CN1756157A - Authentation method, equipment authetated thereby, authentation equipment and programme - Google Patents

Authentation method, equipment authetated thereby, authentation equipment and programme Download PDF

Info

Publication number
CN1756157A
CN1756157A CN200510106472.6A CN200510106472A CN1756157A CN 1756157 A CN1756157 A CN 1756157A CN 200510106472 A CN200510106472 A CN 200510106472A CN 1756157 A CN1756157 A CN 1756157A
Authority
CN
China
Prior art keywords
signature
attribute
certified equipment
authenticating device
structured document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200510106472.6A
Other languages
Chinese (zh)
Inventor
池部早人
畑山佳纪
小川和也
武村浩司
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sanyo Electric Co Ltd
Original Assignee
Sanyo Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sanyo Electric Co Ltd filed Critical Sanyo Electric Co Ltd
Publication of CN1756157A publication Critical patent/CN1756157A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

To provide an authentication method with which the time for calculating a signature is shortened and a structured document that does not require normalization of a message is authenticated. An apparatus 10 to be authenticated includes: a step A of receiving a structured document including at least one element including at least one attribute; a step B of rearranging attributes included in the structured document received in the step A according to predetermined rules; a step C of linking attribute values that are values of the attributes in the order of arrangement in the step B; a step D of calculating a signature by inputting, to a predetermined hash function, the attribute values linked in the step C; and a step E of adding the signature calculated in the step D to the structured document and transmitting it to an authentication apparatus.

