserve, index, the group of inquiring about, access to your password; Each client has a plurality of cipher code set simultaneously, must distinguish use with different numberings; All passwords generate by collecting random information, have randomness (being pseudo random number strictly speaking), and each password has different random seeds; Cipher code set can write down the access times and the user mode of each password.
2, disposable numbering cipher code set method: numbering cipher code set method according to claim 1, and each password of cipher code set can only be used for effective authentication information once, it is characterized in that: effectively authentication information is once for each password of numbering cipher code set, after with a password one group of information being authenticated, can not re-use this password other information are authenticated.
3, digital one time endorsement method: use one-way hash function, disposal password and message are calculated summary together, and make a summary as the digital one time signature, with the integrality of checking message with this.It is characterized in that:
Using one-way hash function that disposal password and message are calculated eap-message digest together signs as digital one time; So-called disposal password is meant that password can only be used for effective authentication information once; Summary code space for length-specific, use the password space of enough Password Lengths, make in the password space of using, there is abundant collision, make space that the password bump forms near or greater than the eap-message digest space, also just can not attack the security that reach by the method for exhaustion from message digest code to the minimizing password.
4, digital one time endorsement method according to claim 3, it is characterized in that using the described disposable numbering cipher code set substituting disposable password of claim 2 as the digital one time employed password of signing, and make the digital one time signature be associated with the numbering of disposable numbering cipher code set.
5, a kind of authentification of message flow and method: substep is bound treatment technology, it is characterized in that:
For each information task, can be divided into two above steps and finish, it indicates it is that each step has and the employed different password of other steps, with the verification that generates the associated information of this step step by step; The substep step is finished according to the order of sequence, has finished previous step and just can carry out next step suddenly.
6, controlled encryption technique method is characterized in that:
Encrypted message is after preserving, and software of only encrypting or hardware can read; Ciphering process and encrypted content can manual control, perhaps can be as required, part is carried out manual control, its process can not be full automatic, must carry out manual control to encrypting number of times, encrypted content must have all or part of enforcement manual control or carry out manual oversight, and encrypted content must be all before encryption or after encrypting or necessaryly partly obtained affirmation.
7, a kind of encryption device method constructs controlled encryption device according to the controlled encryption technique method of claim 6, it is characterized in that:
Password is kept in the device, can upgrade or replenishes password, and after password was preserved, encrypted message no longer directly exchanged outward installing, and has only software or the hardware encrypted in the device to read; In device, realize cryptographic algorithm, can extract password the information of input or locking is encrypted or verified; Encryption device has display device, can show encrypted all or part of information, so that carry out manual control or manual monitoring; Encrypting number of times can control, and must just can carry out by cryptographic operation after number of times is encrypted in control as required.
8, according to the encryption device method of claim 7, and used the substep binding treatment technology of claim 5, it is characterized in that:
Encryption device is preserved the password more than two, and each step is used different passwords; Encryption device has only the information encryption of previous step or checking correct by set steps flow chart operation, and after corresponding password was effectively used, next step information encryption checking just can be carried out, and the password that this step need be used just can be activated.
9, the method for digital one time signature apparatus, encryption device method according to claim 8, its password uses the described disposable numbering cipher code set of claim 2, and cryptographic algorithm is used the algorithm of the described digital one time endorsement method of claim 4, it is characterized in that:
Device can be preserved the disposable numbering cipher code set of many groups, according to numbering preserve, index and the disposable numbering cipher code set of use, and disposable numbering cipher code set can be upgraded and replenish at any time; No longer exchange with the outer direct information that carries out of device after disposable numbering cipher code set is preserved, software of encrypting in the generator or hardware use; Signature apparatus is realized the digital one time signature algorithm, can calculate and verify the digital one time signature to the information of input; The multistep signature has only been finished rapid digital one time signature calculation or the checking of previous step and has just been carried out the signature computing of next step by both definite sequence execution.
CN 03134683 2003-09-26 2003-09-26 Information security authentication and method for its encrypting device Pending CN1601490A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN 03134683 CN1601490A (en) 2003-09-26 2003-09-26 Information security authentication and method for its encrypting device
PCT/CN2004/001101 WO2005031619A2 (en) 2003-09-26 2004-09-27 Setup and application of mapping cryptogram and device and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03134683 CN1601490A (en) 2003-09-26 2003-09-26 Information security authentication and method for its encrypting device

Publications (1)

Publication Number Publication Date
CN1601490A true CN1601490A (en) 2005-03-30

Family

ID=34659077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03134683 Pending CN1601490A (en) 2003-09-26 2003-09-26 Information security authentication and method for its encrypting device

Country Status (1)

Country Link
CN (1) CN1601490A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007065348A1 (en) * 2005-12-05 2007-06-14 Liu, Jinhong A key digital authentication method using one-time variable
CN100334518C (en) * 2005-07-08 2007-08-29 上海中标软件有限公司 Document digital nano signing and method of reatizing electron seal and hand writing name signing
CN102447699A (en) * 2011-11-29 2012-05-09 中福在线投资有限公司 Safe transaction method for mobile Internet lottery based on hardware information
CN101216915B (en) * 2008-01-21 2012-07-25 深圳市路通网络技术有限公司 A secured mobile payment method
CN102685129A (en) * 2012-05-10 2012-09-19 苏州阔地网络科技有限公司 Method and system for implementing information safety
CN104598960A (en) * 2014-10-31 2015-05-06 厦门盛华电子科技有限公司 Mobile phone Bluetooth KEY capable of performing authentication and encryption and decryption and authenticating and encrypting and decrypting method thereof
CN105162760A (en) * 2015-07-28 2015-12-16 郝孟一 Random draw-off method, apparatus and system
CN106027456A (en) * 2015-03-25 2016-10-12 瞻博网络公司 Apparatus and method for authenticating network devices
CN109388953A (en) * 2017-08-02 2019-02-26 三星电子株式会社 Safety equipment, electronic equipment and the method for operating electronic equipment
CN110263572A (en) * 2019-05-15 2019-09-20 苏宁易购集团股份有限公司 Two number formularies are according to safety collision method and system
CN111222177A (en) * 2020-01-13 2020-06-02 湖南遥昇通信技术有限公司 Digital fingerprint processing and signature processing method
CN112615824A (en) * 2020-12-03 2021-04-06 清华大学 Anti-leakage one-time pad communication method and device
CN113508407A (en) * 2018-12-21 2021-10-15 西门子股份公司 Method for operating a distributed database system, distributed database system and industrial automation system

