TW201818288A - Key sharing system and method thereof wherein a mobile device is used as the key sharing system - Google Patents

Key sharing system and method thereof wherein a mobile device is used as the key sharing system Download PDF

Info

Publication number
TW201818288A
TW201818288A TW105136077A TW105136077A TW201818288A TW 201818288 A TW201818288 A TW 201818288A TW 105136077 A TW105136077 A TW 105136077A TW 105136077 A TW105136077 A TW 105136077A TW 201818288 A TW201818288 A TW 201818288A
Authority
TW
Taiwan
Prior art keywords
key
resource
keys
access
sharing
Prior art date
Application number
TW105136077A
Other languages
Chinese (zh)
Other versions
TWI606363B (en
Inventor
林崇頤
張繼軒
林晉賢
Original Assignee
中華電信股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中華電信股份有限公司 filed Critical 中華電信股份有限公司
Priority to TW105136077A priority Critical patent/TWI606363B/en
Application granted granted Critical
Publication of TWI606363B publication Critical patent/TWI606363B/en
Publication of TW201818288A publication Critical patent/TW201818288A/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a key sharing system using a mobile device and a method thereof, which controls access right of important resources through an access token, wherein the access token, after being encrypted, is stored in a token database of an authorizing element in a resource management and control device, and the corresponding original keys used for decrypting the access token are divided into a plurality sets of sharing keys by a key sharing calculation method and stored in a plurality of mobile devices. When important resources are to be accessed and stored, sharing keys must be collected to reach a number greater than a threshold value and the sharing keys are transmitted to a key management element inside the resource management and control device through network transmission or near field communication, and then transmitted to the authorizing element after being reversed to the original key in order to decrypt the corresponding encrypted access token in the existing token database. After the token is obtained, the corresponding resource to be managed and controlled is accessed through the resource access device.

Description

金鑰分持系統及其方法    Key sharing system and method   

本發明係關於一種金鑰分持系統及其方法,特別是關於一種可降低重要資源遭到非法入侵或使用之風險的金鑰分持系統及其方法。 The invention relates to a key sharing system and a method thereof, in particular to a key sharing system and a method thereof that can reduce the risk of illegal invasion or use of important resources.

目前,越來越多的重要檔案或資料皆以電子形式儲存於各種電子設備,這些電子設備或是重要的中控主機即為各個公司或集團所需嚴加管控之重要資源,傳統上管控這些重要資源的方式是以管理者的帳號密碼進行登入,但隨著網路越來越發達、資訊流通更加便利,許多不肖人士透過各種手法破解帳號密碼或登入資訊,以非法獲得重要資源的使用權,用作不法用途。 At present, more and more important files or data are stored in electronic form in various electronic devices. These electronic devices or important central control hosts are important resources strictly controlled by companies or groups. Traditionally, these are controlled and controlled. The way of important resources is to log in with the administrator's account password. However, as the Internet becomes more developed and information flows more convenient, many unscrupulous people use various methods to crack account passwords or login information to illegally obtain the right to use important resources. For illegal purposes.

如習知技術之一,提出將認證資訊以金鑰分享、一次碼或三向交握等方式搭載於隨身物品,並由一本機管控受保護之其他裝置,本機認證時需兩個以上之隨身物品同時通過認證方可使用受保護之電子設備。惟此技術中,並未保證隨身物品之安全性,倘若隨身物品遺失或遭竊,重要資源仍有遭到盜用之風險。並且此技術限制隨身物品需在本機一定範圍內方可進行認證。 As one of the known technologies, it is proposed that the authentication information is carried on a carry-on item by means of key sharing, one-time code or three-way handshake, and other protected devices are controlled by a local machine, and more than two are required for local machine authentication The use of protected electronic equipment is only allowed when the personal belongings are certified. However, this technology does not guarantee the safety of the belongings. If the belongings are lost or stolen, important resources still have the risk of being misappropriated. And this technology restricts carry-on items to be authenticated within a certain range of the machine.

又如習知技術之一,提出裝置間進行金鑰分持之技術與系統,以一主要行動裝置與中央伺服器溝通後,對次要裝置進行金鑰分持以進行資源存取限制。惟此技術中,僅限制主要裝置是否能複製分持金鑰予次要裝置,但單獨持有任一分持金鑰之主要或次要裝置均可獨立解除鎖定而存取受管控之資源,具有遭到盜用之風險而安全性不足。 As another conventional technique, a technology and system for key sharing between devices is proposed. After a primary mobile device communicates with a central server, key sharing is performed on a secondary device to restrict resource access. However, in this technology, it is only restricted whether the primary device can copy the shared key to the secondary device, but the primary or secondary device that separately holds any shared key can independently unlock and access the controlled resources, Risk of misappropriation with insufficient security.