Description

Authentication method, certified equipment, authenticating device and program
Technical field
The present invention relates to the authentication method that authenticating device authenticates for the structured document that sends from certified equipment and be used for the authenticating device of this authentication method, certified equipment and program.
Background technology
Generally, under situation about communicating between a plurality of equipment that link to each other with network, the message that receiving equipment (authenticating device) needs authentication to send from transmitting apparatus (certified equipment).
In existing authentication method, public keys (authentication secret) between transmitting apparatus use and the receiving equipment generates signature, and the signature that is generated added to send on the message, this receiving equipment is confirmed the legitimacy of this message according to being added on signature on the message that is received.
[non-patent literature 1] " Extensible Markup Language (XML) 1.0 (ThirdEdition) " W3C on February 4th, 2004 advises the Internet<URL: Http:// www.w3.org/TR/2004/REC-xml-20040204
[non-patent literature 2] " Canonical XML Version 1.0 ", March 15 calendar year 2001, W3 suggestion, the Internet<URL: Http:// www.w3.org/TR/xml-c14n
[patent documentation 3] spy opens the 2001-42768 communique
But, in aforesaid existing authentication method, because transmitting apparatus (and receiving equipment) is calculated above-mentioned signature by the hash function (hash function) that message integral body is input to regulation, so under the situation that message is grown, have these signature needs problem for a long time of calculating.
In addition, in existing authentication method, structured documents such as XML (Extensible Markup Language) file are being used as under the situation of message, on the standard of XML, owing to see the difference of the order of attribute, even so same message is handled with different forms, the signature of being calculated by each equipment also might be different, so the standardized problem that need carry out message is arranged.
Summary of the invention
Therefore, the present invention In view of the foregoing makes, its objective is provides a kind of at when having shortened the time of calculating signature, do not need to carry out message standardized structured document authentication method and be used for the authenticating device of this authentication method, certified equipment and program.
The authentication method that the authenticating device to the effect that of first feature of the present invention authenticates the structured document that sends from certified equipment, comprise: operation A, described certified equipment generates the structured document that comprises at least one key element that contains an attribute at least; Process B, described certified equipment rearrange the described attribute that contains in the described structured document that generates in described operation A with predetermined rule; Operation C, the order of described certified equipment to rearrange in the described process B, combination is as the property value of the value of described attribute; Step D, described certified equipment is calculated signature by the hash function that the described property value after the combination among the described operation C is input to regulation; Operation E, described certified equipment adds to the described signature of being calculated in the described step D in the described structured document and sends to described authenticating device; Operation F, described authenticating device rearrange for the described attribute that contains the described structured document that sends from described certified equipment with described predetermined rule; Operation G, the order of described authenticating device to rearrange in described operation F makes up the property value as the value of described attribute; Step H, described authenticating device by will carry out among the described operation G the described property value of combination be input in the hash function of described regulation and calculate signature; Operation I, described authenticating device obtain the signature of adding from the described structured document that described certified equipment sends; Operation J, described authenticating device compares the described signature that obtains among the described signature of calculating in the described step H and the described operation I; Operation K, described authenticating device judge according to the comparative result of described operation J whether the described structured document that sends from described certified equipment is proper file.
According to the present invention, even certified equipment and authenticating device are under the long situation of the structured document that is sent, also can be only calculate signature according to the property value that contains in this structured document as the value of attribute, so can shorten the time of calculating signature, can shorten the time that authentication spent for this structured document.
In first feature of the present invention, in described step D, described certified equipment can by make up the described property value that makes up among the described operation C and and described authenticating device between public keys and be input to the hash function of described regulation, calculate described signature; In described step H, described authenticating device can be calculated described signature by making up described property value and described public keys that makes up among the described operation G and the hash function that is input to described regulation.
According to the present invention, owing to use the public keys between certified equipment and the authenticating device to calculate signature, so can detect the structured document that has added wrongful signature by the third party who does not have this public keys.
In first feature of the present invention, in described process B, described certified equipment can be for the described attribute that contains in the described structured document that generates among the described operation A, rearranges with the lexicographic order of the identifier of this attribute; In described step D, described authenticating device can be for the described attribute that contains in the described structured document that sends from described certified equipment, rearranges with the lexicographic order of the identifier of this attribute.
According to the present invention, because certified equipment and authenticating device rearrange each attribute with the lexicographic order of the identifier of each attribute, so calculate the unique decision of order of the property value of signature combination at every turn, even do not carry out the normalization of structured document, also can in certified equipment and authenticating device, solve the problem of the different inconvenience of the signature that may in structured document, add.
In first feature of the present invention, in described step D, described certified equipment also can be calculated described signature by making up the described property value that makes up among the described operation C and the sequence number by described certified equipment control and being input to the hash function of described regulation; In described step H, described authenticating device also can be calculated described signature by making up described property value and described sequence number that makes up among the described operation G and the hash function that is input to described regulation.
According to the present invention, because certified equipment and authenticating device use by the sequence number of this certified equipment (transmitter side) management and calculate signature, even so improper structured document that sends from this certified equipment of having obtained of the third party, and obtained structured document is sent under the situation of this authenticating device, can be wrongful file also by judge this structured document with reference to this sequence number.
