EP3967009A1 - Verfahren zur authentisierung eines endnutzers gegenüber einem abhängigen dienst - Google Patents
Verfahren zur authentisierung eines endnutzers gegenüber einem abhängigen dienstInfo
- Publication number
- EP3967009A1 EP3967009A1 EP20725773.4A EP20725773A EP3967009A1 EP 3967009 A1 EP3967009 A1 EP 3967009A1 EP 20725773 A EP20725773 A EP 20725773A EP 3967009 A1 EP3967009 A1 EP 3967009A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- service
- identity
- dependent
- intermediary
- dependent service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000001419 dependent effect Effects 0.000 title claims abstract description 125
- 238000000034 method Methods 0.000 title claims abstract description 53
- 230000005540 biological transmission Effects 0.000 claims description 26
- 238000013475 authorization Methods 0.000 claims description 24
- 238000012546 transfer Methods 0.000 claims description 5
- 230000001960 triggered effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 description 19
- 238000007726 management method Methods 0.000 description 15
- 230000004044 response Effects 0.000 description 13
- 230000009471 action Effects 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 6
- 238000013459 approach Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 3
- 238000012935 Averaging Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 208000016339 iris pattern Diseases 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Definitions
- the subject of the invention is the management of digital identities.
- the invention relates to providing an attribute of a verified digital identity in a federated system with multiple associated identifiers.
- the invention integrates user accounts that are managed by different identity providers and allows dependent services a uniform and transparent use of attributes of a verified digital identity for authentication and establishment of access to a digital service.
- the prerequisite for using the digital identity and thus for access to many digital services is proof that a user is the owner of a digital identity. This is done by authenticating the user. For this purpose, the user offers one or more factors for identification that the system uses with the digital identity
- OpenIDConnect is an industry standard that enables login processes to be easily implemented using various services and systems. Another method is e.g. SAML.
- Kerberos Specific authentication server solutions such as Kerberos are also known. At its core, these solutions are based on a data memory that supports the Retains user data and attributes persistently and is usually managed centrally. The service that stores the user's data and identifies and verifies the user when they log in is known as the identity provider.
- the number of identity givers is significant and increasing. In addition to companies that specifically specialize in providing user identities, these are also the large social networks. Financial institutions and online retailers also have user accounts. In the enterprise environment, every company can manage the identities of its employees. In general, each provider autonomously manages the user accounts set up with them and the user identities associated with the accounts.
- a user can only use a user identity associated with an account for authorization or a login for services that have a trust relationship with the provider who manages the account and if the service is supported by the identity provider.
- a user wishes to use a plurality of services and accounts, he typically has to store his or her identity individually for each service in order to log into the respective service.
- the concept of federated identities is also known.
- a first approach to this is based on the exchange of user identities between grouped identity providers. The user accounts are replicated between different identity providers. This means that a user can log in to any service connected to an identity provider who has either managed or imported the user account in question. This approach is followed by the company Verimi, among others.
- Another approach consists in the dynamic determination and connection with the identity provider, who manages a required user account, during the login process via a network layer. The requesting service trusts all identity providers that can be transferred. After the successful switching phase, the service either communicates directly with the identity provider in order to query the end user's attributes and to carry out the authorization, or it continues via the switching layer.
- Another approach consists in the decentralized management of user accounts on a user's device or in a network.
- the requesting service trusts the terminal or the network. Examples of this are approaches based on the blockchain.
- US 2019/0010109100 Al a method for managing user identities is known, in which a central management server is connected to various facilities on which identities are stored in different forms. The management server accesses the connected facilities in order to establish, secure or release an identity.
- the solution makes it possible in particular to provide an identity with a predetermined level of trustworthiness.
- a system in which a user terminal with an authentication server is connected to a network via an access instance.
- the user terminal is connected to several authentication devices.
- Various authentication devices are registered with the authentication server.
- the authentication server After successful authentication, the authentication server provides a short-lived certificate with which the user terminal issues a ticket from the access instance can pick up. With the ticket, the user terminal receives access to the network and the services that can be accessed via it.
- US 2017/0289134 A1 discloses a consensus system based on a distributed database for providing identities among the system participants, the system using the concept of single sign-on or single sign-on (SSO).
- the system comprises an identity provider server, a user computer and one or more servers from service providers.
- a verified credential is stored with the identity provider server.
- the identity provider server generates an identity token for this purpose and makes it available to a user computer. With the identity token, the user computer can gain access to a server of a service provider. To grant access, the server checks the access status with regard to another system participant under Access to the distributed database. This prevents access from being obtained due to an invalid credential.
- the invention is based on the object of specifying a method which makes it possible to use an already verified digital identity that is stored with an identity generator belonging to a federation of identity providers to prove an identity when using a digital service.