有鑑於上述習知技藝之問題,本發明之目的就是在提供一種對重要資源提供更佳安全性及可管控性之金鑰分持系統及其方法。 In view of the problems of the above-mentioned conventional techniques, an object of the present invention is to provide a key sharing system and method for providing better security and controllability to important resources.

本發明之金鑰分持系統包含資源存取裝置以及一資源管控裝置;資源存取裝置接受行動裝置之請求存取受管控之資源;資源管控裝置連接資源存取裝置,並根據受管控之資源產生存取權杖,再根據存取權杖產生原始金鑰,後根據原始金鑰產生多個分持金鑰,並儲存分持金鑰至該些行動裝置中。 The key sharing system of the present invention includes a resource access device and a resource management and control device; the resource access device accepts a request from a mobile device to access a controlled resource; the resource management and control device is connected to the resource access device and according to the controlled resource Generate an access token, then generate an original key based on the access token, and then generate multiple sub-keys based on the original key, and store the sub-keys in the mobile devices.

本發明之金鑰分持方法包含下列步驟:根據受管控之資源產生存取權杖;根據存取權杖產生原始金鑰;根據原始金鑰產生多個分持金鑰;以及儲存分持金鑰於多個行動裝置中。 The key sharing method of the present invention includes the following steps: generating an access token according to a controlled resource; generating an original key according to the access token; generating a plurality of sharing keys based on the original key; and storing the sharing key Key on multiple mobile devices.

承上所述,依本發明之金鑰分持系統及其方法,其可具有一或多個下述優點: As mentioned above, the key sharing system and method according to the present invention may have one or more of the following advantages:

1.將原始金鑰以金鑰分持之方式儲存於數個行動裝置,並由不同使用者所持有,加強受管控資源之存取安全性。 1. The original key is stored in several mobile devices in the form of key sharing, and is held by different users to enhance the access security of managed resources.

2.行動裝置將透過生物特徵識別、PIN碼、手勢圖形碼等方式有效確認持有 分持金鑰者為本人,降低分持金鑰遭到盜用之風險。 2. The mobile device will effectively confirm the person holding the sub-shared key through biometric identification, PIN code, gesture graphic code and other methods, reducing the risk of the sub-shared key being stolen.

3.唯有大於門檻值數量之使用者同時提供分持金鑰方可成功還原為原始金鑰,且以該原始金鑰解密重要資源之存取權杖方可存取重要資源,提升重要資源之可管控性。 3. Only users with a quantity greater than the threshold can simultaneously restore the original key, and the access token that decrypts important resources with the original key can access important resources and enhance important resources. Manageability.

4.可使用網路通訊方式進行分持金鑰之傳送及重要資源之存取與管控,擺脫傳統金鑰分持系統之距離限制,提升系統之便利性。 4. Network communication can be used to transmit the shared key and to access and control important resources, to get rid of the distance limitation of the traditional key sharing system and improve the convenience of the system.

110‧‧‧行動裝置 110‧‧‧ mobile device

111‧‧‧分持金鑰控制元件 111‧‧‧shared key control element

112‧‧‧分持金鑰 112‧‧‧share key

120‧‧‧資源存取裝置 120‧‧‧Resource Access Device

130‧‧‧資源管控裝置 130‧‧‧Resource Management Device

131‧‧‧金鑰管理元件 131‧‧‧Key Management Element

132‧‧‧授權元件 132‧‧‧Authorized components

133‧‧‧權杖資料庫 133‧‧‧Scepter Database

140‧‧‧受管控之資源 140‧‧‧ regulated resources

200‧‧‧受管控之資源 200‧‧‧ regulated resources

210‧‧‧資源管控裝置 210‧‧‧Resource Management Device

211‧‧‧金鑰管理元件 211‧‧‧Key Management Element

212‧‧‧授權元件 212‧‧‧Authorized components

213‧‧‧權杖資料庫 213‧‧‧Scepter Database

220‧‧‧行動裝置 220‧‧‧ mobile device

221‧‧‧分持金鑰控制元件 221‧‧‧shared key control element

222‧‧‧分持金鑰 222‧‧‧share key

S301~S313‧‧‧步驟流程 S301 ~ S313‧‧‧step flow

S401~S407‧‧‧步驟流程 S401 ~ S407‧‧‧step flow

圖1係為本發明之金鑰分持系統之系統架構示意圖。 FIG. 1 is a schematic diagram of a system architecture of a key sharing system of the present invention.