In first feature of the present invention, in described step D, described certified equipment also can be calculated described signature by identifier that makes up the described property value that makes up among the described operation C and this certified equipment and the hash function that is input to described regulation; In described step H, described authenticating device also can be input to the hash function of described regulation by the identifier that makes up the described property value that makes up among the described operation G and described certified equipment, calculates described signature.
According to the present invention, calculate signature by the identifier of using certified equipment, and the identical situation of signature that consideration is calculated for same structured document between certified equipment and authenticating device, avoid the situation of the structured document that direct use received, can avoid the generation of accident situation in the authentication method.
In first feature of the present invention, in described process B, described certified equipment also can only rearrange the attribute that contains in the key element of stipulating; Among the described operation C, the order of described certified equipment to rearrange in the described process B only makes up the property value of the value of the described attribute of conduct that contains in the key element of described regulation; In described operation F, the attribute that described authenticating device only contains in the key element to described regulation rearranges; In described operation G, the order of described authenticating device to rearrange in described operation F only makes up the property value of the value of the described attribute of conduct that contains in the key element of described regulation.
According to the present invention, owing to only use the property value that in important key element, contains to calculate signature as the value of attribute, so can shorten the time that computing spent of signature more.
To the effect that a kind of certified equipment of second feature of the present invention, comprising: generating unit, its generation comprises the structured document of at least one key element that contains an attribute at least; Rearrange portion, it rearranges for the described attribute that contains in the described structured document that generates by described generating unit with predetermined rule; The combination section, its order to arrange by the described portion of rearranging, combination is as the property value of the value of described attribute; The signature operational part, it is by calculating signature in the hash function that will be input to regulation by the described property value of described combination section combination; The signature addition portion, it adds the described signature of calculating by described signature operational part in the described structured document to; Sending part, it sends the described structured document that has added described signature by described signature addition portion to authenticating device.
To the effect that a kind of authenticating device of the 3rd feature of the present invention, comprising: acceptance division, its reception comprises the structured document of at least one key element that contains an attribute at least; Rearrange portion, it rearranges for the described attribute that contains in the described structured document that receives by described acceptance division with predetermined rule; The combination section, its order to arrange by the described portion of rearranging, combination is as the property value of the value of described attribute; The signature operational part, it is by calculating signature in the hash function that will be input to regulation by the described property value of described combination section combination; The signature obtaining section, it obtains the signature of adding in the described structured document that receives by described acceptance division; The signature comparing section, described signature that it is relatively calculated by described signature operational part and the described signature that obtains by described signature obtaining section; Judging part, it judges according to the comparative result that is obtained by described signature comparing section whether the described structured document that sends from described certified equipment is proper file.
To the effect that a kind of computer that makes of the 4th feature of the present invention is carried out the program that following operation is used: operation A, generates the structured document that comprises at least one key element that contains an attribute at least; Process B with predetermined rule, rearranges the described attribute that contains in the described structured document that generates in described operation A; Operation C with the order that rearranges, makes up the property value as the value of described attribute in described process B; Step D is calculated signature by the hash function that the described property value after the combination among the described operation C is input to regulation; Operation E adds the described signature of being calculated in the described step D in the described structured document to and sends to described authenticating device.
To the effect that a kind of computer that makes of the 5th feature of the present invention is carried out the program that following operation is used: operation A, receives the structured document that comprises at least one key element that contains an attribute at least from certified equipment; Process B with predetermined rule, rearranges the described attribute that contains in the described structured document that receives in described operation A; Operation C with the order that rearranges in the described process B, makes up the property value as the value of described attribute; Step D is calculated signature by the hash function that the described property value after the combination among the described operation C is input to regulation; Operation E obtains the signature of adding in the described structured document that is received among the described operation A; Operation F, the described signature that obtains among described signature of calculating in the more described step D and the described operation E; Operation G according to the comparative result among the described operation F, judges whether the described structured document that sends from described certified equipment is proper file.
As above illustrated, according to the present invention, can provide the time of having calculated signature at having shortened, and do not need message standardized structured document authentication method and be used for the authenticating device of this authentication method, certified equipment and program.
Description of drawings
Fig. 1 is the overall structure figure of the Verification System of first execution mode of the present invention;
Fig. 2 is the functional block diagram of the certified equipment in the Verification System of first execution mode of the present invention;
Fig. 3 is the functional block diagram of the authenticating device in the Verification System of first execution mode of the present invention;
Fig. 4 is the time diagram of the authentication method of expression first execution mode of the present invention;
Fig. 5 is the flow chart of action of step S1001 of the authentication method of expression first execution mode of the present invention;
Fig. 6 is the flow chart of action of step S1003 of the authentication method of expression first execution mode of the present invention;
Fig. 7 is the flow chart of action of step S1005 of the authentication method of expression first execution mode of the present invention;
Fig. 8 is the flow chart of signature computing action (step S1003h and S1005g) of the authentication method of expression first execution mode of the present invention;
Fig. 9 is illustrated in the authentication method of first execution mode of the present invention, from the figure of certified equipment to an example of the message of the band signature of authenticating device transmission;
Figure 10 is illustrated in the authentication method of first execution mode of the present invention, and the figure that whether will rearrange the form of the attribute that contains in each key element is set;