- the proposed method is characterized by an intermediary connected between the dependent services and the federated identity providers.
- service which implements the transfer of identity inquiries that is transparent for all parties. Transparency here means that a dependent service does not know a specifically used identity giver and the identity giver in turn does not become aware of the dependent service or its use by an end user.
- Dependent service and identity provider are decoupled in terms of information. When processing identity inquiries, the dependent service involved and the identity provider involved remain anonymous to one another. The transparency in particular prevents improper evaluation and analysis ("tracking") of exchanged data.
- the intermediary service enables an end user to choose any federated identity giver associated with the intermediary service for proof of identity when accessing a dependent digital service.
- the process allows dependent services to access verified digital identities for login and registration processes for user accounts, which are managed by different identity providers.
- Dependent services only have to integrate themselves once into the federation, regardless of the number of identifiers that are united in the federation.
- a dependent service only needs a trust relationship with the intermediary unit, but not with the individual identity providers. Rather, the dependent service neither needs to know the identity giver nor does a trust relationship need to exist.
- a requesting dependent service does not have to reveal to an identity provider which customer account a request relates to.
- the intermediary unit does not have any insight into or access to attributes of the end users and can only become active upon request from a dependent service.
- attributes in which the intermediary unit are only available in encrypted form ensures that attributes of an end user cannot be changed, viewed or temporarily stored by the intermediary unit.
- the intermediary unit cannot query attributes of an end user without an order from a dependent service.
- the intermediary unit is fixed on a mediating role by the introduced technical measures and prevented from acting as an identity giver or actively calling up attributes of the end user in order to utilize them for other purposes.
- end-to-end encryption ensures the confidentiality and integrity of attributes.
- technical measures ensure that the intermediary unit cannot make a request to a dependent service without a specific request from a dependent service.
- the proposed procedure leads to a strict separation of roles in a federal identity management system. This makes the concept particularly suitable for business applications with special confidentiality requirements, such as in the financial sector. Due to the strict role The concept particularly supports the protection of personal data and the regulated cooperation even in a highly competitive environment.
- FIG. 3 shows a sequence of screen contents which are displayed to an end user at the user interface as part of a provision of identity
- FIG. 1 shows schematically an embodiment of a federative identity management system 1 reduced to the main components.
- Components of the system shown are an intermediary service 15, a dependent service 11, a federated identity provider 21 and a user agent 13.
- All components 11, 13, 15, 21 are connected to the other components via data connections 24 for exchanging data.
- the data connections 24 can be fixed or via the Fuft interface in the form or several networks.
- the data connections 24 are protected by technical measures, for example VPN or TLS, so that only authorized components can enter into communication and the data are protected against falsification and spying.
- the intermediary service 15 is composed of an intermediary unit 16 and a system certification body 18.
- the system certification authority 18 is designed as a separate unit which is based on a separate data processing system.
- the task of the system certification body 18 is to map the trust relationships between the components by issuing certificates or tokens. All other activities of the intermediary service 15 with respect to the identity management system 1 are carried out by the intermediary unit 16. In the following, therefore, only intermediary unit 16 is listed as representative of the entire intermediary service 15 when it performs a function.
- the intermediary service 15 has a memory area 20 which is used in particular to receive tokens and attributes 9.
- the memory area 20 is implemented in the averaging unit 16.
- the user agent 13 has an end user interface 14 to an end user 10.
- the end user interface 14 typically includes a display and a keyboard. Other and further input and output means are possible.
- the end user interface 14 can contain sensors and biometric detection devices for recording authentication factors.
- Dependent service 11, intermediary service 15 and federated identity generator 21 are typically implemented in the form of program sequences that are executed on common data processing systems. The data processing systems are the basis of every component.
- the user agent 13 can be, for example, a browser running on a personal computer or the operating menu of a publicly accessible terminal.
- the end user 10 is the owner of at least one verified digital identity 2, which is stored in a user account 22 with a federated identity provider 21.
- the verified digital identity 2 consists e.g. from personal data and information of the end user 10 such as name, email address, delivery address or bank details, the accuracy of which has already been confirmed to an identity giver 21.
- the personal data and information are attributes 9 of the digital identity 2.
- Each attribute 9 consists of an attribute name 4 and an attribute value 3.
- attributes 9 are not restricted to information typical for business transactions such as the ones listed. Rather, attributes 9 can be any information that is assigned to an end user 10, such as, for example, personal images or audio files.
- each Weil a federated identity generator 21, a dependent service 11 and a user agent 13; real systems usually have one each A plurality of federated federated identifiers, dependent services and user agents.
- the set of connected federated identifiers 21 together form the federation.
- identity giver 21 In the following who the federated identity giver simply referred to as identity giver 21.
- the operator of the dependent service 11 can be, for example, a bank, an authority or an Internet dealer.