圖2係為本發明之金鑰分持系統之金鑰分持示意圖。 FIG. 2 is a schematic diagram of key sharing of the key sharing system of the present invention.

圖3係為本發明之金鑰分持方法之流程圖。 FIG. 3 is a flowchart of a key sharing method according to the present invention.

圖4係為本發明之金鑰分持方法之另一流程圖。 FIG. 4 is another flowchart of the key sharing method of the present invention.

本發明提供一種以行動裝置作為金鑰分持之系統及其方法,其主要目的在於設計一種對重要資源(如:中控主機、機密文件…等)之管控系統及方法,提供更高之安全性及可管控性,藉此降低重要資源遭到非法入侵或使用之風險。 The present invention provides a system and method for sharing keys with a mobile device as a key. The main purpose is to design a system and method for controlling and controlling important resources (such as a central control host, confidential files, etc.) to provide higher security. And controllability to reduce the risk of unauthorized access or use of important resources.

本發明所提出之系統及其方法至少包含以下步驟:步驟一,將欲管控之重要資源產出存取權杖,並將其加密後保存於資源管控裝置內之授權元件之權杖資料庫;步驟二,金鑰管理元件將加密存取權杖所用之對應原始金鑰以金鑰分持演算法進行分割為數個分持金鑰,並且將分持金 鑰分別儲存於數個重要人士所擁有之行動裝置;步驟三,欲使用受保護之重要資源時,需徵求門檻值數量以上之重要人士所同意,並透過行動裝置之分持金鑰控制元件認證使用者身分後出示其分持金鑰,經由網路傳送至資源管控裝置內之金鑰管理元件進行還原;步驟四,將還原後之原始金鑰傳送至授權元件與其存有之權杖資料庫內之加密存取權杖進行比對解密;步驟五,成功解密後以該存取權杖取得對應重要資源之存取權限,並透過資源存取裝置存取使用該重要資源。 The system and method provided by the present invention include at least the following steps: Step 1. Generate an access token for an important resource to be controlled, and encrypt it and store it in a token database of authorized components in the resource management device; Step 2: The key management component divides the corresponding original key used by the encrypted access token into a plurality of shareholding keys using a key sharing algorithm, and stores the shareholding keys separately in the possession of several important persons Mobile device; step three, if you want to use the protected important resources, you need to seek the consent of the important people above the threshold value, and use the mobile device ’s shared key control component to authenticate the user ’s identity and present their shared key , Which is sent to the key management component in the resource management and control device via the network for restoration; step four, the restored original key is sent to the authorized component for comparison with the encrypted access token in the token database that it holds. Decryption; Step 5: After successful decryption, use the access token to obtain the access rights corresponding to important resources, and access and use the important resources through the resource access device.

在此一系統架構下,以行動裝置作為分持金鑰之載具,且行動裝置需先認證使用者之身分才允許存取分持金鑰,且可透過網路傳送分持金鑰至資源管控裝置進行還原,相較於傳統金鑰分持之系統可提升便利性與安全性。並且透過金鑰分持之方法搭配行動裝置之分持金鑰控制元件,以及原始金鑰還原所需之門檻值數量限制,將提升對被管控資源之管控性。最後,藉由存取權杖所管控之重要資源,除非同時有大於門檻值數量之分持金鑰遭到盜取,否則可保證其安全無虞,即使有對外連通之資源管控裝置遭到非法入侵,入侵者亦因無法取得解密存取權杖所需之原始金鑰,而無法存取重要資源,相比於習用重要資源保護系統僅以帳號密碼管控存取重要資源之方式,本發明大幅提升系統之安全性。 Under this system architecture, a mobile device is used as the vehicle for the sharing key, and the mobile device needs to authenticate the user's identity before being allowed to access the sharing key, and the sharing key can be sent to the resource through the network Compared with the traditional key sharing system, the management and control device can restore the convenience and security. And through the method of key sharing, combined with the key control component of the mobile device, and the limit of the number of thresholds required to restore the original key, the controllability of the managed resources will be improved. Finally, important resources controlled by access tokens can be secure unless there is a shareholding key greater than the threshold, and they are secure, even if externally connected resource management devices are illegal Invasion, intruders also cannot access important resources because they cannot obtain the original key required to decrypt the access token. Compared with the traditional method of protecting important resources with account passwords, the present invention significantly Improve system security.