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100334518C (en) * 2005-07-08 2007-08-29 上海中标软件有限公司 Document digital nano signing and method of reatizing electron seal and hand writing name signing
WO2007065348A1 (en) * 2005-12-05 2007-06-14 Liu, Jinhong A key digital authentication method using one-time variable
CN101216915B (en) * 2008-01-21 2012-07-25 深圳市路通网络技术有限公司 A secured mobile payment method
CN102447699A (en) * 2011-11-29 2012-05-09 中福在线投资有限公司 Safe transaction method for mobile Internet lottery based on hardware information
CN102685129A (en) * 2012-05-10 2012-09-19 苏州阔地网络科技有限公司 Method and system for implementing information safety
CN104598960A (en) * 2014-10-31 2015-05-06 厦门盛华电子科技有限公司 Mobile phone Bluetooth KEY capable of performing authentication and encryption and decryption and authenticating and encrypting and decrypting method thereof
CN106027456A (en) * 2015-03-25 2016-10-12 瞻博网络公司 Apparatus and method for authenticating network devices
CN105162760B (en) * 2015-07-28 2018-08-14 郝孟一 Randomly select method, apparatus and system
CN105162760A (en) * 2015-07-28 2015-12-16 郝孟一 Random draw-off method, apparatus and system
CN109388953A (en) * 2017-08-02 2019-02-26 三星电子株式会社 Safety equipment, electronic equipment and the method for operating electronic equipment
CN109388953B (en) * 2017-08-02 2023-05-16 三星电子株式会社 Security device, electronic device, and method of operating electronic device
CN113508407A (en) * 2018-12-21 2021-10-15 西门子股份公司 Method for operating a distributed database system, distributed database system and industrial automation system
CN110263572A (en) * 2019-05-15 2019-09-20 苏宁易购集团股份有限公司 Two number formularies are according to safety collision method and system
CN110263572B (en) * 2019-05-15 2022-03-18 苏宁易购集团股份有限公司 Safe collision method and system for two-party data
CN111222177A (en) * 2020-01-13 2020-06-02 湖南遥昇通信技术有限公司 Digital fingerprint processing and signature processing method
CN112615824A (en) * 2020-12-03 2021-04-06 清华大学 Anti-leakage one-time pad communication method and device

Similar Documents

Publication Publication Date Title
AU2019240671B2 (en) Methods for secure cryptogram generation
CN105323062B (en) Movable terminal digital certificates electric endorsement method
US10819516B2 (en) System and method for generating and depositing keys for multi-point authentication
CN101848090B (en) Authentication device and system and method using same for on-line identity authentication and transaction
JP2023502346A (en) Quantum secure networking
US20090187980A1 (en) Method of authenticating, authorizing, encrypting and decrypting via mobile service
CN101662469A (en) Method and system based on USBKey online banking trade information authentication
CN101221641B (en) On-line trading method and its safety affirmation equipment
TWI648679B (en) License management system and method using blockchain
CN102075522A (en) Secure certification and transaction method with combination of digital certificate and one-time password
CN101243438A (en) Distributed single sign-on service
CN101216923A (en) A system and method to enhance the data security of e-bank dealings
CN1601490A (en) Information security authentication and method for its encrypting device
CN1980124A (en) Key digital identification method using once variable quantity
CN102073803A (en) Device, method and system for enhancing safety of USBKEY
CN107615797B (en) Device, method and system for hiding user identification data
KR101348079B1 (en) System for digital signing using portable terminal
CN105072136B (en) A kind of equipment room safety certifying method and system based on virtual drive
KR101856530B1 (en) Encryption system providing user cognition-based encryption protocol and method for processing on-line settlement, security apparatus and transaction approval server using thereof
CN102819799A (en) Multi-channel safety authenticating system and authenticating method based on U-Key
TWI469613B (en) A cloud computing authentication system and method
EP3998739A1 (en) Method for certified deliveries and notifications based on blockchain technology
Li et al. Mobile Security Payment Solution Based on Encrypted SMS Verification Code
CN116401697A (en) Electronic bidding privacy protection method based on blockchain
CN116192385A (en) Key management method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1076658

Country of ref document: HK

ASS Succession or assignment of patent right

Owner name: GUANGZHOU TONGYING INFORMATION SCIENCE CO., LTD.

Free format text: FORMER OWNER: LIU REN

Effective date: 20060609

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20060609

Address after: Tianhe District Huaming road Guangzhou City, Guangdong province 510623 No. 21 2103#

Applicant after: Guangzhou Tongying Information Technology Co., Ltd.

Address before: 525125 No. 3, happy road, Li Gang Town, Guangdong, Huazhou

Applicant before: Liu Ren

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1076658

Country of ref document: HK