Figure 11 is that the signature that is illustrated in the authentication method of first execution mode of the present invention is calculated in the action, for the value of an example of the combination action (step S2002) that rearranges action (step S2001) and each property value of each attribute;
Figure 12 is that the signature that is illustrated in the authentication method of first execution mode of the present invention is calculated in the action, for the value of an example of the combination action (step S2002) that rearranges action (step S2001) and each property value of each attribute;
Figure 13 is that the signature that is illustrated in the authentication method of first execution mode of the present invention is calculated in the action, the figure of an example of authentication secret, client-server identifier, sequence number and property value that expression is made up;
Figure 14 is illustrated in the authentication method of first execution mode of the present invention, from the figure of certified equipment to an example of the message of the band signature of authenticating device transmission.
Among the figure: the message of 1-band signature, the certified equipment of 10-, 101-control part, 102-message generating unit, 103-arithmetic section obtaining section, 104-public-key cryptography storage part, 105-random number generating unit, 106-privacy key storage part, 107-random number obtaining section, 108-public-key cryptography obtaining section, 110-authentication secret generating unit, 111-authentication secret storage part, 112-authentication secret obtaining section, 113-signs operational part, and 114-signs addition portion, the 115-sending part, 116-acceptance division, 30-authenticating device, the 301-control part, 303-arithmetic section obtaining section, 304-public-key cryptography storage part, 305-random number generating unit, 306-privacy key storage part, 307-random number obtaining section, 308-public-key cryptography obtaining section, 309-signs obtaining section, 310-authentication secret generating unit, 311-authentication secret storage part, 312-authentication secret obtaining section, 313-signs operational part, the 315-sending part, the 316-acceptance division, the 317-Return Reception Dept., 318-signs comparing section.
Embodiment
(structure of the Verification System of first execution mode of the present invention)
Referring to figs. 1 through Fig. 3, the structure of the Verification System of first execution mode of the present invention is described.In the Verification System of present embodiment, constitute authenticating device 30 authentications through the message 1 of network from the band signature of certified equipment 10 transmissions.
In addition, in the present embodiment, illustrate that structured documents such as using the XML file is used as the situation of message.
Fig. 2 represents the major function of the certified equipment 10 in the Verification System of present embodiment, and Fig. 3 represents the major function of the authenticating device 30 in the Verification System of present embodiment.
As shown in Figure 2, certified equipment 10 has control part 101, message generating unit 102, arithmetic section obtaining section 103, public-key cryptography storage part 104, random number generating unit 105, privacy key storage part 106, random number obtaining section 107, public-key cryptography obtaining section 108, authentication secret generating unit 110, authentication secret storage part 111, authentication secret obtaining section 112, signature operational part 113, signature addition portion 114, sending part 115 and acceptance division 116.
Each function of the certified equipment 10 of control part 101 controls.
Message generating unit 102 generates the message that sends to authenticating device 10 through network.
Under the situation that the message that is generated is not needed to authenticate, message generating unit 102 is entrusted sending part 115, makes it that this message is sent to authenticating device 30.In addition, under the situation that need authenticate the message that is generated, the computing that message generating unit 102 entrusts arithmetic section obtaining section 103 to sign simultaneously, sends this message to signature addition portion 114.
Here, the message that is generated by message generating unit 102 constitutes and (for example comprises a key element at least, " hcsp ", " auth " and " action " etc.), each key element constitutes and (for example comprises an attribute at least, under the situation of " hcsp ", " xmlns " and " to " and " from " etc.) (with reference to Fig. 9).
In addition, message generating unit 102 is entrusted sending part 115 as required, makes its public-key cryptography that sends the certified equipment 10 that sends from public-key cryptography storage part 104 or the random number of the certified equipment 10 that sends from random number generating unit 105.
Arithmetic section obtaining section 103 obtains the used character string of computing of signature according to the trust from message generating unit 102 from the message that is generated, and the computing of entrusting signature operational part 113 to sign.
Concrete, arithmetic section obtaining section 103 obtains the attribute that contains in the key element of the regulation of needs authentication from the message that is generated, and the computing of entrusting signature operational part 113 to sign.In addition, whether 103 management of arithmetic section obtaining section need each key element is authenticated (with reference to Figure 10).
The public-key cryptography of the certified equipment 10 of public-key cryptography storage part 104 storages.Public-key cryptography storage part 104 sends the public-key cryptography of certified equipment 10 as required to message generating unit 102.
Random number generating unit 105 generates the random number of the certified equipment 10 that is used to generate authentication secret (and the public keys between the authenticating device 30).Random number generating unit 105 sends to the random number of certified equipment 10 in message generating unit 102 and the authentication secret generating unit 110 as required.
The privacy key of the certified equipment 10 of privacy key storage part 106 storages.Privacy key storage part 106 sends to the privacy key of certified equipment 10 in the authentication secret generating unit 110 as required.
Random number obtaining section 107 obtains the random number of the authenticating device 30 that receives from authenticating device 30 through acceptance division 116 and sends to authentication secret generating unit 110.
Public-key cryptography obtaining section 108 obtains behind the public-key cryptography of the authenticating device 30 that acceptance division 116 receives from authenticating device 30 and sends to the authentication secret generating unit 110.
Authentication secret generating unit 110 is used the privacy key of certified equipment 10 and the public-key cryptography and the random number of random number and authenticating device 30, generates authentication secret.In addition, authentication secret generating unit 110 constitutes the authentication secret generation method arbitrarily of using, and generates the identical authentication secret of authentication secret that generates with the authentication secret generating unit 310 (aftermentioned) of passing through authenticating device 30.
The authentication secret that 111 storages of authentication secret storage part generate by authentication secret generating unit 110.Authentication secret storage part 111 sends to authentication secret obtaining section 112 as required.
Authentication secret obtaining section 112 will send to from the authentication secret that authentication secret storage part 111 is obtained the signature operational part 113.
Signature operational part 113 is calculated signature according to the trust from arithmetic section obtaining section 103.
Concrete, the first, signature operational part 113 is for the attribute that sends from arithmetic section obtaining section 103, rearranges with the predetermined rule lexicographic order of property identifier (for example, with).The second, the order of signature operational part 113 to be rearranged, combination is as the property value of the value of attribute.The 3rd, signature operational part 113 is input to the hash function of regulation by the character string that will be made up, and calculates signature.