可達成上述發明目的之一種以行動裝置作為金鑰分持之系統及其方法,係包含數具分持金鑰控制元件,其搭載於行動裝置,用以儲存及管理分持金鑰;一具資源管控裝置,負責與行動裝置中之分持金鑰控制元件及資源存取裝置進行通訊,以及管控重要資源;及至少一具資源存取裝置,用以在得到授權後存取、顯示、控制受管控之資源。 A system and method for using the mobile device as a key sharing system that can achieve the above-mentioned object of the invention includes several sub-shared key control elements, which are mounted on the mobile device to store and manage the sub-shared keys; Resource management and control device, which is responsible for communicating with the decentralized key control component and resource access device in the mobile device, and controls important resources; and at least one resource access device for accessing, displaying, and controlling after obtaining authorization Managed resources.

上述之分持金鑰控制元件,更進一步包含分持金鑰,取用分持金鑰時分持金鑰控制元件將對使用者進行身分認證,認證方式可包含生物特徵辨識、PIN碼辨識、手勢圖形碼或前述各項之組合,但不限於此。 The above-mentioned split key control element further includes a split key. When the split key is used, the split key control element will authenticate the user. The authentication method may include biometric identification, PIN code identification, A gesture graphic code or a combination of the foregoing, but is not limited thereto.

上述之資源管控裝置,更進一步包含一金鑰管理元件及一授權元件。其中金鑰管理元件用以拆分及還原原始金鑰;授權元件內包含權杖資料庫,其保存有受管控資源之對應加密後存取權杖,授權元件負責以原始金鑰解密取得該對應資源之存取權杖,並且以該存取權杖取得存取受管控資源之權限。 The aforementioned resource management and control device further includes a key management element and an authorization element. The key management component is used to split and restore the original key; the authorization component contains a token database that stores the encrypted encrypted access tokens of the controlled resources, and the authorized component is responsible for decrypting the original key to obtain the correspondence The access token of the resource, and use the access token to gain access to the managed resource.

上述之資源存取裝置,為使用者可操作之裝置,並具備與資源管控裝置連線之能力,接收與發送使用者對受管控之資源之存取請求,並可透過資源管控裝置遠端存取受管控之資源。 The above-mentioned resource access device is a user-operable device and has the ability to connect with the resource management and control device, receive and send the user's access request to the resource under control and can be stored remotely through the resource management and control device Access to controlled resources.

<實施例> <Example>

本發明之較佳實施例技術操作示意圖,請參閱圖1及圖2,圖1為本發明一種以行動裝置作為金鑰分持之系統及其方法之系統架構圖。此一系統架構係行動裝置110之使用者攜帶其行動裝置110至資源存取裝置120,欲透過資源存取裝置120存取受管控之資源140。資源管控裝置130將確認此資源之取用限制:如分持金鑰112數量與門檻值,向持有分持金鑰112之行動裝置(可為複數數量)110送出分持金鑰112集中請求。如集中之分持金鑰112有達門檻值則嘗試進行原始金鑰還原;若數量不足則拒絕授權本次使用者對受管控之資源140之存取行為。 A schematic diagram of the technical operation of a preferred embodiment of the present invention is shown in FIG. 1 and FIG. 2. FIG. 1 is a system architecture diagram of a system and a method for key sharing in a mobile device according to the present invention. This system architecture is such that the user of the mobile device 110 brings his mobile device 110 to the resource access device 120, and wants to access the controlled resource 140 through the resource access device 120. The resource management and control device 130 will confirm the access restrictions of this resource: if the number and threshold of the sub-shared key 112 are sent, a centralized request for the sub-shared key 112 will be sent to the mobile device (which can be plural) 110 holding the sub-shared key 112 . If the centralized sub-shared key 112 reaches the threshold, it attempts to restore the original key; if the quantity is insufficient, it refuses to authorize the user to access the controlled resource 140.