- the dependent service 11 typically consists in the provision of a digital service, service or function in connection with a digital resource for which access is restricted to a specific end user or a defined group of specific end users.
- a digital service or function in connection with a digital resource can, for example, open or maintain a bank account, carry out a purchase transaction with an online retailer or perform an administrative act such as the use of an ID card at an examination office.
- digital service 12 the performance, service or function provided by the dependent service is briefly referred to as digital service 12.
- the dependent service 11 is access-protected.
- an authentication of the end user 10 is required, which proves his authorization. This is typically done in a login process by submitting authentication data in the form of a verified digital identity 2 or individual attributes 9 of a verified digital identity 2.
- the dependent service 11 uses the federative identity model. management system 1.
- An identification IDM of the intermediary unit 16 is stored in the dependent service 11, which identifies it during registration.
- a certificate ZTM of the intermediary unit 16 with a public key OKM of the intermediary unit 16 is also stored.
- the identity generator 21 manages one or more user accounts 22 of one or more end users 10 and undertakes the identification and verification of end users 10.
- the identity generator 21 can expediently be based on an ID provider corresponding to the OpenIDConnect de facto standard.
- the identity generator 21 has a private key PPA for issuing and signing tokens, which is issued by a generally accessible certification body (not shown).
- the corresponding public key OKI is transmitted to the intermediary unit 16 via a certificate.
- the intermediary service 15 presents itself to the federation of identity generators 21 like an - individual - dependent service 11.
- the intermediary service 15 has a customary interface with respect to the connected dependent services 11.
- the intermediary service 15 provides a standard-compliant OpenIDConnect interface and shows its behavior.
- a public key OKI is stored for each identity transmitter 21, with which a token of an identity transmitter 21 can be verified.
- the keys OKI are transferred to the mediator unit 16 by certificate.
- the intermediary unit 16 also has a private key PKV for signing tokens.
- the corresponding public key OKV is transmitted to the dependent services 11 in certificates that originate from a generally accessible certification authority (not shown).
- the components of the identity management system 1 communicate via secure communication channels that ensure the confidentiality of the data on the transport route and guarantee the authenticity of the communicating components.
- the secured communication channels are set up via the data links 24 existing between the components.
- Secured communication channels can be formed, for example, in the form of TLS connections.
- the security is carried out, for example, by mutual TLS authentication.
- the security of the identity management system 1 is achieved in particular with tokens and certificates.
- Tokens 5, 6, 7, 8 are generated by the intermediary unit 16 and the identity transmitter 21.
- a structured encrypted date is placed under a token understood that makes it possible to use identity and security information together across different security areas.
- Token is issued by intermediary unit 16 or identity generator 21 and consumed by a trusted component that relies on its content to identify a subject of a token for a security-related purpose.
- the 4 illustrates the structure of a token. It comprises a head part, a payload part and a signature part.
- the header contains a unique identifier TKV, TKF of the respective token.
- the payload part contains, for example, the name of a dependent service 11.
- the signature part contains a signature created with the secret key of the issuer about the content of the header and the payload part.
- a token is signed using a private key and cannot be changed. Its validity can be checked at any time using a corresponding public key or a certificate. It still has a specified service life. After it has expired, a token is no longer considered valid.
- Each token also has a unique identifier TKV, TKF.
- the token has an issuer; this is the component that generated and signed the token.
- the publisher is the only one who has access to the private signing key.
- JSON web tokens JWT
- Other forms of representation of the tokens are also possible.
- Certificates are signed data structures. As with tokens, the integrity of zeros is protected by a signature. This allows certificates cannot be changed after generation, or the change can easily be determined with a public key. Certificates can only be issued by a particular component, for example the system certification authority 18, which is trusted by all components. Only the special component has access to the private key that is used for signing. Certificates relate to a subject hn the procedure described here, the subject is the identifier TKV, TKF of a token. Certificates also have a lifespan. This is linked to the lifetime of the token, the identifier of which is called the subject. Certificates bind a public key to a subject.
- certificates can also be replaced by tokens.
- the system certification authority 18 generates a token with corresponding token attributes for authorized dependent services 11 so that the certification function can be mapped.
- At least one ZIF certificate is stored in the intermediary unit 16 for each identity transmitter 21 integrated into the federation.
- the ZIF certificates are expediently created when a new identity provider 21 is integrated into the federation.
- a verified digital Identi ity 2 of the end user 10 with at least one attribute 9 is stored in the user account 22 at the identity generator 21, the correctness of which has already been confirmed to the identity generator 21.
- Attributes 9 can be, for example, name, email address, delivery address or bank details or personal images or audio files for which specific data or information have been stored.
- the user account 22 with the identity provider 21 is access-protected.
- authentication is required as part of a login process, for example by presenting a password.