In addition, signature operational part 113 also can constitute property value that combination makes up, the authentication secret that sends from authentication secret obtaining section 112, the sequence number of managing by certified equipment 10, the identifier (can be client-server identifiers that client terminal or server terminal are discerned usefulness to certified equipment 10 only also) of certified equipment 10.
Signature addition portion 114 is added the signature of calculating by signature operational part 113 on the message that is generated by message generating unit 102 to.
Sending part 115 sends the message (message of band signature) 1 of having added signature according to the trust from signature addition portion 114 to authenticating device 30.In addition, sending part 15 sends the message of not adding signature according to the trust from message generating unit 102 to authenticating device 30.In addition, sending part 115 sends from the public-key cryptography and the random number of the certified equipment 10 of message generating unit 102 transmissions to authenticating device 30 as required.
Acceptance division 116 receives the public-key cryptography and the random number of authenticating device 30 from authenticating device 30.Acceptance division 116 sends to public-key cryptography obtaining section 30 with the public-key cryptography of the authenticating device 30 that received, and the random number of the authenticating device 30 that received is sent to random number obtaining section 107.
As shown in Figure 3, authenticating device 30 has control part 301, arithmetic section obtaining section 303, public-key cryptography storage part 304, random number generating unit 305, privacy key storage part 306, random number obtaining section 307, public-key cryptography obtaining section 308, signature obtaining section 309, authentication secret generating unit 310, authentication secret storage part 311, authentication secret obtaining section 312, signature operational part 313, sending part 315, acceptance division 316, Return Reception Dept. 317 and signature comparing section 318.
Each function of control part 301 control authenticating devices 30.
Arithmetic section obtaining section 303 obtains the used character string of computing of signature according to the trust from Return Reception Dept. 317 from the message that is received, and the computing of entrusting signature operational part 313 to sign.
Concrete, arithmetic section obtaining section 303 obtains the attribute that contains in the key element of the regulation that needs authentication from the message that is sent by Return Reception Dept. 317, and the computing of entrusting signature operational part 313 to sign.In addition, whether 303 management of arithmetic section obtaining section need each key element is authenticated (with reference to Figure 10).
The public-key cryptography of public-key cryptography storage part 304 authentication storage equipment 30.Public-key cryptography storage part 304 sends to sending part 315 with the public-key cryptography of authenticating device 30 as required.
Random number generating unit 305 generates the random number of the authenticating device 30 that is used to generate authentication secret.Random number generating unit 305 sends to sending part 315 and authentication secret generating unit 310 with the random number of authenticating device 30 as required.
The privacy key of privacy key storage part 306 authentication storage equipment 30.Privacy key storage part 306 sends to authentication secret generating unit 310 with the privacy key of authenticating device 30 as required.
Random number obtaining section 307 obtains the random number of the certified equipment 10 that receives from certified equipment 10 through acceptance division 316 and sends to the authentication secret generating unit 310.
Public-key cryptography obtaining section 308 obtains the public-key cryptography of the certified equipment 10 that receives from certified equipment 10 through acceptance division 316 and sends to the authentication secret generating unit 310.
Authentication secret generating unit 310 is used the privacy key of authenticating device 30 and the public-key cryptography and the random number of random number and certified equipment 10, generates authentication secret.In addition, authentication secret generating unit 310 constitutes the authentication secret generation method arbitrarily of using, and generates the identical authentication secret of authentication secret with authentication secret generating unit 110 generations by certified equipment 10.
The authentication secret that 311 storages of authentication secret storage part generate by authentication secret generating unit 310.Authentication secret storage part 311 sends to authentication secret obtaining section 312 as required.
Authentication secret obtaining section 312 will send to from the authentication secret that authentication secret storage part 311 is obtained the signature operational part 313.
Signature operational part 313 is calculated signature according to the trust from arithmetic section obtaining section 303.
Concrete, the first, signature operational part 313 is according to the attribute that sends from arithmetic section obtaining section 303, rearranges with the predetermined rule lexicographic order of the identifier of signature (for example, with).The second, signature operational part 313 is according to the order that rearranges, and combination is as the property value of the value of attribute.The 3rd, signature operational part 313 is calculated signature by the hash function that the character string that will be made up is input to regulation.
Signature operational part 313 is in order to calculate signature by the method identical with the signature operational part 113 of authenticating device 10, the authentication secret that constitutes property value that combination makes up, sends from authentication secret obtaining section 312, the sequence number of managing by certified equipment 10 and the identifier (can be client-server identifiers that client terminal or server terminal are discerned usefulness to certified equipment 10 only also) of certified equipment 10.
The public-key cryptography of the authenticating device 30 that sending part 315 will send from public-key cryptography storage part 304, or the random number of the authenticating device 30 that sends from random number generating unit 305 sends to certified equipment 10.
Acceptance division 316 is from the message of certified equipment 10 receiving belts signature and the public-key cryptography and the random number of certified equipment 10, and sends in the Return Reception Dept. 317.
Return Reception Dept. 317 sends to public-key cryptography obtaining section 308 with the public-key cryptography of the certified equipment 10 that received, and the random number of the certified equipment 10 that received is sent to random number obtaining section 307.In addition, Return Reception Dept. 317 is analyzed the message of the band signature that is received, and message integral body is sent in the arithmetic section obtaining section 303, and signature is sent in the signature obtaining section 309.
Signature obtaining section 309 obtains signature from Return Reception Dept. 317, and sends in the signature comparing section 318.
Signature comparing section 318 is relatively by signature operational part 313 signature of calculating and the signature that obtains by signature obtaining section 309, and according to this comparative result, judges whether the message of the band signature that receives from certified equipment 10 is proper file.
(authentication method of first execution mode of the present invention)
To Figure 14, the authentication method of first execution mode of the present invention is described with reference to Fig. 4.
As shown in Figure 4, in step S1001, the random number generating unit 305 of authenticating device 30 generates the random number of authenticating device 30 and sends to (the step S1001a of Fig. 5) in the sending part 315, and sending part 315 is obtained the public-key cryptography (the step S1001b of Fig. 5) of authenticating device 30 from public-key cryptography storage part 304.
In step S1002,315 pairs of certified equipment 10 of sending part send the public-key cryptography and the random number of obtained authenticating device 30.
In addition, kept at certified equipment 10 under the situation of the public-key cryptography of authenticating device 30 and random number, step S1001 and S1002 can omit.
Then, with reference to Fig. 6, describe the action of step S1003 of the certified equipment 10 of the public-key cryptography received above-mentioned authenticating device 30 and random number in detail.
As shown in Figure 6, in step S1003a, the authentication secret generating unit 110 of certified equipment 10 obtains the public-key cryptography and the random number of authenticating device 30.
In step S1003b, authentication secret generating unit 110 obtains the privacy key of certified equipment 10 from key key storage part 106.
In step S1003c, authentication secret generating unit 110 obtains the random number of the certified equipment 10 that generates by random number generating unit 105.
In step S1003d, the privacy key and the random number of the public-key cryptography of authentication secret generating unit 110 use Authentication devices 30 and random number, certified equipment 10, the authentication secret of the public keys between generation conduct and the authenticating device 30.
In step S1003e, authentication secret generating unit 110 stores the authentication secret that is generated in the authentication secret storage part 111 into.
In step S1003f, message generating unit 102 obtains the public-key cryptography of certified equipment 10 from public-key cryptography storage part 104.
In step S1003g, message generating unit 102 generates the message that sends to authenticating device 30 structured documents such as () XML files.
In step S1003h, signature operational part 113 is calculated the signature of adding on the message that generates by message generating unit 102.Describe the action of this step S1003h in detail with reference to Fig. 8.In addition, in the action of step S1003h, calculate among Fig. 9 the signature that is equivalent to " signature ".
As shown in Figure 8, in step S2001, signature operational part 113 rearranges all properties of the key element of authentication needs with predetermined rule.
For example, under the situation of message shown in Figure 9, signature operational part 113 is arranged the attribute that contains in " hcsp " key element and " action " key element with the lexicographic order of the identifier (hcsp and action) of attribute.The step S2001 of Figure 11 represents the example that rearranges of the attribute that contains in " hcsp " key element, and the step S2001 of Figure 12 represents the example that rearranges of the attribute that contains in " hcsp " key element.
At this moment, signature operational part 113 is with reference to form shown in Figure 10, and whether judge needs in each key element to authenticate.
In addition, above-mentioned lexicographic order can be that the ascending order for the character string of the identifier that constitutes attribute also can be a descending.In addition, in above-mentioned lexicographic order, also numeral can be handled as the literal more preferential than English, also English can be handled as the literal more preferential than numeral.
In step S2002, the signature order of operational part 113 to rearrange makes up the property value as the value of attribute that contains in each key element.
For example, signature operational part 113 is shown in the step S2002 of Figure 11, and the property value of the attribute that contains in combination " hcsp " key element shown in the step S2002 of Figure 12, makes up the property value of the attribute that contains in " hcsp " key element.
In step S2003, signature operational part 113 is judged all key elements that authenticate for needs, and whether the combined treatment that rearranges processing and property value of above-mentioned attribute is finished.Be judged as under the situation about having finished, this action enters into step S2004, be judged as under the situation about not finishing, the processing of this action repeating step S2001 and S2002 is up to for all key elements, till the rearranging of above-mentioned attribute handled and the combined treatment of property value finishes.
In step S2004, after the property value of the attribute that signature operational part 113 has contained, be combined in each property value of the attribute that contains in all key elements in having made up each key element.
In step S2005, signature operational part 113 combined authentication keys, sequence number, client-server identifier (or identifier of certified equipment 10) and the property value (with reference to Figure 13) that is made up.
In step S2006, the character string that signature operational part 113 will be made up in step S2005 is input to the hash function (being " SHA-1 " in the example of Figure 13) of regulation, and calculates signature.
Then, as shown in Figure 6, in step S1003i, signature addition portion 114 will be added to by the signature of calculating of signature operational part 113 on the message that sends from message generating unit 102 (with reference to Fig. 9).
Then, as shown in Figure 4, in step S1004, sending part 115 will send to the authenticating device 30 from the message 1 that the band that signature addition portion 114 obtains is signed.In addition, as required, sending part 115 sends to authenticating device 30 with the public-key cryptography and the random number of certified equipment 10.
Here, Figure 14 (a) has represented the example for the message of air-conditioning, and Figure 14 (b) expression is for an example of the message at gate.In two message, need authenticate for " action " key element, do not need to authenticate for " query " key element.
Then, describe the action of authenticating device 30 in step S1005 that has received above-mentioned band signature message 1 (with the public-key cryptography and the random number of certified equipment 10) in detail with reference to Fig. 7.
As shown in Figure 7, in step S1005a, the acceptance division 316 of authenticating device 30 receives the band signature message 1 that sends from certified equipment 10.
In step S1005b, signature obtaining section 309 receives and obtains the signature on the message 1 that is added on the band signature.
In step S1005c, authentication secret generating unit 310 obtains the public-key cryptography and the random number of certified equipment 10.
In step S1005d, authentication secret generating unit 310 obtains the privacy key of authenticating device 30 from privacy key storage part 306, and obtains the random number of authenticating device 30 from random number generating unit 305.
In step S1005e, authentication secret generating unit 310 is used the public-key cryptography and the random number of certified equipment 10, the privacy key of authenticating device 30 and random number, generate as and certified equipment 10 between the authentication secret of public keys.
In step S1005f, authentication secret generating unit 310 stores the authentication secret that is generated in the authentication secret storage part 311 into.
In step S1005g, signature operational part 313 by with the identical method of processing of the step S1003h of certified equipment 10, calculate signature (with reference to Fig. 8) for the message 1 of the band signature that sends from certified equipment 10.
In step S1005h, signature comparing section 318 judges the signature of calculating by signature operational part 313 and whether obtain signature by signature obtaining section 309 consistent.
Being judged as under the consistent situation, in step S1005i, signature comparing section 318 is judged as from the message 1 of the band signature of certified equipment 10 transmissions and is proper message.
On the other hand, being judged as under the inconsistent situation, in step S1005j, signature comparing section 318 is judged as the band signature message 1 that sends from certified equipment 10 and is improper message, and deletes the message 1 of this band signature.