各使用者持有之行動裝置110均持有一分持金鑰112。資源管控裝置130將受管控之資源140之識別碼與其他可識別之資訊,透過各 使用者分別持有之行動裝置110提示此資源將被存取,同意此項存取行為者,則需進行分持金鑰集中請求。各使用者持有之分持金鑰112均受分持金鑰控制元件111保護,欲提取分持金鑰112須先進行身分認證程序,以證明使用者為分持金鑰112之合法使用者。分持金鑰控制元件111要求各使用者進行身分認證程序,以可供識別使用者之資訊而完成身分認證後,取出分持金鑰112傳送至金鑰管理元件131;若身分認證程序失敗,則不提供分持金鑰112。 The mobile device 110 held by each user holds a share holding key 112. The resource management and control device 130 uses the mobile device 110 held by each user to indicate that the resource will be accessed through the identification code of the controlled resource 140 and other identifiable information. Separate keys are requested centrally. The sub-shared key 112 held by each user is protected by the sub-shared key control element 111. To extract the sub-shared key 112, an identity authentication procedure must be performed first to prove that the user is a legitimate user of the sub-shared key 112. . The shared key control element 111 requires each user to perform an identity authentication process. After the identity authentication is completed with information that can identify the user, the shared key 112 is taken out and transmitted to the key management element 131. If the identity authentication process fails, No shared key 112 is provided.

金鑰管理元件131需蒐集一定數量的分持金鑰112以進行原始金鑰還原。一旦確認蒐集之分持金鑰112數量達門檻值,即進行原始金鑰還原動作,產出一原始金鑰。向授權元件132提出存取權杖存取請求;若未達門檻值,則繼續等待一可調整之時間,若時間期限內分持金鑰112數量仍未達門檻值,則透過資源存取裝置120告知使用者無法存取受管控之資源140。授權元件132以受管控之資源140之識別碼向權杖資料庫133查詢加密後存取權杖,如原始金鑰可將加密後存取權杖成功解密,則由授權元件132使用存取權杖提取受管控之資源140,使用者可於資源存取裝置120中使用受管控之資源140,如檢閱具機密性質之檔案文件或存取受保護之重要系統等;若原始金鑰無法將加密後存取權杖解密,則拒絕提供受管控之資源140。 The key management element 131 needs to collect a certain number of shared keys 112 for original key restoration. Once it is confirmed that the number of the divided holding keys 112 reaches the threshold, the original key restoration operation is performed to generate an original key. Submit an access token access request to the authorized component 132; if the threshold is not reached, continue to wait for an adjustable time; if the number of shared keys 112 does not reach the threshold within the time limit, access the device through the resource 120 informs the user that the controlled resource 140 cannot be accessed. The authorization component 132 queries the token database 133 for the encrypted access token with the identification code of the controlled resource 140. If the original key can successfully decrypt the encrypted access token, the authorization component 132 uses the access right The user can extract the controlled resource 140, and the user can use the controlled resource 140 in the resource access device 120, such as reviewing confidential files or accessing important protected systems; if the original key cannot be encrypted, After the access token is decrypted, the controlled resource 140 is refused to be provided.

圖2為本系統之金鑰分持示意圖。受管控之資源200由資源管控裝置210進行管控設定,授權元件212對受管控之資源200產生識別碼及存取權杖,並設定分持金鑰數量與存取門檻值;同時呼叫金鑰管理元件211進行原始金鑰產製請求,獲得之原始金鑰將對存取權杖進行加密, 並將加密後存取權杖保存至權杖資料庫213。金鑰管理元件產生原始金鑰後,將對原始金鑰進行金鑰分持運算,依照授權元件212對受管控之資源200設定之分持金鑰數量與門檻值,產生對應之分持金鑰222,並發送至各行動裝置220,分持金鑰控制元件則將分持金鑰222保存在內部儲存空間中。 Figure 2 is a schematic diagram of key sharing of the system. The controlled resource 200 is controlled and set by the resource management and control device 210. The authorized component 212 generates an identification code and an access token for the controlled resource 200, and sets the number of sub-shared keys and the access threshold. At the same time, it calls the key management. The component 211 makes an original key production request. The obtained original key will encrypt the access token, and save the encrypted access token to the token database 213. After the key management component generates the original key, it performs a key sharing operation on the original key, and generates a corresponding shared key according to the number and threshold of the shared key set by the authorized component 212 for the controlled resource 200. 222, and sends it to each mobile device 220, and the shared key control component stores the shared key 222 in an internal storage space.