- the end user 10 would like to access a protected digital service 12 which is provided by a dependent service 11 for which the end user 10 does not yet have an access account or to which he has not authenticated himself.
- a protected digital service 12 which is provided by a dependent service 11 for which the end user 10 does not yet have an access account or to which he has not authenticated himself.
- the end user 10 would like to use an already stored verified identity 2. This should be made available to the dependent service 11.
- the implementation of the identity provision requires a secure communication channel between the dependent service 11 and the identity generator 21.
- a secure communication channel can be set up with a usual method for setting up a secure transmission channel.
- a key exchange can be provided by a “key wrapping” method in which a secret key is transmitted in a cryptogram.
- the process of providing a verified digital identity 2 is triggered when an end user 10 would like to use a digital service 12 offered by a dependent service 11 which requires authentication to be carried out as part of a login process. The steps in the process are explained below.
- Step 100 The end user 10 selects a desired dependent service 11 via the end user interface 14. To this end, the end user 10 clicks, for example, on a button that is provided on a selection page of the dependent service 11, with which the Internet address of the dependent service is selected.
- Step 102 The user agent 13, e.g. a web browser, opens a connection to the public interface of the selected dependent service 11 and sends a request to this.
- the request can, for example, be in the form of a login request to the internet address of the dependent service
- Step 104 The dependent service 11 examines the request. If he determines that the request is directed to a protected digital service 12 which requires authentication, and if the corresponding authentication data is not available, he starts a login process. In the assumed scenario, the dependent service 11 establishes that the digital service 12 addressed by the request is protected and no authentication data is available. The dependent service 11 therefore starts a login process.
- Step 106 The dependent service 11 generates a selection page (website) with a button, via which the establishment of a connection to the relay unit 16 is triggered.
- the selection page expediently contains information on the dependent service 11. It can contain further information, for example names of the attributes required for the login process.
- the dependent service 11 sends the selection page to the user agent 13.
- Step 108 The selection page is displayed to the end user 10 via the end user interface 14.
- 3a shows an example of a screen content with a displayed selection page. It contains a designation of the dependent service ("Dependent service”), a designation of the executed method step ("Sign-In Process”) and two buttons, one of which (“Sign-In with local account”) relates to a local one Set up an account with the dependent service and the other (“sign-in with ID federation”) triggers the provision of a digital identity via an identity provider.
- Dependent service a designation of the executed method step
- Sign-In Process a designation of the executed method step
- two buttons one of which (“Sign-In with local account") relates to a local one Set up an account with the dependent service and the other (“sign-in with ID federation”) triggers the provision of a digital identity via an identity provider.
- the end user 10 operates the control panel pointing to the identity transmitter.
- the user agent 13 then establishes a connection to the intermediary unit 16.
- the selection page causes the user agent 13 to establish a connection with the mediating unit 16 directly via a direct referral (redirection) without actuating the switch field.
- the authorization request expediently contains information on the selected dependent service 11. It can also contain names of certain attributes that are presented to the dependent service 11 should. It can also contain further information that characterize the access to the dependent service 11 intended by the end user 10.
- the authorization request can be made, for example, in the form of a GET command with which the transmission of a selection page for selecting an identity provider is requested.
- Step 112 In response to the authorization request, the intermediary unit 16 generates a selection page in which all of the federated identity providers 21 are listed.
- the external shape of the selection page and the representation of the identity giver can be freely designed.
- a selection page with finks, buttons, icons or similar control elements is conceivable.
- Fig. 3b shows an example of a screen content with a displayed selection page. It contains a designation of the intermediary unit ("ID Management Broker") and four buttons, three of which lead to different identifiers ("Authentication with ID-A”, "Authentication with ID-B”,
- criteria For example, information on the selected dependent service 11, attribute names 4 or information on further known properties of the intended access sent with the authorization request can be used.
- the end user 10 is requested to transmit his name or another personal date in order to generate a personalized selection page. Furthermore, other factors such as the location used to design the selection page.
- Step 114 The intermediary unit 16 sends the selection page to the user agent 13.
- the selection page is displayed to the end user 10 via the end user interface 14.
- Step 200 The end user 10 selects an identity generator 21 on the displayed selection page, which can provide the attributes 9 required for the upcoming login process. It is assumed that the end user 10 knows which identity generator 21 is suitable. If necessary, the end user 10 can query the names 4 of the required attributes from the dependent service 11. If the selection page is personalized, only those identity transmitters 21 are expediently offered for selection that can provide the required attributes 9.
- Step 202 After the end user 10 has selected an identity transmitter 21, the user agent 13 sends a request to the selected identity transmitter 21.