Claims (20)

1. authentication method, its be authenticating device to the authentication method that the structured document that sends from certified equipment authenticates, it is characterized in that, comprising:
Operation A, described certified equipment generates the structured document that comprises at least one key element that contains an attribute at least;
Process B, described certified equipment rearrange the described attribute that contains in the described structured document that generates in described operation A with predetermined rule;
Operation C, the order of described certified equipment to rearrange in the described process B makes up the property value as the value of described attribute;
Step D, described certified equipment is calculated signature by the hash function that the described property value after the combination among the described operation C is input to regulation;
Operation E, described certified equipment adds to the described signature of being calculated in the described step D in the described structured document and sends to described authenticating device;
Operation F, described authenticating device rearrange for the described attribute that contains the described structured document that sends from described certified equipment with described predetermined rule;
Operation G, the order of described authenticating device to rearrange in described operation F makes up the property value as the value of described attribute;
Step H, described authenticating device are input to by the described property value that will make up among the described operation G in the hash function of described regulation and calculate signature;
Operation I, described authenticating device obtain the signature that is added on from the described structured document that described certified equipment sends;
Operation J, described authenticating device compares the described signature that obtains among the described signature of calculating in the described step H and the described operation I;
Operation K, described authenticating device judge according to the comparative result of described operation J whether the described structured document that sends from described certified equipment is proper file.
2. authentication method according to claim 1 is characterized in that,
In described step D, described certified equipment by make up the described property value that makes up among the described operation C and and described authenticating device between public keys and be input to the hash function of described regulation, calculate described signature;
In described step H, described authenticating device is calculated described signature by making up described property value and described public keys that makes up among the described operation G and the hash function that is input to described regulation.
3. authentication method according to claim 1 is characterized in that,
In described process B, described certified equipment is for the described attribute that contains in the described structured document that generates among the described operation A, rearranges with the lexicographic order of the identifier of this attribute;
In described step D, described authenticating device is for the described attribute that contains in the described structured document that sends from described certified equipment, rearranges with the lexicographic order of the identifier of this attribute.
4. authentication method according to claim 1 is characterized in that,
In described step D, described certified equipment is calculated described signature by making up the described property value that makes up among the described operation C and the sequence number by described certified equipment control and being input to the hash function of described regulation;
In described step H, described authenticating device is calculated described signature by making up described property value and described sequence number that makes up among the described operation G and the hash function that is input to described regulation.
5. authentication method according to claim 1 is characterized in that,
In described step D, described certified equipment is calculated described signature by identifier that makes up the described property value that makes up among the described operation C and this certified equipment and the hash function that is input to described regulation;
In described step H, described authenticating device is calculated described signature by identifier that makes up the described property value that makes up among the described operation G and described certified equipment and the hash function that is input to described regulation;
6. authentication method according to claim 1 is characterized in that,
In described process B, described certified equipment only rearranges the attribute that contains in the key element of stipulating;
In described operation C, the order of described certified equipment to rearrange in the described process B only makes up the property value of the value of the described attribute of conduct that contains in the key element of described regulation;
In described operation F, the attribute that described authenticating device only contains in the key element to described regulation rearranges;
In described operation G, the order of described authenticating device to rearrange in described operation F only makes up the property value of the value of the described attribute of conduct that contains in the key element of described regulation.
7. a certified equipment is characterized in that, comprising:
Generating unit, its generation comprises the structured document of at least one key element that contains an attribute at least;
Rearrange portion, it rearranges for the described attribute that contains in the described structured document that generates by described generating unit with predetermined rule;
The combination section, its order to arrange by the described portion of rearranging, combination is as the property value of the value of described attribute;
The signature operational part, it is by calculating signature in the hash function that will be input to regulation by the described property value of described combination section combination;
The signature addition portion, it adds the described signature of calculating by described signature operational part in the described structured document to;
Sending part, it sends the described structured document that has added described signature by described signature addition portion to authenticating device.
8. certified equipment according to claim 7, it is characterized in that, described signature operational part by combination by the described property value of described combination section combination and and described authenticating device between public keys and be input in the hash function of described regulation, and calculate described signature.
9. certified equipment according to claim 7 is characterized in that, the described portion that rearranges is for the described attribute that contains in the described structured document that generates by described generating unit, rearranges with the lexicographic order of the identifier of this attribute.
10. certified equipment according to claim 7, it is characterized in that, described signature operational part by in the described property value of described combination section combination and the sequence number that manages by this certified equipment and the hash function that is input to described regulation, and is calculated described signature by combination.
11. certified equipment according to claim 7, it is characterized in that, described signature operational part by the identifier of the described property value of described combination section combination and this certified equipment and be input in the hash function of described regulation, and is calculated described signature by combination.
12. certified equipment according to claim 7 is characterized in that,
The described portion of rearranging only rearranges the attribute that contains in the key element of stipulating;
The order of described combination section to arrange by the described portion of rearranging only makes up the property value of the value of the described attribute of conduct that contains in the key element of described regulation.
13. an authenticating device is characterized in that, comprising:
Acceptance division, its reception comprises the structured document of at least one key element that contains an attribute at least;
Rearrange portion, it rearranges for the described attribute that contains in the described structured document that receives by described acceptance division with predetermined rule;
The combination section, its order to arrange by the described portion of rearranging, combination is as the property value of the value of described attribute;
The signature operational part, it is by calculating signature in the hash function that will be input to regulation by the described property value of described combination section combination;
The signature obtaining section, it obtains the signature that is added in the described structured document that receives by described acceptance division;
The signature comparing section, described signature that it is relatively calculated by described signature operational part and the described signature that obtains by described signature obtaining section;
Judging part, it judges according to the comparative result that is obtained by described signature comparing section whether the described structured document that sends from described certified equipment is proper file.
14. authenticating device according to claim 13, it is characterized in that, described signature operational part by combination by the described property value of described combination section combination and and described certified equipment between public keys and be input in the hash function of described regulation, and calculate described signature.
15. authenticating device according to claim 13 is characterized in that, the described portion that rearranges is for the described attribute that contains in the described structured document that receives by described acceptance division, rearranges with the lexicographic order of the identifier of this attribute.
16. authenticating device according to claim 13, it is characterized in that, described signature operational part by in the described property value of described combination section combination and the sequence number that manages by this certified equipment and the hash function that is input to described regulation, and is calculated described signature by combination.
17. authenticating device according to claim 13, it is characterized in that, described signature operational part by the identifier of the described property value of described combination section combination and this certified equipment and be input in the hash function of described regulation, and is calculated described signature by combination.
18. authenticating device according to claim 13 is characterized in that,
The described portion of rearranging only rearranges the attribute that contains in the key element of stipulating;
The order of described combination section to arrange by the described portion of rearranging only makes up the property value of the value of the described attribute of conduct that contains in the key element of described regulation.
19. one kind makes computer carry out the program that following operation is used, comprising:
Operation A generates the structured document that comprises at least one key element that contains an attribute at least;
Process B with predetermined rule, rearranges the described attribute that contains in the described structured document that generates in described operation A;
Operation C, with the order that rearranges in described process B, combination is as the property value of the value of described attribute;
Step D is calculated signature by the hash function that the described property value after the combination among the described operation C is input to regulation;
Operation E adds to the described signature of being calculated in the described step D in the described structured document and sends to described authenticating device.
20. one kind makes computer carry out the program that following operation is used, comprising:
Operation A receives the structured document that comprises at least one key element that contains an attribute at least from certified equipment;
Process B with predetermined rule, rearranges the described attribute that contains in the described structured document that receives in described operation A;
Operation C, with the order that rearranges in the described process B, combination is as the property value of the value of described attribute;
Step D is calculated signature by the hash function that the described property value after the combination among the described operation C is input to regulation;
Operation E obtains the signature of adding in the described structured document that is received among the described operation A;
Operation F, the described signature that obtains among described signature of calculating in the more described step D and the described operation E;
Operation G according to the comparative result among the described operation F, judges whether the described structured document that sends from described certified equipment is proper file.
CN200510106472.6A 2004-09-30 2005-09-26 Authentation method, equipment authetated thereby, authentation equipment and programme Pending CN1756157A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2004286005A JP2006101284A (en) 2004-09-30 2004-09-30 Authentication method, apparatus to be authenticated, authentication apparatus and program
JP2004286005 2004-09-30