圖3為本發明之方法流程圖,為一存取受管控資源操作流程圖。流程開始於步驟S301,使用者操作資源存取裝置,發送包含受管控之資源之識別碼之存取請求。步驟S302資源管控裝置獲得此識別碼後,對各使用者之行動裝置發送分持金鑰集中請求。各行動裝置收到請求後,須先對使用者要求身分識別如步驟S303,步驟S304須以PIN碼或生物特徵等可供識別本人之資訊進行身分認證,成功則允許使用者取出分持金鑰如步驟S306;若無法完成身分識別,則拒絕使用者存取此分持金鑰。提取分持金鑰後進行步驟S307,行動裝置將分持金鑰送出至資源管控裝置,由金鑰管理元件檢查分持金鑰數量是否符合要求如步驟S308,如達門檻值則進行原始金鑰還原產生原始金鑰如步驟S309;若未達門檻值則拒絕使用者存取。步驟S310,金鑰管理元件將以原始金鑰對權杖資料庫中的加密後存取權杖進行解密,並交由授權元件判斷解密是否成功如步驟S311。若解密成功則進行步驟S312,資源管控裝置使用存取權杖操作受管控之資源後,並向資源存取裝置提供此資源如步驟S313。使用者即可透過資源存取裝置存取此資源;若解密失敗則,拒絕使用者存取受管控之資源。 FIG. 3 is a flowchart of a method according to the present invention, and is a flowchart of an operation of accessing a managed resource. The flow starts at step S301. A user operates a resource access device and sends an access request including an identifier of a resource under control. In step S302, after the resource management and control device obtains the identification code, it sends a centralized key request to the mobile device of each user. After receiving the request, each mobile device must first request the user's identity, such as step S303, and step S304 must use the PIN code or biometric information to identify himself, and the user is allowed to remove the share key if successful. If step S306; if the identification cannot be completed, the user is denied access to the share key. After extracting the sub-shared key, proceed to step S307. The mobile device sends the sub-shared key to the resource management and control device, and the key management component checks whether the number of sub-shared keys meets the requirements, such as step S308, and if the threshold is reached, the original key is performed. The original key is restored as in step S309; if the threshold is not reached, the user is denied access. In step S310, the key management component decrypts the encrypted access token in the token database with the original key, and passes the authorization component to determine whether the decryption is successful as in step S311. If the decryption is successful, step S312 is performed. After the resource management and control device uses the access token to operate the controlled resource, the resource management device provides the resource to the resource access device as step S313. The user can access this resource through the resource access device; if the decryption fails, the user is denied access to the controlled resource.

圖4為本發明之方法流程圖,為一分持金鑰產製與發布流程圖。流程開始於對受管控之資源設定存取限制如步驟S401,要求授權元件產生相對應的存取權杖如步驟S403,並同時於金鑰管理元件產生原始金鑰 於步驟S402。將原始金鑰提供至授權元件對存取權杖進行加密產生加密後存取權杖如步驟S404,並將此加密後存取權杖儲存於權杖資料庫之中如步驟S405。步驟S402產生之原始金鑰,於步驟S406進行分持金鑰運算,並於步驟S407中發布至各行動裝置,完成分持金鑰產製與發布之流程。 FIG. 4 is a flowchart of the method of the present invention, which is a flowchart of the production and distribution of a sub-key. The process starts by setting access restrictions on the controlled resources, such as step S401, requiring the authorized component to generate a corresponding access token, such as step S403, and simultaneously generating the original key from the key management component at step S402. The original key is provided to the authorized component to encrypt the access token to generate an encrypted access token (step S404), and the encrypted access token is stored in a token database (step S405). The original key generated in step S402 is subjected to the share key calculation in step S406 and distributed to each mobile device in step S407 to complete the process of producing and issuing the share key.

綜上所述,本發明之金鑰分持系統及其方法可應用於各種公開或私人之商業與非商業機密重要資源管控,藉由將分持金鑰授與數位重要人士持有,達到更高的管控性。藉由分持金鑰控制元件之身分認證以及金鑰還原重組數量門檻,有效降低金鑰遭到竊取或冒用之風險,以達到更高的安全性;另外藉由加入搭載於行動裝置上的分持金鑰控制元件與資源管控裝置之間之網路通訊機制,擺脫傳統金鑰分持系統之距離限制,提升系統之便利性。 In summary, the key sharing system and method of the present invention can be applied to the management of a variety of public or private commercial and non-commercial confidential important resources. High controllability. Through the authentication of the identity of the key control component and the threshold of key restoration and reconstruction, the risk of key theft or fraud can be effectively reduced to achieve higher security; in addition, by adding The network communication mechanism between the shared key control element and the resource management and control device can get rid of the distance limitation of the traditional key share system and improve the convenience of the system.