- Fig. 3c shows an example of a screen content with a displayed selection page. It contains a designation of the identity provider ("ID-Pro many”), a designation of the process step carried out ("Identification & Verification"), interactive fields ("User Name”, “Password”, “OTP”) for entering authentication data and a Button for checking entered data (“Start authentication”).
- ID-Pro many a designation of the identity provider
- Identity & Verification a designation of the process step carried out
- interactive fields (“User Name”, “Password”, “OTP” for entering authentication data
- Button for checking entered data
- Authentication data can also be entered, as shown in FIG. 3c, by means of an auxiliary device, such as a cell phone.
- Biometric data for example a fingerprint, can also be used as authentication data.
- Step 300 The end user 10 authenticates himself in a manner known per se by presenting one or more authentication factors which uniquely identify the end user 10. For example, he presents his name and / or a password and / or a biometric feature such as a fingerprint or an iris pattern via appropriate input means.
- Step 302 The user agent 13 forwards the inputs to the identity generator 21.
- the identity generator 21 checks the presented authentication factors. If the check is successful, the end user 10 is identified and it is certain that the end user 10 belongs to a user account 22 existing with the identity provider 21.
- the identity generator 21 then generates an action code CAK, which enables the authentication that has taken place to be clearly identified.
- the action code CAK is used in the further process to obtain a second date 7 in the form of an FI access token from an Identi ity generator 21 with which the identity generator 21 checks the authorization of a data exchange between the intermediary service 15 and the identity generator 21.
- Step 304 The identity provider sends the action code CAK as a response to the user agent 13.
- the response contains a referral.
- Step 306 The user agent 13 forwards the response from the identity transmitter 21 with the action code CAK in a request to the intermediary unit 16.
- the mediation unit 16 receives the request and the action code CAK as parameters.
- Step 308 The mediator unit 16 contacts the identity generator 21 with the action code CAK as a parameter.
- Step 310 The identity generator 21 checks the received action code CAK for correspondence with the action code CAK originally sent in step 302.
- the identity generator 21 generates an FI access token 7.
- the identity generator also generates an FI refresh token 8. Furthermore, the identity generator 21 generates a session identification IDS.
- the FI access token 7 is used in the further course of the method to set up a secure attribute transmission channel 19 via which for the Access to a protected digital service 12 required attributes 3 are transmitted.
- a new FI access token 7 can be generated automatically when the old one has expired.
- Step 312 FI access token 7, FI refreshing token 8 and session identification IDS are passed by the identity transmitter 21 to the intermediary unit 16.
- the identity transmitter 21 also appropriately transmits a list with the attribute names 4 that are available for the user account 22.
- the list of attribute names 4 of the available attributes 9 is stored by the averaging unit 16 in its memory area 20. It expediently creates a table 23 into which further entries are added in the course of the further process.
- Step 314 The intermediary unit 16 verifies the FI access token 7 and the FI refresh token 8 with the aid of the stored certificate ZIF of the identity provider. If the checking of the tokens 7, 8 is successful, the end user 10 is considered to be verified for the intermediary unit 16.
- the mediator unit 16 stores the FI access token 7 and the FI refresh token 8 in its memory area 20. In a simple manner, the mediator unit 16 uses the table 23 for this and adds the tokens 7, 8. The tokens 7, 8 are not passed to the end user 10, the user agent 13 or the dependent service 11.
- Step 316 The mediating unit 16 generates a selection page with a list with the attribute names 4 of the available attributes 9 and sends this to the user agent 13, where it is displayed to the end user 10 via the end user interface 14.
- FIG. 3d shows, by way of example, a screen content of a selection page with a displayed list of attribute names. It contains a designation of the brokerage service ("ID-Manager ent Broker”), a designation of the procedural steps ("Consent to transfer to dependent service”), the name of a separate attribute in the form of an end user name (“John Doe” ), a two-column table with the names of additional attributes ("profile”, email ",” address ", phone”) and an approval box as well as a button (“approval”) for approving an attribute selection.
- ID-Manager ent Broker a designation of the procedural steps
- Consent to transfer to dependent service the name of a separate attribute in the form of an end user name
- John Doe a two-column table with the names of additional attributes
- approval box as well as a button
- Step 400 The end user 10 selects the names 4 of the attributes for which a transfer of the attributes 3 to the dependent service 11 is to be allowed. By pressing a corresponding button in the selection page, the selected attributes 9 are released for transmission.
- the end user 10 can also select all attributes 9 or the entire digital identity 2.
- Step 402 The user agent 13 sends the attribute names 4 of the attributes 9 released for forwarding to the dependent service 11 to the mediator unit 16.
- Step 404 The mediating unit 16 stores the attribute names 4 released for the selected dependent service 11 in its memory area 20.
- the mediation unit 16 can access the one stored in the memory area 20 Access release. A renewed release by the end user 10 by executing step 400 is then not required.