Publications (1)

Publication Number Publication Date
CN1756157A true CN1756157A (en) 2006-04-05

Family

ID=36240662

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200510106472.6A Pending CN1756157A (en) 2004-09-30 2005-09-26 Authentation method, equipment authetated thereby, authentation equipment and programme

Country Status (2)

Country Link
JP (1) JP2006101284A (en)
CN (1) CN1756157A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI501154B (en) * 2007-02-01 2015-09-21 Microsoft Corp Secure serial number

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4977060B2 (en) * 2008-02-29 2012-07-18 株式会社東芝 Trail management system, transmission device, and reception device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI501154B (en) * 2007-02-01 2015-09-21 Microsoft Corp Secure serial number

Also Published As

Publication number Publication date
JP2006101284A (en) 2006-04-13

Similar Documents

Publication Publication Date Title
CN1284088C (en) Access control system
CN1716851A (en) Information processing apparatus, information processing method, and storage medium
CN1875564A (en) Methods and apparatus for providing application credentials
CN1929380A (en) Public key certificate state obtaining and verification method
CN1315268C (en) Method for authenticating users
CN1505309A (en) Securely processing client credentials used for web-based access to resources
CN1902561A (en) Method and system for establishing a trust framework based on smart key devices
CN1553349A (en) Safety chip and information safety processor and processing method
CN1829144A (en) Cryptographic communication system and method
CN1630269A (en) Mesh networks with end device recognition
CN1557061A (en) Test enabled application execution
CN1630257A (en) Mesh networks with exclusion capability
CN1926493A (en) Method and system for linking certificates to signed files
CN101077027A (en) Equipped parameters for changing mobile terminal
CN1873652A (en) Device and method for protecting digit content, and device and method for processing protected digit content
CN1941701A (en) Apparatus and method for executing security function using smart card
CN1765078A (en) Identification method
CN1688996A (en) Method to remotely query, safely measure, and securely communicate configuration information of a networked computational device
CN1942845A (en) Access control device and electronic device
CN1645442A (en) Multi-segment signature verifying system, electronic signature providing device, data supplementing device and electronic signature verifying device
CN1874218A (en) Method, system and equipment for license management
CN1794128A (en) Method and system of adding region and obtaining authority object of mobile terminal
CN1867877A (en) Method and system for user attestation-signatures with attributes
CN1783853A (en) Cipher mail server device
CN101060400A (en) Data generating device, data analysis device, control method and data processing system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20060405