以上所述僅為舉例性,而非為限制性者。任何未脫離本發明之精神與範疇,而對其進行之等效修改或變更,均應包含於後附之申請專利範圍中。 The above description is exemplary only, and not restrictive. Any equivalent modification or change made without departing from the spirit and scope of the present invention shall be included in the scope of the attached patent application.

Claims (10)

一種金鑰分持系統,包含:一資源存取裝置,接受複數個行動裝置之請求存取一受管控之資源;以及一資源管控裝置,連接該資源存取裝置,並根據該受管控之資源產生一存取權杖,再根據該存取權杖產生一原始金鑰,後根據該原始金鑰產生複數個分持金鑰,並儲存該些分持金鑰至該些行動裝置中。     A key sharing system includes: a resource access device that accepts requests from a plurality of mobile devices to access a managed resource; and a resource management device that connects the resource access device and according to the managed resource An access token is generated, and an original key is generated according to the access token. Then, a plurality of sub-keys are generated according to the original key, and the sub-keys are stored in the mobile devices.     如申請專利範圍第1項所述之金鑰分持系統,其中該資源管控裝置更包含:一金鑰管理元件,產生該原始金鑰及該分持金鑰;以及一授權元件,儲存該儲存權杖於一權杖資料庫中。     The key sharing system according to item 1 of the scope of patent application, wherein the resource management and control device further includes: a key management element that generates the original key and the sharing key; and an authorized element that stores the storage Scepter in a scepter database.     如申請專利範圍第2項所述之金鑰分持系統,其中該複數個行動裝置更分別包含一分持金鑰控制元件,且該些分持金鑰控制元件更根據由該資源存取裝置所發送之一分持金鑰集中請求進行一身分認證步驟,若該身分認證步驟認證通過,則提供該些分持金鑰至該資源管控裝置。     According to the key sharing system described in item 2 of the scope of patent application, the plurality of mobile devices each further include a sub-shared key control element, and the sub-shared key control elements further access the device according to the resource. One of the sent share key requests to perform an identity authentication step collectively. If the identity authentication step is authenticated, the part hold keys are provided to the resource management and control device.     如申請專利範圍第3項所述之金鑰分持系統,其中該金鑰管理元件更根據收到的該些分持金鑰判斷該些分持金鑰之數量是否不小於一門檻值,若該些分持金鑰之數量不小於該門檻值,則該金鑰管理元件根據該些收到之分持金鑰產生該原始金鑰。     According to the key sharing system described in item 3 of the scope of patent application, wherein the key management element further determines whether the number of the sharing keys is not less than a threshold value based on the received sharing keys. If the number of the sub-shared keys is not less than the threshold, the key management element generates the original key based on the received sub-shared keys.     如申請專利範圍第4項所述之金鑰分持系統,其中該授權元件更根據該還原金鑰對該存取權杖解密,且該資源管控裝置更根據該存取權杖存取該受管控之資源,並提供給該資源存取裝置。     The key sharing system according to item 4 of the scope of patent application, wherein the authorized component further decrypts the access token based on the restored key, and the resource management and control device further accesses the subject based on the access token The controlled resources are provided to the resource access device.     一種金鑰分持方法,包含: 根據一受管控之資源產生一存取權杖;根據該存取權杖產生一原始金鑰;根據該原始金鑰產生複數個分持金鑰;以及儲存該些分持金鑰於複數個行動裝置中。     A key sharing method includes: generating an access token according to a controlled resource; generating an original key according to the access token; generating a plurality of split keys according to the original key; and storing the key These share keys are held in multiple mobile devices.     如申請專利範圍第6項所述之金鑰分持方法,更包含下列步驟:發送一分持金鑰集中請求至各該行動裝置;以及各該行動裝置根據該分持金鑰集中請求進行一身分認證步驟。     The key sharing method described in item 6 of the patent application scope further includes the following steps: sending a centralized key sharing request to each of the mobile devices; and each mobile device performing a centralized key holding request according to the centralized key sharing request. Identity verification steps.     如申請專利範圍第7項所述之金鑰分持方法,更包含下列步驟:若該身分認證步驟認證通過,則提供該些分持金鑰;若該身分認證步驟認證通過,則不提供該些分持金鑰;以及判斷該些分持金鑰的數量是否不小於一門檻值。     For example, the key sharing method described in item 7 of the scope of patent application, further includes the following steps: If the identity authentication step is authenticated, then the share key is provided; if the identity authentication step is authenticated, the key is not provided. Some shareholding keys; and determining whether the number of these shareholding keys is not less than a threshold.     如申請專利範圍第8項所述之金鑰分持方法,更包含下列步驟:若該些分持金鑰的數量不小於一門檻值,則根據該些分持金鑰產生該原始金鑰;若該些分持金鑰的數量非不小於該門檻值,則不產生該原始金鑰;以及根據該原始金鑰對該存取權杖解密。     According to the key sharing method described in item 8 of the scope of patent application, the method further includes the following steps: if the number of the sharing keys is not less than a threshold value, generating the original key based on the sharing keys; If the number of the sub-shared keys is not less than the threshold, the original key is not generated; and the access token is decrypted according to the original key.     如申請專利範圍第9項所述之金鑰分持方法,更包含下列步驟:根據解密後之該存取權杖存取該受管控之資源。     The key sharing method described in item 9 of the scope of patent application, further includes the following steps: accessing the controlled resource according to the decrypted access token.    
TW105136077A 2016-11-07 2016-11-07 Key share system and method TWI606363B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW105136077A TWI606363B (en) 2016-11-07 2016-11-07 Key share system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW105136077A TWI606363B (en) 2016-11-07 2016-11-07 Key share system and method