- Step 406 The mediator unit 16 generates a session code CSM.
- the session code CSM is used in the further course of the method to receive a first date in the form of a V access token 5 from the mediator unit 16.
- the intermediary service 15 uses this to check the authorization of a data exchange between the intermediary service 15 and the dependent service 11.
- the mediator unit 16 further generates a referral response with the session code CSM and status information.
- the mediation unit 16 expediently stores the session code CSM in its memory area 20; it is expediently added to Table 23.
- Step 408 The user agent 13 forwards the referral response to the dependent service 11.
- the session code CSM and the status information are transmitted as parameters.
- Step 410 the dependent service 11 sends a token request to the mediator unit 16.
- the session code CSM is transferred as a parameter.
- Step 412 The mediator unit 16 identifies the session via the session code CSM and generates a V access token 5 with an identifier TKV and a V refresh token 6 using the signing key of the mediator unit.
- the identifier TKV of the V access token 5 is formed by a hash function from the identifier TKF of the FI access token 7 of the identity generator. In this way, a technical link is established between the FI access token 7 and the V access token 5. An existing link can be checked on the basis of an FI access token 7.
- the V-access token 5 and the V-refresh token 6 are issued to the dependent service 11.
- the V-access token 5 is used in the further course of the method to set up a secure attribute transmission channel 19 via which the attributes 3 required for access to a protected digital service 12 are transmitted.
- the V-access token 5 and the V-refresh token 6 are not transferred to the end user 10 or the user agent 13.
- the dependent service 11 can apply for a new V-access token 5.
- the mediating unit 16 also creates an entry in its internal memory area 20 which contains the attribute names 4 that the end user 10 has released.
- the entry denotes the current provisioning session and also contains the FI access tokens 7, 8 and the V-access tokens 5, 6 generated by the mediating unit 16.
- All entries in table 23 can be summarized in a simple manner. Further data are expediently stored in table 23, which are required in the context of providing the attributes. Table 23 can look like this, for example:
- the intermediary unit 16 also generates a unique account identifier KID and stores it in its memory area 20.
- the account identifier KID identifies the end user 10 or the user account 22 uniquely throughout the federation.
- the account identifier KID is generated once for each user account 22 and cannot be changed.
- the account identifier KID is expediently based on a concealed link between a user account 22 and an identity generator 21.
- the concealment takes place in such a way that no inferences about the identity generator 21 are possible.
- a hash function can be used with which a hash value is formed via an OpenldConnect identification of the intermediary unit 16 used with respect to the identity generator 21.
- a hash value is formed in the master data of the intermediary unit 16 for the identity generator 21 via a constant that is determined by the intermediary unit 16 through configuration as part of the registration process for including an identity transmitter 21 in the federation.
- Step 414 V-access token 5 and V-refresh token 6 are sent by the relay unit 16 to the dependent service 11.
- Step 416 The dependent service 11 verifies the V-tokens 5, 6 received with the aid of the public key OKM from the previously stored certificate ZTM of the intermediary unit.
- Step 498 An attribute transmission channel 19 is set up for the transmission of attributes 3 from the identity generator 21 to the dependent service 11 via the end-user information interface.
- a secure connection with mutual authentication is set up between the dependent service 11 and the system certification authority 18, for example a TLS B2B connection.
- the dependent service 11 generates a key pair with a public key OKA and a private key PKA.
- the dependent service 11 also generates a session identification SZI.
- the identifier TKV of the V access token 5 can serve as the session identification SZI in a simple manner.
- the public key OKA and the session identification SZI are sent to the system certification authority 18 via the secure connection in a certificate request.
- the private key PKA remains with the dependent service 11.
- the certificate request can be made as a CSR (Certificate Signing Request) command, which contains the public key OKA and the session identification SZI from the V access token 5 with which a session is used certificate is requested.
- Step 500 In response to the certificate request, the system certification authority 18 generates a session certificate ZSZ for the session identification SZI.
- the ZSZ session certificate is only valid for a short time; its duration corresponds at least to the life of the V-access token 5.
- the session certificate ZSZ contains the identifier TKV of the V-access token 5 and a public key for the SZI session identification.
- the session certificate ZSZ also serves as proof that the dependent service 11 is authorized to send queries to the intermediary unit 16.
- Step 502 The system certification instance 18 sends the session certificate ZSZ to the dependent service 11.
- Step 504 The dependent service 11 initiates the establishment of a secure attribute transmission channel 19 via a call to the mediation unit 16.
- the initiation can take place, for example, with the aid of a POST command that transfers the V access token and the ZSZ session certificate as parameters.
- Step 506 The mediating unit 16 checks whether the V access token 5 is valid and has not expired. If this is the case, the intermediary unit 16 uses the directory 20 to determine the FI access token 7 of the identity provider that corresponds to the V access token 5.
- the determined FI access token 7 sends the mediator unit 16 together with the session men Z ertificate ZSZ to the identity encoder 21st Step 508:
- the identity sender 21 checks whether the FI access token 7 received from the intermediary unit 16 is valid and has not expired.
- the identity generator 21 also checks the session certificate ZSZ.
- the session certificate ZSZ is accepted as valid if it is a CA-IDP certificate and has been signed by the system certification authority 18, it has not expired and the identifier TKV of the V access token 5 contained in the subject of the session certificate ZSZ linked FI access token token 7 corresponds. For this check, the identity generator 21 calculates the hash using the token identifier ZKF of its own FI access token 7.
- the ZSZ certificate can also provide the signature via a certificate chain.
- Step 510 If the session certificate ZSZ is valid, the identity generator 21 generates a random, symmetrical session key KSY of sufficient length.
- KSY symmetrical session key
- a number of keys are expediently generated to ensure the integrity, the confidentiality and the sequence of the messages.
- the keys are expediently generated by deriving the key from a random common starting value.
- the identity generator 21 sets up the secure attribute transmission channel 19 to the dependent service 11 on its side.
- Step 512 The session key KSY is encrypted with the public key OKA from the session certificate ZSZ to form a cryptogram and transferred to the intermediary unit 16. Since the private key PKA remains with the dependent service 11, the intermediary unit 16 has no access to the session key KSY.
- Step 516 the dependent service 11 decrypts the cryptogram with its private key PKA and thus determines the session key KSY. With these, the dependent service 11 sets up the secure attribute transmission channel 19 on its side.
- the dependent service 11 uses the same key derivation as the identity generator 21. The attribute transmission channel 19 is thus established.
- the verified digital identity 2 or attributes 9 are provided by the identity generator 21 to the dependent service 11.
- the intermediary unit 16 checks the authorization of the data exchange between the intermediary unit 16 and the dependent service 11 based on the V- Access token 5 and the identity generator 21 the authorization of the data exchange between intermediary unit 16 and identity generator 21 based on the FI access token 7.
- the dependent service 11 retrieves the attributes 9 of the end user from the intermediary unit 16.
- the call contains the V access token 5 for authentication purposes.
- the call can take the form of a GET command, for example.
- the mediator unit 16 determines the FI access token 7 that belongs to the V access token 5 generated by the mediator unit from the request. The assignment can be done directly through the V access token 5 or via the SZI session identification. Can he V access tokens 5 are not accepted, the mediation unit 16 returns an error message to the dependent service 11.
- Step 604 the intermediary unit 16 sends a request to the identity transmitter 21.
- the request contains the FI access token 7 and the attribute names 3 of the required attributes 9.
- Step 606 The identity sender 21 checks the FI access token 7 to see whether it is valid and has a valid signature. If this is the case, the identity generator 21 generates a response with the requested attributes 9 of the end user, which are to be visible to the federation, and the attribute name 4. The attribute values 3 are encrypted with the session key KSY. The attribute names 4 of the attributes 9 are included in the response without encryption.
- Step 608 The answer with the encrypted attributes 9 is sent by the identity transmitter 21 to the intermediary unit 16.
- the data transmission between intermediary unit 16 and the identity transmitter 21 takes place via the secure attribute transmission channel 19.
- Step 610 The mediating unit 16 uses the attribute names 4 to check whether the encrypted attributes 9 contained in the response have been released for transmission to the dependent service 11 by the end user 10. If this is the case, the mediating unit 16 generates a list with the released encrypted attributes 3.
- Step 612 The mediator unit 16 returns the list to the dependent service 11 as a response.
- Step 614 The dependent service 11 decrypts the encrypted attribute values 3 from the response using the session key KSY transmitted by the identity generator 21.
- Step 616 Based on the then available attributes 9 of the end user, the dependent service 11 carries out the authorization and decides whether the use of the requested dependent service 11 is granted for the desired digital service 12. The result is displayed to the end user 10 on the end user interface 14. For example, the end user 10 is shown a user account with the transmitted attributes 9.
- Fig. 3e shows an example of a screen content with a displayed results page.
- the screen content contains a description of the dependent service ("Dependent Service”), a description of the process step ("User Account”), an end user name ("John Doe”) and a two-column table with the description of attributes ("Id”, “ email “,” email-status “,” phone ”) and associated values (" John-Doe “,” John, Doe @ .... de “, verified", “+ 1098922222”).