Publications (2)

Publication Number Publication Date
TWI606363B TWI606363B (en) 2017-11-21
TW201818288A true TW201818288A (en) 2018-05-16

Family

ID=61023481

Family Applications (1)

Application Number Title Priority Date Filing Date
TW105136077A TWI606363B (en) 2016-11-07 2016-11-07 Key share system and method

Country Status (1)

Country Link
TW (1) TWI606363B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI742670B (en) * 2020-05-19 2021-10-11 中華電信股份有限公司 Terminal device, server and method for private key protection and transaction supervision in blockchains

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW501013B (en) * 2001-03-14 2002-09-01 Chunghwa Telecom Co Ltd High-speed security device
TWI280025B (en) * 2005-01-24 2007-04-21 Chunghwa Telecom Co Ltd File encryption system having key recovery function and its method thereof
TWI516083B (en) * 2008-12-19 2016-01-01 Chunghwa Telecom Co Ltd Mobile phone as a mobile card reader trading system and methods
TWI430643B (en) * 2010-10-06 2014-03-11 Chunghwa Telecom Co Ltd Secure key recovery system and method
TWI476629B (en) * 2012-12-26 2015-03-11 Chunghwa Telecom Co Ltd Data security and security systems and methods

Also Published As

Publication number Publication date
TWI606363B (en) 2017-11-21

Similar Documents

Publication Publication Date Title
CN109410406B (en) Authorization method, device and system
US9838388B2 (en) System and method for biometric protocol standards
CN106537403B (en) System for accessing data from multiple devices
CN106888084B (en) Quantum fort machine system and authentication method thereof
US10333711B2 (en) Controlling access to protected objects
US7155616B1 (en) Computer network comprising network authentication facilities implemented in a disk drive
US6230272B1 (en) System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user
US9256750B2 (en) Secure credential unlock using trusted execution environments
CN106559408B (en) SDN authentication method based on trust management
KR101611872B1 (en) An authentication method using FIDO(Fast IDentity Online) and certificates
US20060259782A1 (en) Computer security system and method
KR102549337B1 (en) Systems and methods for biometric protocol standards
CN102217277A (en) Method and system for token-based authentication
JP2016502377A (en) How to provide safety using safety calculations
WO2005045550A2 (en) Password recovery system and method
CN109145562A (en) A kind of lasting authenticating identity method and its equipment by finger print mouse
JPH05333775A (en) User authentication system
CN102427459B (en) Offline authorization method based on Usbkeys
JP2011012511A (en) Electric lock control system
JPH11212922A (en) Password management and recovery system
EP1036372A1 (en) A remotely accessible private space using a fingerprint
WO2007087748A1 (en) A theft protection system for network account and a method thereof
TWI606363B (en) Key share system and method
EP4302454A1 (en) A method for authenticating a user towards a multi-node party
CN108345801B (en) Ciphertext database-oriented middleware dynamic user authentication method and system