- V-access token 6. V refresh token
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102019003280.2A DE102019003280A1 (de) | 2019-05-09 | 2019-05-09 | Verfahren zur Authentisierung eines Endnutzers gegenüber einem abhängigen Dienst |
PCT/EP2020/025215 WO2020224809A1 (de) | 2019-05-09 | 2020-05-08 | Verfahren zur authentisierung eines endnutzers gegenüber einem abhängigen dienst |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3967009A1 true EP3967009A1 (de) | 2022-03-16 |
Family
ID=70736779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20725773.4A Pending EP3967009A1 (de) | 2019-05-09 | 2020-05-08 | Verfahren zur authentisierung eines endnutzers gegenüber einem abhängigen dienst |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3967009A1 (de) |
DE (1) | DE102019003280A1 (de) |
WO (1) | WO2020224809A1 (de) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8893230B2 (en) * | 2013-02-22 | 2014-11-18 | Duo Security, Inc. | System and method for proxying federated authentication protocols |
US9654473B2 (en) * | 2013-06-28 | 2017-05-16 | Bmc Software, Inc. | Authentication proxy agent |
WO2016010373A1 (ko) | 2014-07-15 | 2016-01-21 | 씨제이씨지브이 주식회사 | 곡률을 갖는 스크린이 설치된 상영관 및 그 의자 제어 시스템 |
DE102015008881A1 (de) | 2015-07-09 | 2017-01-12 | Daimler Ag | Integration von Starterstromsteuerung und Bordnetztrennschalter |
US20170289134A1 (en) * | 2016-03-30 | 2017-10-05 | Ping Identity Corporation | Methods and apparatus for assessing authentication risk and implementing single sign on (sso) using a distributed consensus database |
-
2019
- 2019-05-09 DE DE102019003280.2A patent/DE102019003280A1/de active Pending
-
2020
- 2020-05-08 EP EP20725773.4A patent/EP3967009A1/de active Pending
- 2020-05-08 WO PCT/EP2020/025215 patent/WO2020224809A1/de unknown
Also Published As
Publication number | Publication date |
---|---|
DE102019003280A1 (de) | 2020-11-12 |
WO2020224809A1 (de) | 2020-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60214632T2 (de) | Multidomäne Berechtigung und Authentifizierung | |
DE60221880T2 (de) | System und verfahren zur erzeugung eines gesicherten netzes unter verwendung von beglaubigungen von verfahrensgruppen | |
DE602004012996T2 (de) | Verfahren und vorrichtung zum authentifizieren von benutzern und websites | |
DE69838769T2 (de) | System und Verfahren zum anonymen, personalisierten Browsen in einem Netzwerk | |
DE102014119363A1 (de) | Autorisierungsverwaltungsserver und autorisierungsverwaltungsverfahren | |
DE102010030590A1 (de) | Verfahren zur Erzeugung eines Zertifikats | |
DE102009027681A1 (de) | Verfahren und Lesen von Attributen aus einem ID-Token | |
WO2009089943A1 (de) | Verfahren zum lesen von attributen aus einem id-token | |
WO2010006822A1 (de) | Verfahren zum lesen von attributen aus einem id-token | |
DE102014206325A1 (de) | Verteiltes Authentifizierungssystem | |
EP2415228A2 (de) | Verfahren zum lesen von attributen aus einem id-token über eine mobilfunkverbindung | |
DE10221665A1 (de) | Gesichertes wechselseitiges Legalisierungssystem | |
DE602005003631T2 (de) | Ausschluss der Passwortaufdeckung bei Attributzertifikatausgabe | |
DE602004012059T2 (de) | Techniken zum dynamischen Aufbauen und Handhaben von Authentisierung und Vertrauensverhältnissen | |
EP3295354A1 (de) | Verfahren und vorrichtung zur authentifizierung eines dienstnutzers für eine zu erbringende dienstleistung | |
EP4092958B1 (de) | Ausstellen eines digitalen verifizierbaren credentials | |
EP4315117A1 (de) | Verfahren und vorrichtung zum erzeugen, bereitstellen und weitergeben eines vertrauenswürdigen elektronischen datensatzes oder zertifikates basierend auf einem einen nutzer betreffenden elektronischen dokument | |
EP2932446A1 (de) | Reputationssystem und verfahren | |
EP2454702A1 (de) | Verfahren zur hsm migration | |
EP3540623B1 (de) | Verfahren zur erzeugung eines pseudonyms mit hilfe eines id-tokens | |
DE202013007090U1 (de) | Serverbasiertes Bezahlsystem | |
EP4254234A1 (de) | Ausstellen eines digitalen credentials für eine entität | |
WO2020224809A1 (de) | Verfahren zur authentisierung eines endnutzers gegenüber einem abhängigen dienst | |
WO2015135744A1 (de) | Id-provider-computersystem, id-token und verfahren zur bestätigung einer digitalen identität | |
EP3937451B1 (de) | Verfahren zu herstellung einer verschlüsselten verbindung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20211209 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230519 |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: GIESECKE+DEVRIENT EPAYMENTS GMBH |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |