TWI459786B - Multi-channel active identityauthentication system and related computer program product and method - Google Patents

Multi-channel active identityauthentication system and related computer program product and method Download PDF

Info

Publication number
TWI459786B
TWI459786B TW100143507A TW100143507A TWI459786B TW I459786 B TWI459786 B TW I459786B TW 100143507 A TW100143507 A TW 100143507A TW 100143507 A TW100143507 A TW 100143507A TW I459786 B TWI459786 B TW I459786B
Authority
TW
Taiwan
Prior art keywords
verification data
module
security
service
security verification
Prior art date
Application number
TW100143507A
Other languages
Chinese (zh)
Other versions
TW201322722A (en
Inventor
jia hong Chen
Original Assignee
Jrsys Internat Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jrsys Internat Corp filed Critical Jrsys Internat Corp
Priority to TW100143507A priority Critical patent/TWI459786B/en
Publication of TW201322722A publication Critical patent/TW201322722A/en
Application granted granted Critical
Publication of TWI459786B publication Critical patent/TWI459786B/en

Links

Landscapes

  • Telephonic Communication Services (AREA)

Description

多通道主動式網路身分驗證系統及相關的電腦程式產品 Multi-channel active network identity verification system and related computer program products

本發明有關網路安全控管機制,尤指一種多通道主動式網路身分驗證系統及相關的電腦程式產品。 The invention relates to a network security control mechanism, in particular to a multi-channel active network identity verification system and related computer program products.

隨著各種網路服務應用愈來愈普及,網路資安的重要性也愈來愈高。傳統登入遠端網路服務系統(例如網路銀行、網路下單、線上遊戲、企業內部網路系統等)的方式,是利用使用者帳號與密碼來做登入者身分的驗證。隨著木馬程式、鍵盤側錄程式(keylogger)、螢幕側錄程式(screen logger)、網路釣魚(Phishing)、中間人(man-in-the-middle attack)攻擊、重送攻擊(replay attack)等惡意技術的進步,使得單純利用使用者帳號與密碼的身分驗證方式面臨重大資安威脅。 As various Internet service applications become more and more popular, the importance of Internet security is getting higher and higher. The traditional way to log into a remote network service system (such as online banking, network ordering, online games, corporate intranet systems, etc.) is to use the user account and password to verify the identity of the registrant. With Trojans, keyloggers, screen loggers, Phishing, man-in-the-middle attack attacks, replay attacks Advances in malicious technology have made it a major security threat to simply use user account and password authentication methods.

為了加強網路銀行交易時的安全性,有資安廠商在大約十年前推出了利用簡訊通道的行動驗證方案(SMS-authentication),例如RSA數據安全(RSA security)有限公司的保安認證系統(On-demand Authenticators)等。當使用者以既有的帳號、密碼登入網路銀行系統後,網路銀行系統會利用電信平臺,以簡訊方 式發送一組動態密碼(one time password,OTP)到使用者的手機上。使用者必須在網路銀行的網頁中輸入該動態密碼,完成第二道的身分驗證手續,方能進行網路銀行的交易服務。 In order to enhance the security of online banking transactions, a security vendor launched a SMS-authentication scheme using SMS channels, such as RSA Security's security authentication system (approximately ten years ago). On-demand Authenticators) and so on. After the user logs in to the online banking system with his existing account and password, the online banking system will use the telecom platform to the SMS side. Send a set of one time password (OTP) to the user's mobile phone. The user must enter the dynamic password on the webpage of the online bank to complete the second identity verification procedure before the online banking transaction service can be performed.

然而,這一類的方法和系統,並無法有效抵禦中間人攻擊和網路釣魚攻擊的威脅。因為一旦使用者在登入網路銀行系統的過程中遭受到中間人攻擊或網路釣魚攻擊,則使用者在網路銀行的網頁中所輸入的動態密碼,就會被發起攻擊的惡意人士給攔截和知悉。於是,各種改進的方案不斷地被提出。 However, this type of method and system is not effective against the threat of man-in-the-middle attacks and phishing attacks. Because once the user is attacked by a man-in-the-middle attack or phishing attack in the process of logging into the online banking system, the dynamic password entered by the user on the webpage of the online bank will be intercepted by the malicious person who launched the attack. And know. As a result, various improved solutions have been continuously proposed.

例如,中國信託的台灣發明第I288554號專利說明書中提出了一種所謂的雙因素身分認證方法和系統,會在發送動態密碼的簡訊中加入該次交易內容的摘要資料,例如轉帳帳號的部分號碼或交易金額,以供使用者比對是否與自己在網頁上輸入的資料相符,其中該動態密碼是由交易內容的資料算出。若使用者能謹慎地仔細核對簡訊內容的正確性,便可提高對攻擊的偵測能力。但這種方式並無法有效防禦較狡猾的中間人攻擊和網路釣魚攻擊。例如,釣魚網頁可能會提示使用者:「若您手機收到的簡訊中的轉帳帳號或交易金額與您在網頁輸入的交易內容不符,則請將簡訊中的動態密碼輸入網頁中的"取消交易"的欄位以取消該筆交易」。此時,使用者若依照釣魚網頁的指示操作,發起攻擊的惡意人士便能取得動態密碼。 For example, the Chinese Patent No. I288554 patent specification of the Chinese Trust proposes a so-called two-factor identity authentication method and system, which adds a summary data of the transaction content, such as a partial number of the transfer account, or a short message sent in the dynamic password. The transaction amount, for the user to compare with the data entered by the user on the webpage, wherein the dynamic password is calculated from the data of the transaction content. If the user can carefully check the correctness of the content of the newsletter, the ability to detect attacks can be improved. But this approach does not effectively defend against more man-in-the-middle attacks and phishing attacks. For example, a phishing page may prompt the user: "If the transfer account or transaction amount in the SMS received by your mobile phone does not match the transaction you entered on the webpage, please enter the dynamic password in the SMS into the "Cancel transaction" on the webpage. "The field to cancel the transaction." At this time, if the user operates according to the instructions of the phishing webpage, the malicious person who initiated the attack can obtain the dynamic password.

即便前述的動態密碼有使用時效的限制,但在密碼的有效期間內仍足以讓惡意人士假冒使用者身分竄改網路交易的內容,造成使用者的金錢損失。 Even if the aforementioned dynamic password has limitations on the use of time limit, it is still sufficient for the malicious person to impersonate the user to tamper with the content of the online transaction during the valid period of the password, resulting in the user's money loss.

此外,也曾發生過駭客假冒使用者向電信公司謊報手機SIM卡遺失,而從電信公司騙取到同樣電話號碼的SIM卡。此時,駭客便能接收到網路銀行系統要發給使用者的動態密碼,並假冒使用者的身分使用網路銀行服務,造成使用者的金錢損失。 In addition, there have been cases where a hacker impersonated a user who misreported the mobile phone SIM card to the telecommunications company and defrauded the same phone number from the telecommunications company. At this point, the hacker can receive the dynamic password that the online banking system is to send to the user, and use the online banking service to impersonate the user's identity, causing the user's money loss.

由前述說明可知,台灣發明第專利I288554號專利所提出的方法和系統仍然存在明顯的資安漏洞,無法有效核實網路使用者的身分真實性和確保網路交易的安全。 It can be seen from the foregoing description that the method and system proposed by the Taiwan Patent No. I288554 still have obvious loopholes in the security, and it is impossible to effectively verify the authenticity of the network user and ensure the security of the network transaction.

有鑑於此,如何有效驗證網路使用者的身分真實性,加強網路服務的資安控管效能,實為迫切需要解決的問題。 In view of this, how to effectively verify the authenticity of network users' identity and strengthen the security control effectiveness of network services is an urgent problem to be solved.

本說明書提供了一種多通道主動式網路身分驗證系統之實施例,其包含有:一瀏覽器模塊,用於通過一第一傳輸管道傳送一服務要求;一安全認證模塊,用於產生一挑戰值;一服務處理模塊,用於產生對應該服務要求的服務內容信息,並使用該服務處理模塊與該瀏覽器模塊間的一目標連線,將該服務內容信息和該挑戰值通過該第一傳輸管道傳送給該瀏覽器模塊;一顯示裝置,用於顯示該服務內容信息和該挑戰值;一驗證啟動模塊,用於提示使用者將該顯示裝置所顯示的該服務內容信息及該挑戰值輸入一預定介面;一驗證資料產生模塊,用於依據一挑戰回應演算法產生與該預定介面接收到的挑戰值相對應的一回應值,並使用一金鑰對該服務內容信息及該回應值進行加密,以產生安全驗證資料;以及一簡訊模塊,用於將該安全驗證資料以簡訊形式通過一第二傳輸管道傳送給該安全認證模塊;其中該安全認證模塊接收到該安全驗證資料時,會核驗該安全驗證資料及一來源電話號碼,若 該安全驗證資料中未包含該服務內容信息及該回應值、或該來源電話號碼不是一預先約定號碼,則該安全認證模塊會拒絕該瀏覽器模塊通過該第一傳輸管道傳來的該服務要求。 The present specification provides an embodiment of a multi-channel active network identity verification system, comprising: a browser module for transmitting a service request through a first transmission pipeline; and a security authentication module for generating a challenge a service processing module, configured to generate service content information corresponding to the service request, and use a target connection between the service processing module and the browser module, and pass the service content information and the challenge value through the first The transmission pipeline is transmitted to the browser module; a display device is configured to display the service content information and the challenge value; and a verification activation module is configured to prompt the user to display the service content information and the challenge value displayed by the display device Entering a predetermined interface; a verification data generating module, configured to generate a response value corresponding to the challenge value received by the predetermined interface according to a challenge response algorithm, and use the key to the service content information and the response value Encrypting to generate security verification data; and a short message module for passing the security verification data in a short message form Second transmission piped to the security authentication module; wherein the security module receiving the authentication security authentication information, will verify the information and a secure authentication source telephone number, if If the service content information and the response value are not included in the security verification data, or the source phone number is not a pre-agreed number, the security authentication module rejects the service request sent by the browser module through the first transmission pipeline. .

本說明書提供了一種允許一服務提供端系統執行多通道網路身分驗證運作的電腦程式產品的實施例,該多通道網路身分驗證運作包含有:依據一挑戰回應演算法產生一挑戰值;利用一服務處理模塊使用該服務處理模塊與一用戶端裝置間的一目標連線,將該挑戰值通過一第一傳輸管道傳送給用戶端裝置;接收通過一第二傳輸管道傳來的安全驗證資料;核驗該安全驗證資料;以及若該安全驗證資料中未包含有與該挑戰值相對應的一回應值,則拒絕該用戶端裝置通過該第一傳輸管道傳來的一服務要求。 The present specification provides an embodiment of a computer program product that allows a service provider system to perform a multi-channel network identity verification operation, the multi-channel network identity verification operation comprising: generating a challenge value according to a challenge response algorithm; utilizing A service processing module uses a target connection between the service processing module and a client device, and transmits the challenge value to the client device through a first transmission pipeline; and receives security verification data transmitted through a second transmission pipeline. And verifying the security verification data; and if the security verification data does not include a response value corresponding to the challenge value, rejecting a service request sent by the client device through the first transmission pipeline.

本說明書另提供了一種電腦程式產品的實施例,允許一服務提供端系統執行多通道網路身分驗證運作,該多通道網路身分驗證運作包含有:產生一組動態密碼;利用一服務處理模塊使用該服務處理模塊與一用戶端裝置間的一目標連線,將該動態密碼通過一第一傳輸管道傳送給該用戶端裝置;接收通過一第二傳輸管道傳來的安全驗證資料;核驗該安全驗證資料;以及若該安全驗證資料中未包含有該動態密碼,則拒絕該用戶端裝置通過該第一傳輸管道傳來的一服務要求。 The present specification further provides an embodiment of a computer program product that allows a service provider system to perform a multi-channel network identity verification operation, the multi-channel network identity verification operation comprising: generating a set of dynamic passwords; utilizing a service processing module Using a target connection between the service processing module and a client device, transmitting the dynamic password to the client device through a first transmission pipeline; receiving security verification data transmitted through a second transmission pipeline; verifying the The security verification data; and if the dynamic password is not included in the security verification data, rejecting a service request sent by the client device through the first transmission pipeline.

本說明書另提供了一種電腦程式產品的實施例,允許具有一驗證資料產生模塊的用戶端裝置執行主動式網路身分驗證運作,該主動式網路身分驗證運作包含有:提示使用者將一服務提供端系統通過一第一傳輸管道傳來的一挑戰值,輸入該用戶端裝置的一預定介面;利用該預定介面接收該挑戰值;利用該驗證資料產生模 塊依據一挑戰回應演算法產生與該挑戰值相對應的一回應值;利用該驗證資料產生模塊產生與該回應值相關的一安全驗證資料;以及將該安全驗證資料以一或多個簡訊的形式通過一第二傳輸管道傳送至一指定電話號碼。 The present specification further provides an embodiment of a computer program product, which allows a client device having a verification data generation module to perform an active network identity verification operation, the active network identity verification operation including: prompting a user to provide a service Providing a challenge value transmitted by the end system through a first transmission pipeline, inputting a predetermined interface of the client device, receiving the challenge value by using the predetermined interface, and generating a modulus by using the verification data Blocking, according to a challenge response algorithm, a response value corresponding to the challenge value; using the verification data generation module to generate a security verification data related to the response value; and using the security verification data as one or more newsletters The form is transmitted to a designated telephone number via a second transmission pipe.

本說明書另提供了一種電腦程式產品的實施例,允許具有一驗證資料產生模塊的用戶端裝置執行主動式網路身分驗證運作,該主動式網路身分驗證運作包含有:提示使用者將一服務提供端系統通過一第一傳輸管道傳來的一動態密碼,輸入該用戶端裝置的一預定介面;利用該預定介面接收該動態密碼;利用該驗證資料產生模塊產生與該動態密碼相關的一安全驗證資料;以及將該安全驗證資料以一或多個簡訊的形式通過一第二傳輸管道傳送至一指定電話號碼。 The present specification further provides an embodiment of a computer program product, which allows a client device having a verification data generation module to perform an active network identity verification operation, the active network identity verification operation including: prompting a user to provide a service Providing a dynamic password sent by the end system through a first transmission pipeline, inputting a predetermined interface of the user equipment; receiving the dynamic password by using the predetermined interface; and using the verification data generation module to generate a security related to the dynamic password Verifying the data; and transmitting the security verification data to a designated telephone number via a second transmission pipeline in the form of one or more short messages.

利用前述的多通道主動式網路身分驗證系統和相關的電腦程式產品,不僅可提升用戶端裝置所發出的安全驗證資料的不可否認性和安全性,還能有效克服木馬程式、鍵盤側錄程式、螢幕側錄程式,網路釣魚、中間人攻擊、重送攻擊等各種常見的網路攻擊態樣對網路身分驗證造成的衝擊,大幅強化網路身分驗證的正確性和可靠性,進而達成更高等級的網路安全控管目的。 The use of the aforementioned multi-channel active network identity verification system and related computer program products can not only improve the non-repudiation and security of the security verification data issued by the client device, but also effectively overcome the Trojan horse program and the keyboard side program. , screen recording programs, phishing, man-in-the-middle attacks, resend attacks, and other common network attacks have impacted on network identity verification, greatly enhancing the correctness and reliability of network identity verification, and thus achieving A higher level of network security control purposes.

100、700‧‧‧多通道主動式網路身分驗證系統 100, 700‧‧‧Multi-channel active network identity verification system

110‧‧‧服務提供端系統 110‧‧‧Service provider system

112‧‧‧服務處理模塊 112‧‧‧Service Processing Module

114‧‧‧安全認證模塊 114‧‧‧Safety Certification Module

120、720、722‧‧‧用戶端裝置 120, 720, 722‧‧‧Customer device

121‧‧‧瀏覽器模塊 121‧‧‧Browser module

122‧‧‧顯示裝置 122‧‧‧ display device

123‧‧‧儲存裝置 123‧‧‧Storage device

124‧‧‧身分識別模塊 124‧‧‧ Identity Identification Module

125‧‧‧驗證資料產生模塊 125‧‧‧Verification data generation module

126‧‧‧簡訊模塊 126‧‧‧SMS module

127‧‧‧驗證啟動模塊 127‧‧‧Verification Startup Module

圖1為本發明的多通道主動式網路身分驗證系統的一第一實施例簡化後的功能方塊圖。 1 is a simplified functional block diagram of a first embodiment of a multi-channel active network identity verification system of the present invention.

圖2和圖3為本發明之多通道主動式網路身分驗證方法的一第一實施例簡化後的流程圖。 2 and FIG. 3 are simplified flowcharts of a first embodiment of a multi-channel active network identity verification method according to the present invention.

圖4為圖1中之用戶端裝置產生安全驗證資料的一第一實施例簡化後的流程圖。 4 is a simplified flow chart of a first embodiment of the security verification data generated by the client device of FIG. 1.

圖5為本發明之多通道主動式網路身分驗證方法的一第二實施例簡化後的局部流程圖。 FIG. 5 is a simplified partial flowchart of a second embodiment of a multi-channel active network identity verification method according to the present invention.

圖6為圖1中之用戶端裝置產生安全驗證資料的一第二實施例簡化後的流程圖。 FIG. 6 is a simplified flowchart of a second embodiment of the security verification data generated by the client device of FIG. 1.

圖7為本發明的多通道主動式網路身分驗證系統的一第二實施例簡化後的功能方塊圖。 FIG. 7 is a simplified functional block diagram of a second embodiment of the multi-channel active network identity verification system of the present invention.

以下將配合相關圖式來說明本發明之實施例。在這些圖式中,相同的標號表示相同或類似的元件或流程/步驟。 Embodiments of the present invention will be described below in conjunction with the associated drawings. In the drawings, the same reference numerals are used to refer to the same or similar elements.

在說明書及後續的申請專利範圍當中使用了某些詞彙來指稱特定的元件。所屬領域中具有通常知識者應可理解,同樣的元件可能會用不同的名詞來稱呼。本說明書及後續的申請專利範圍並不以名稱的差異來作為區分元件的方式,而是以元件在功能上的差異來作為區分的基準。在通篇說明書及後續的請求項當中所提及的「包含」為一開放式的用語,故應解釋成「包含但不限定於…」。 Certain terms are used throughout the description and following claims to refer to particular elements. Those of ordinary skill in the art should understand that the same elements may be referred to by different nouns. The scope of this specification and the subsequent patent application do not use the difference of the names as the means for distinguishing the elements, but the difference in function of the elements as the basis for the distinction. The word "contains" mentioned in the entire specification and subsequent claims is an open term and should be interpreted as "including but not limited to...".

在此所使用的「及/或」的描述方式,包含所列舉的其中之一或多個項目的任意組合。另外,除非本說明書中有特別指明,否則任何單數格的用語都同時包含複數格的涵義。 The description of "and/or" as used herein includes any combination of one or more of the listed items. In addition, the terms of any singular are intended to include the meaning of the plural, unless otherwise specified in the specification.

請參考圖1,其所繪示為本發明第一實施例的多通道主動式網路 身分驗證系統(multi-channel active identity authentication system)100簡化後的功能方塊圖。多通道主動式網路身分驗證系統100包含有屬於服務提供者的服務提供端系統110以及屬於使用者的用戶端裝置120。服務提供端系統110包含有服務處理模塊112和安全認證模塊114。服務處理模塊112用於處理使用者傳來的服務要求(service request)。安全認證模塊114用於對提出該服務要求的使用者執行網路身份驗證。服務提供端系統110可以是各種網路服務系統,例如網路銀行系統、網路下單系統、線上遊戲系統、企業內部網路系統、或是各種雲端服務系統等等。實作上,服務處理模塊112和安全認證模塊114可以是採用電腦程式實現的不同功能模塊,且兩者可以儲存在同一電腦主機上,也可以分別儲存在位於相同或不同地理區域的不同電腦主機上。 Please refer to FIG. 1 , which illustrates a multi-channel active network according to a first embodiment of the present invention. A simplified functional block diagram of the multi-channel active identity authentication system 100. The multi-channel active network identity verification system 100 includes a service provider system 110 belonging to a service provider and a client device 120 belonging to the user. The service provider system 110 includes a service processing module 112 and a security authentication module 114. The service processing module 112 is configured to process a service request from a user. The security authentication module 114 is configured to perform network authentication for the user requesting the service. The service provider system 110 can be various network service systems, such as an online banking system, a network ordering system, an online gaming system, an intranet system, or various cloud service systems. In practice, the service processing module 112 and the security authentication module 114 may be different functional modules implemented by using a computer program, and the two may be stored on the same computer host, or may be separately stored in different computer hosts located in the same or different geographical regions. on.

用戶端裝置120包含有瀏覽器模塊121、顯示裝置122、儲存裝置123、身分識別模塊124、驗證資料產生模塊125、簡訊模塊126、以及儲存在儲存裝置123中的驗證啟動模塊127。瀏覽器模塊121用於通過網際網路130連接至服務提供端系統110。顯示裝置122用於顯示瀏覽器模塊121接收到的網頁信息。身分識別模塊124包含有可代表用戶端裝置120的合法使用者的識別資料。驗證資料產生模塊125是專屬於用戶端裝置120的合法使用者的硬體裝置或軟體模塊,用於產生安全驗證資料。例如,身分識別模塊124可以是SIM卡,而驗證資料產生模塊125可以是儲存有用戶端裝置120的合法使用者的金鑰,並貼附於身分識別模塊124上的薄型電路板(俗稱卡貼)。或者,驗證資料產生模塊125可以是以電腦 程式實現、且儲存有用戶端裝置120的合法使用者的金鑰的功能模塊。 The client device 120 includes a browser module 121, a display device 122, a storage device 123, an identity recognition module 124, a verification data generation module 125, a SMS module 126, and a verification activation module 127 stored in the storage device 123. The browser module 121 is for connecting to the service provider system 110 via the internet 130. The display device 122 is configured to display webpage information received by the browser module 121. The identity identification module 124 includes identification data representative of legitimate users of the client device 120. The verification data generation module 125 is a hardware device or a software module dedicated to a legitimate user of the client device 120 for generating security verification data. For example, the identity identification module 124 can be a SIM card, and the verification data generation module 125 can be a key for storing a legitimate user of the client device 120 and attached to the thin circuit board of the identity recognition module 124. ). Alternatively, the verification data generation module 125 may be a computer The program implements and stores a functional module of a key of a legitimate user of the client device 120.

簡訊模塊126用於將該安全驗證資料以簡訊形式傳送給安全認證模塊114。驗證啟動模塊127則用於依據使用者的命令啟動本發明提出的主動式網路身分驗證程序。在本實施例中,驗證啟動模塊127是以電腦程式實現、並由服務提供者提供給使用者儲存在用戶端裝置120上的功能模塊。 The SMS module 126 is configured to transmit the security verification data to the security authentication module 114 in the form of a short message. The verification startup module 127 is configured to initiate the active network identity verification procedure proposed by the present invention according to a user's command. In this embodiment, the verification startup module 127 is implemented by a computer program and provided by the service provider to the user for storing the function module on the client device 120.

在應用上,用戶端裝置120可以是各種可透過網際網路以外的管道發送簡訊的終端裝置,例如智慧型手機、筆記型電腦、平板電腦、電子書等,也可以是桌上型電腦、車輛電子系統等設備。 In application, the client device 120 can be any terminal device that can send a short message through a pipe outside the Internet, such as a smart phone, a notebook computer, a tablet computer, an e-book, etc., or can be a desktop computer or a vehicle. Equipment such as electronic systems.

以下將搭配圖2到圖7來進一步說明多通道主動式網路身分驗證系統100的運作方式。 The operation of the multi-channel active network identity verification system 100 will be further described below in conjunction with FIGS. 2 through 7.

圖2和圖3為本發明之多通道主動式網路身分驗證方法的第一實施例簡化後的流程圖。當使用者要使用服務提供端系統110的某項網路服務時,例如線上交易、線上下單、進行線上遊戲、存取雲端資料、登入或存取遠端企業內部伺服器等等,使用者可利用用戶端裝置120的瀏覽器模塊121執行流程202,經由一第一傳輸管道進行第一重的網路身分驗證程序,以登入服務提供端系統110。在本實施例中,該第一傳輸管道是網際網路130。用戶端裝置120可經由網際網路130以使用者帳號、固定密碼等各種習知的身份認證方式登入服務提供端系統110,取得安全控管層級較低的部分服務的使用權,例如瀏覽基本資料等基本服務項目。此時,服務提供端系統110的服務處理模塊112和用戶端裝置120的瀏覽 器模塊121間會建立起一資料連線(session)。 2 and FIG. 3 are simplified flowcharts of a first embodiment of a multi-channel active network identity verification method according to the present invention. When the user wants to use a certain network service of the service provider system 110, such as online transactions, online ordering, online games, access to cloud data, login or access to a remote enterprise internal server, etc., the user The process 202 may be performed by the browser module 121 of the client device 120, and the first heavy network identity verification procedure is performed via a first transmission pipeline to log in to the service provider system 110. In this embodiment, the first transmission pipeline is the Internet 130. The client device 120 can log in to the service provider system 110 via the Internet 130 by using various conventional identity authentication methods such as a user account and a fixed password to obtain the right to use a part of the service with a lower security control level, such as browsing basic data. And other basic service items. At this time, the service processing module 112 of the service provider system 110 and the browsing of the client device 120 A data session is established between the modules 121.

在流程204中,瀏覽器模塊121會將使用者選擇或指定的安全控管層級較高的服務要求,例如網路轉帳、修改帳號資料等,利用已建立的資料連線通過網際網路130傳送給服務處理模塊112。 In the process 204, the browser module 121 transmits the service requirements selected by the user or specified by the security control level, such as network transfer, modification of account information, etc., through the established data connection through the Internet 130. The service processing module 112 is provided.

服務處理模塊112接收到瀏覽器模塊121傳來的服務要求時,會進行流程206以產生對應該服務要求的服務內容信息,並通知安全認證模塊114對該服務要求進行多通道網路身分驗證程序。例如,假設瀏覽器模塊121傳來的服務要求是一筆網路轉帳的要求,則服務處理模塊112可將該筆網路轉帳的金額、幣別、轉入帳戶的帳號、或轉入帳戶的名稱等資料,做為服務內容信息供使用者核對。 When the service processing module 112 receives the service request from the browser module 121, the process 206 is performed to generate service content information corresponding to the service request, and the security authentication module 114 is notified to perform the multi-channel network identity verification procedure for the service request. . For example, assuming that the service request from the browser module 121 is a request for a network transfer, the service processing module 112 can transfer the amount of the network transfer, the currency, the account transferred to the account, or the name of the account. The information is used as the service content information for the user to check.

安全認證模塊114接收到服務處理模塊112的通知後會進行流程208,依據一挑戰回應演算法產生一組挑戰值(challenge value)。在本實施例中,用戶端裝置120的驗證資料產生模塊125中會預先儲存有一對應的挑戰回應演算法,可依據安全認證模塊114產生的挑戰值計算出一組相對應的回應值。實作上,服務提供者可以針對不同的使用者分別配發不同的挑戰回應演算法,並儲存在個別使用者的用戶端裝置的驗證資料產生模塊中,使得不同使用者的用戶端裝置依據同一挑戰值所計算出的回應值會有所不同,藉以強化網路身份驗證的可靠性。 After receiving the notification from the service processing module 112, the security authentication module 114 proceeds to process 208 to generate a set of challenge values according to a challenge response algorithm. In this embodiment, a corresponding challenge response algorithm is pre-stored in the verification data generating module 125 of the client device 120, and a corresponding set of response values may be calculated according to the challenge value generated by the security authentication module 114. In practice, the service provider can separately distribute different challenge response algorithms for different users, and store them in the verification data generation module of the user device of the individual user, so that the user devices of different users are based on the same The response value calculated by the challenge value will be different to enhance the reliability of network authentication.

在流程210中,安全認證模塊114會將產生的挑戰值傳送給服務處理模塊112。 In process 210, the secure authentication module 114 communicates the generated challenge value to the service processing module 112.

在流程212中,服務處理模塊112會使用服務處理模塊112與瀏覽 器模塊121間的資料連線,將服務內容信息、挑戰值、以及提示使用者進行主動式網路身分驗證程序的通知信息,通過網際網路130傳送給瀏覽器模塊121。 In process 212, the service processing module 112 uses the service processing module 112 and browses The data connection between the modules 121 transmits the service content information, the challenge value, and the notification information prompting the user to perform the active network identity verification program to the browser module 121 via the Internet 130.

在流程214中,瀏覽器模塊121會將接收到的服務內容信息、挑戰值和通知信息顯示在顯示裝置122上。前述要求進行主動式網路身分驗證程序的通知信息,會提醒使用者接下來應該執行用戶端裝置120中的驗證啟動模塊127,以啟動並完成主動式網路身分驗證程序,才能使服務提供端系統110完成前述的服務要求。 In the process 214, the browser module 121 displays the received service content information, challenge value, and notification information on the display device 122. The foregoing requesting the notification information of the active network identity verification program will remind the user that the verification startup module 127 in the client device 120 should be executed to start and complete the active network identity verification program, so that the service provider can be enabled. System 110 completes the aforementioned service requirements.

如前所述,本實施例中的驗證啟動模塊127是以電腦程式實現、並由服務提供者提供給使用者儲存在用戶端裝置120上的功能模塊。當驗證啟動模塊127接收到使用者的執行命令時,會進行流程216,以啟動驗證資料產生模塊125產生與服務內容信息和與該挑戰值相對應的回應值有關的安全驗證資料。以下將搭配圖4來進一步說明流程216的運作方式。 As described above, the verification activation module 127 in this embodiment is a functional module implemented by a computer program and provided by the service provider to the user for storage on the client device 120. When the verification initiation module 127 receives the execution command of the user, the process 216 is performed to activate the verification data generation module 125 to generate security verification data related to the service content information and the response value corresponding to the challenge value. The operation of the process 216 will be further described below in conjunction with FIG.

圖4為用戶端裝置120產生安全驗證資料的第一實施例簡化後的流程圖。當驗證啟動模塊127接收到使用者的執行命令時,驗證啟動模塊127會進行流程402,提示使用者將顯示裝置122上所顯示的服務內容信息和挑戰值,輸入用戶端裝置120的一預定介面。例如,藉由語音接收模組或是驗證啟動模塊127所產生的一輸入畫面而輸入。 4 is a simplified flowchart of a first embodiment in which the client device 120 generates security verification data. When the verification initiation module 127 receives the execution command of the user, the verification initiation module 127 performs a process 402 to prompt the user to input the service content information and the challenge value displayed on the display device 122 into a predetermined interface of the client device 120. . For example, it is input by an input screen generated by the voice receiving module or the verification starting module 127.

在流程404中,驗證啟動模塊127會接收使用者輸入的資料。 In flow 404, the verification initiation module 127 receives the data entered by the user.

接著,驗證啟動模塊127會進行流程406,將使用者輸入的資料傳送給驗證資料產生模塊125。 Next, the verification startup module 127 performs a flow 406 to transfer the data input by the user to the verification data generation module 125.

在流程408中,驗證資料產生模塊125會利用內建的挑戰回應演算法依據使用者輸入的挑戰值產生一相對應的回應值。 In the process 408, the verification data generation module 125 generates a corresponding response value based on the challenge value input by the user using the built-in challenge response algorithm.

在流程410中,驗證資料產生模塊125會利用所儲存的金鑰來加密該回應值和使用者輸入的服務內容信息,以產生安全驗證資料。 In the process 410, the verification data generation module 125 uses the stored key to encrypt the response value and the service content information input by the user to generate a security verification data.

接下來,驗證資料產生模塊125或驗證啟動模塊127會進行圖2中的流程218,利用簡訊模塊126將該安全驗證資料以單一或多封簡訊的形式,通過第二傳輸管道傳送給服務提供端系統110。這裡所稱的第二傳輸管道與前面的第一傳輸管道是使用不同通信平台或不同通信協定的資料通信管道。在本實施例中,第二傳輸管道是包含一或多個基地台142和簡訊伺服器144的電信網路(telecom network)140,而簡訊模塊126在流程218中會將該安全驗證資料以簡訊形式通過電信網路140傳送給服務提供者所指定的簡訊接收端電話號碼。 Next, the verification data generation module 125 or the verification initiation module 127 performs the process 218 of FIG. 2, and transmits the security verification data to the service provider through the second transmission pipeline in the form of single or multiple short messages by using the short message module 126. System 110. The second transmission pipeline referred to herein and the first transmission pipeline are data communication pipelines using different communication platforms or different communication protocols. In this embodiment, the second transmission pipeline is a telecommunication network 140 including one or more base stations 142 and a short message server 144, and the short message module 126 will send the security verification data to the short message in the process 218. The form is transmitted over the telecommunications network 140 to the subscriber receiving telephone number designated by the service provider.

為了避免使用者被惡意人士欺騙而誤將該安全驗證資料以簡訊形式傳送到惡意人士指定的電話號碼,服務提供者可以將該指定電話號碼預先儲存在驗證資料產生模塊125中,並將其隱藏起來或進行加密,使得使用者無法更動該指定電話號碼的內容,而只有驗證資料產生模塊125或驗證啟動模塊127才可存取該指定電話號碼。此時,流程218中的簡訊接收端的電話號碼,是由驗證資料產生模塊125或驗證啟動模塊127直接向簡訊模塊126指定,而不允許由使用者設定或加以改變。 In order to prevent the user from being spoofed by a malicious person and mistakenly transmitting the security verification data to the telephone number designated by the malicious person, the service provider may pre-store the designated telephone number in the verification data generation module 125 and hide it. The encryption or the encryption is performed so that the user cannot change the content of the specified telephone number, and only the verification data generation module 125 or the verification activation module 127 can access the designated telephone number. At this time, the telephone number of the receiving end of the short message in the process 218 is directly specified by the verification data generating module 125 or the verification starting module 127 to the short message module 126, and is not allowed to be set or changed by the user.

在流程220中,電信網路140中的簡訊伺服器144會將簡訊模塊126傳來的簡訊,轉發至簡訊接收端電話號碼所對應的目的地,亦即 本實施例中的安全認證模塊114。依據用戶端裝置120回傳該安全驗證資料時所使用的簡訊格式而定,簡訊伺服器144可以是電信業者或簡訊服務業者所架設的簡訊服務中心(short message service center,SMSC)、多媒體簡訊轉發伺服器(MMSserver,MMSC)、或是類似功能的裝置。server,MMSC)、或是類似功能的裝置。 In the process 220, the short message server 144 in the telecommunication network 140 forwards the short message sent by the short message module 126 to the destination corresponding to the phone number of the receiving end of the message, that is, The security authentication module 114 in this embodiment. The short message server 144 may be a short message service center (SMSC) or a multimedia message forwarding device set up by a carrier or a short message service provider, depending on the format of the short message used by the client device 120 to transmit the security verification data. Server (MMSserver, MMSC), or a device with similar functions. Server, MMSC), or a device with similar functions.

當安全認證模塊114接收到簡訊模塊126傳來的簡訊時,會進行圖3中的流程302和304,以核驗簡訊中的安全驗證資料及簡訊的來源電話號碼。在本實施例中,安全認證模塊114會利用與驗證資料產生模塊125中所儲存的金鑰相對應的金鑰來解密該安全驗證資料,並核驗解密後的安全驗證資料中是否包含正確的服務內容信息,以及與傳送給用戶端裝置120的挑戰值相對應的回應值。安全認證模塊114還會檢查簡訊的來源電話號碼是否為用戶端裝置120的使用者事先向服務提供者登記的電話號碼。若該安全驗證資料中包含正確的回應值和服務內容信息,且簡訊的來源電話號碼是預先約定號碼,則安全認證模塊114會進行流程306。反之,若該安全驗證資料中未包含正確的回應值或服務內容信息,或是簡訊的來源電話號碼並非預先約定號碼,則安全認證模塊114會判定網路身分驗證失敗並進行流程316。 When the security authentication module 114 receives the short message sent by the short message module 126, the processes 302 and 304 in FIG. 3 are performed to verify the security verification data in the short message and the source telephone number of the short message. In this embodiment, the security authentication module 114 decrypts the security verification data by using a key corresponding to the key stored in the verification data generation module 125, and verifies whether the decrypted security verification data contains the correct service. The content information, and the response value corresponding to the challenge value transmitted to the client device 120. The security authentication module 114 also checks if the source phone number of the newsletter is a phone number that the user of the client device 120 has previously registered with the service provider. If the security verification data includes the correct response value and the service content information, and the source phone number of the short message is a pre-agreed number, the security authentication module 114 performs the process 306. On the other hand, if the correct verification value or service content information is not included in the security verification data, or the source telephone number of the short message is not a pre-agreed number, the security authentication module 114 determines that the network identity verification fails and proceeds to process 316.

在流程306中,安全認證模塊114會檢查該安全驗證資料是否是在服務處理模塊112將該挑戰值傳送給用戶端裝置120後的一預定時限內收到。若該安全驗證資料是在該預定時限內收到,則安全認證模塊114會判定網路身分驗證成功並進行流程308;否則,安全認證模塊114會判定網路身分驗證失敗並進行流程316。 In the process 306, the security authentication module 114 checks whether the security verification data is received within a predetermined time limit after the service processing module 112 transmits the challenge value to the client device 120. If the security verification data is received within the predetermined time limit, the security authentication module 114 determines that the network identity verification is successful and proceeds to process 308; otherwise, the security authentication module 114 determines that the network identity verification failed and proceeds to flow 316.

在流程308中,安全認證模塊114會發送允許服務要求的通知給服務處理模塊112。 In flow 308, the secure authentication module 114 sends a notification to the service processing module 112 that the service request is allowed.

當服務處理模塊112接收到安全認證模塊114傳來的允許服務要求的通知時,服務處理模塊112會進行流程310,以確認瀏覽器模塊121在流程204中通過網際網路130傳送過來的服務要求。 When the service processing module 112 receives the notification of the allowed service request from the secure authentication module 114, the service processing module 112 performs a process 310 to confirm the service request transmitted by the browser module 121 over the Internet 130 in the process 204. .

接著,服務處理模塊112會進行流程312,以產生相關的服務結果信息,例如,交易完成通知、系統登入成功通知等,並傳送給用戶端裝置120的瀏覽器模塊121。 Next, the service processing module 112 performs the process 312 to generate related service result information, for example, a transaction completion notification, a system login success notification, and the like, and transmits the same to the browser module 121 of the client device 120.

在流程314中,瀏覽器模塊121會將接收到的服務結果信息顯示在顯示裝置122上,以讓使用者得知。 In the process 314, the browser module 121 displays the received service result information on the display device 122 for the user to know.

在流程316中,安全認證模塊114會發送拒絕服務要求的通知給服務處理模塊112。當服務處理模塊112接收到安全認證模塊114傳來的拒絕服務要求的通知時,服務處理模塊112會直接進行流程312,產生該次服務要求不被允許的相關服務結果信息,並傳送給用戶端裝置120的瀏覽器模塊121。 In flow 316, the secure authentication module 114 sends a notification of the denial of service request to the service processing module 112. When the service processing module 112 receives the notification of the denial of service request sent by the security authentication module 114, the service processing module 112 directly performs the process 312 to generate related service result information that the service request is not allowed, and transmits the information to the client. Browser module 121 of device 120.

在前述的第一實施例中,當用戶端裝置120通過第一重的網路身分驗證程序,經由網際網路130登入服務提供端系統110要求服務提供端系統110提供某項網路服務時,服務提供端系統110會依據對應於用戶端裝置120的挑戰回應演算法產生挑戰值,並將該挑戰值通過網際網路130傳送給用戶端裝置120。使用者必須操作用戶端裝置120,利用驗證資料產生模塊125產生與該挑戰值相關的一組安全驗證資料,並將該安全驗證資料以簡訊形式通過與網際網路130不同的電信網路140回傳給服務提供端系統110,才能完 成第二重的網路身分驗證程序。任何第三人在不知道驗證資料產生模塊125所使用的挑戰回應演算法的情況下,即使取得了服務提供端系統110傳送給用戶端裝置120的挑戰值,也無法計算出有效的回應值。 In the foregoing first embodiment, when the client device 120 logs in to the service provider system 110 via the Internet 130 through the first heavy network identity verification program, the service provider system 110 is required to provide a certain network service. The service provider system 110 generates a challenge value according to the challenge response algorithm corresponding to the client device 120, and transmits the challenge value to the client device 120 through the Internet 130. The user must operate the client device 120 to generate a set of security verification data related to the challenge value by using the verification data generation module 125, and pass the security verification data in a short message form through the telecommunication network 140 different from the Internet 130. Passed to the service provider system 110 to complete Be the second most important network identity verification program. If any third party does not know the challenge response algorithm used by the verification data generation module 125, even if the challenge value transmitted by the service provider system 110 to the client device 120 is obtained, a valid response value cannot be calculated.

由於用戶端裝置120中的驗證啟動模塊127必須搭配專屬的驗證資料產生模塊125才能產生安全驗證資料,加上電信網路140較網際網路130更不易遭受中間人攻擊的特性,所以服務提供端系統110只要依據前述方法核驗經由電信網路140接收到的安全驗證資料,便能正確核實用戶端裝置120的使用者身分,而增強系統的安全性。 Since the verification initiation module 127 in the client device 120 must cooperate with the dedicated verification data generation module 125 to generate security verification data, and the telecommunication network 140 is less susceptible to man-in-the-middle attacks than the Internet 130, the service provider is provided. The system 110 can verify the user identity of the client device 120 correctly by verifying the security verification data received via the telecommunication network 140 according to the foregoing method, thereby enhancing the security of the system.

圖5為本發明之多通道主動式網路身分驗證方法的第二實施例簡化後的局部流程圖。與前述第一實施例不同的地方在於,當服務處理模塊112在流程206中將瀏覽器模塊121傳來的服務要求通知安全認證模塊114時,安全認證模塊114會進行流程508,產生一組動態密碼(one time password,OTP)。實作上,安全認證模塊114可依據特殊的演算法計算出專用於該次服務要求,但與該次服務要求或服務內容信息無關的一組動態密碼。或者,安全認證模塊114也可依據瀏覽器模塊121傳來的服務要求、或是服務處理模塊112產生的服務內容信息,計算出專用於該次服務要求,且與該次服務要求或服務內容信息有關的一組動態密碼。 FIG. 5 is a simplified partial flowchart of a second embodiment of a multi-channel active network identity verification method according to the present invention. The difference from the foregoing first embodiment is that when the service processing module 112 notifies the security authentication module 114 of the service request sent by the browser module 121 in the process 206, the security authentication module 114 performs a process 508 to generate a set of dynamics. One time password (OTP). In practice, the security authentication module 114 can calculate a set of dynamic passwords that are specific to the service request but are not related to the service request or service content information according to a special algorithm. Alternatively, the security authentication module 114 may calculate the service request specific to the service request according to the service request sent by the browser module 121 or the service content information generated by the service processing module 112, and the service request or service content information. A related set of dynamic passwords.

接著,安全認證模塊114會進行流程510,將產生的動態密碼傳送給服務處理模塊112。 Next, the security authentication module 114 proceeds to process 510 to transmit the generated dynamic password to the service processing module 112.

在流程512中,服務處理模塊112會使用服務處理模塊112與瀏覽 器模塊121間的資料連線,將服務內容信息、動態密碼、以及提示使用者進行主動式網路身分驗證程序的通知信息,通過網際網路130傳送給瀏覽器模塊121。 In process 512, the service processing module 112 uses the service processing module 112 and browses The data connection between the modules 121 transmits the service content information, the dynamic password, and the notification information prompting the user to perform the active network identity verification program to the browser module 121 via the Internet 130.

在流程514中,瀏覽器模塊121會將接收到的服務內容信息、動態密碼和通知信息顯示在顯示裝置122上。前述要求進行主動式網路身分驗證程序的通知信息,會提醒使用者接下來應該執行用戶端裝置120中的驗證啟動模塊127,以啟動並完成主動式網路身分驗證程序,才能使服務提供端系統110完成前述的服務要求。 In the process 514, the browser module 121 displays the received service content information, dynamic password, and notification information on the display device 122. The foregoing requesting the notification information of the active network identity verification program will remind the user that the verification startup module 127 in the client device 120 should be executed to start and complete the active network identity verification program, so that the service provider can be enabled. System 110 completes the aforementioned service requirements.

本實施例中的驗證啟動模塊127是以電腦程式實現、並由服務提供者提供給使用者儲存在用戶端裝置120上的功能模塊。當驗證啟動模塊127接收到使用者的執行命令時,會進行流程516,以啟動驗證資料產生模塊125產生與服務內容信息和動態密碼有關的安全驗證資料。以下將搭配圖6來進一步說明流程516的運作方式。 The verification activation module 127 in this embodiment is a functional module implemented by a computer program and provided by the service provider to the user for storage on the client device 120. When the verification initiation module 127 receives the execution command of the user, the process 516 is performed to activate the verification data generation module 125 to generate security verification data related to the service content information and the dynamic password. The manner in which the process 516 operates will be further described below in conjunction with FIG.

圖6為用戶端裝置120產生安全驗證資料的一第二實施例簡化後的流程圖。當驗證啟動模塊127接收到使用者的執行命令時,驗證啟動模塊127會進行流程602,提示使用者將顯示裝置122上所顯示的服務內容信息和動態密碼,輸入用戶端裝置120的一預定介面,例如,藉由語音接收模組或是驗證啟動模塊127所產生的一輸入畫面而進行輸入動作。 FIG. 6 is a simplified flowchart of a second embodiment in which the client device 120 generates security verification data. When the verification startup module 127 receives the execution command of the user, the verification startup module 127 performs a process 602 to prompt the user to input the service content information and the dynamic password displayed on the display device 122 into a predetermined interface of the client device 120. For example, an input operation is performed by an input screen generated by the voice receiving module or the verification activation module 127.

在流程604中,驗證啟動模塊127會接收使用者輸入的資料。 In flow 604, the verification initiation module 127 receives the data entered by the user.

接著,驗證啟動模塊127會進行流程606,將使用者輸入的資料傳送給驗證資料產生模塊125。 Next, the verification startup module 127 performs a flow 606 to transfer the data input by the user to the verification data generation module 125.

在流程610中,驗證資料產生模塊125會利用所儲存的金鑰來加密使用者輸入的服務內容信息和動態密碼,以產生安全驗證資料。 In the process 610, the verification data generation module 125 uses the stored key to encrypt the service content information and the dynamic password input by the user to generate the security verification data.

接下來,驗證資料產生模塊125或驗證啟動模塊127會進行圖5中的流程218。 Next, the verification data generation module 125 or the verification initiation module 127 performs the flow 218 of FIG.

圖5中的流程218和220的運作方式和圖1中的流程218和220相同,故前述關於圖1中的流程218和220的說明,也適用於圖5的實施例,為簡潔起見,在此不重複敘述。 Flows 218 and 220 of FIG. 5 operate in the same manner as flow 218 and 220 of FIG. 1, so that the foregoing description of flows 218 and 220 of FIG. 1 also applies to the embodiment of FIG. 5, for the sake of brevity, The description will not be repeated here.

當安全認證模塊114接收到簡訊模塊126透過電信網路140傳來的簡訊時,會進行圖3中的流程302和304,以核驗簡訊中的安全驗證資料及簡訊的來源電話號碼。在本實施例中,安全認證模塊114會利用與驗證資料產生模塊125中所儲存的金鑰相對應的金鑰來解密該安全驗證資料。安全認證模塊114會核驗解密後的安全驗證資料中是否包含正確的服務內容信息和動態密碼,並檢查簡訊的來源電話號碼是否為用戶端裝置120的使用者事先向服務提供者登記的電話號碼。若該安全驗證資料中包含正確的動態密碼和服務內容信息,且簡訊的來源電話號碼是預先約定號碼,則安全認證模塊114會進行流程306。反之,若該安全驗證資料中未包含正確的動態密碼或服務內容信息,或是簡訊的來源電話號碼並非預先約定號碼,則安全認證模塊114會判定網路身分驗證失敗並進行流程316。 When the security authentication module 114 receives the short message sent by the short message module 126 through the telecommunication network 140, the processes 302 and 304 in FIG. 3 are performed to verify the security verification data in the short message and the source telephone number of the short message. In this embodiment, the security authentication module 114 decrypts the security verification data using a key corresponding to the key stored in the verification data generation module 125. The security authentication module 114 verifies whether the decrypted security verification data contains the correct service content information and the dynamic password, and checks whether the source telephone number of the short message is the telephone number registered by the user of the user equipment 120 to the service provider in advance. If the security verification data contains the correct dynamic password and service content information, and the source telephone number of the short message is a pre-agreed number, the security authentication module 114 performs the process 306. On the other hand, if the security verification data does not contain the correct dynamic password or service content information, or the source phone number of the newsletter is not a pre-agreed number, the security authentication module 114 determines that the network identity verification fails and proceeds to process 316.

本實施例中的安全認證模塊114、服務處理模塊112和用戶端裝置120在後續的流程306、308、310、312、314、和316中的運作方式,都於前述實施例相同,為簡潔起見,在此不重複敘述。 The operation modes of the security authentication module 114, the service processing module 112, and the client device 120 in the subsequent processes in the subsequent processes 306, 308, 310, 312, 314, and 316 are the same as in the foregoing embodiment, and are simple. See, the description is not repeated here.

在前述的第二實施例中,當用戶端裝置120通過第一重的網路身分驗證程序,經由網際網路130登入服務提供端系統110要求服務提供端系統110提供某項網路服務時,服務提供端系統110會依據一特殊演算法產生動態密碼,並將該動態密碼通過網際網路130傳送給用戶端裝置120。使用者必須操作用戶端裝置120,利用驗證資料產生模塊125產生與該動態密碼相關的一組安全驗證資料,並將該安全驗證資料以簡訊形式通過與網際網路130不同的電信網路140回傳給服務提供端系統110,才能完成第二重的網路身分驗證程序。由於用戶端裝置120中的驗證啟動模塊127必須搭配專屬的驗證資料產生模塊125才能產生安全驗證資料,加上電信網路140較網際網路130更不易遭受中間人攻擊的特性,所以服務提供端系統110只要依據前述方法核驗經由電信網路140接收到的安全驗證資料,便能正確核實用戶端裝置120的使用者身分,而更增強系統的安全性。 In the foregoing second embodiment, when the client device 120 logs in to the service provider system 110 via the Internet 130 through the first heavy network identity verification program, the service provider system 110 is required to provide a certain network service. The service provider system 110 generates a dynamic password according to a special algorithm and transmits the dynamic password to the client device 120 via the Internet 130. The user must operate the client device 120, generate a set of security verification data related to the dynamic password by using the verification data generation module 125, and send the security verification data in a short message form through the telecommunication network 140 different from the Internet 130. Passed to the service provider system 110 to complete the second network identity verification process. Since the verification initiation module 127 in the client device 120 must cooperate with the dedicated verification data generation module 125 to generate security verification data, and the telecommunication network 140 is less susceptible to man-in-the-middle attacks than the Internet 130, the service provider is provided. As long as the system 110 verifies the security verification data received via the telecommunication network 140 according to the foregoing method, the user identity of the client device 120 can be correctly verified, and the security of the system is further enhanced.

在前述的不同實施例中,驗證資料產生模塊125利用所儲存的金鑰來加密要傳送給安全認證模塊114的資料,可避免安全驗證資料在電信網路140中的傳送過程被電信業者內的不肖人士攔截並竄改。利用金鑰來產生安全驗證資料的方式,可提升安全驗證資料的資料安全性和不可否認性。但使用金鑰來加密只是一種實施例,而非侷限本發明的實際實施方式。例如,驗證資料產生模塊125亦可改用其他事先與安全認證模塊114約定好的加密演算法,來加密要傳送給安全認證模塊114的資料,而當安全認證模塊114接收到該安全驗證資料時,則可用對應的解密演算法進行解密,以核驗安全驗證資料的內容。 In the foregoing different embodiments, the verification data generation module 125 encrypts the data to be transmitted to the security authentication module 114 by using the stored key, so that the transmission process of the security verification data in the telecommunication network 140 can be avoided by the carrier. Unscrupulous people intercepted and tampered. The use of keys to generate secure verification data can improve the security and non-repudiation of data for security verification data. However, the use of a key to encrypt is merely an embodiment and is not intended to limit the actual implementation of the invention. For example, the verification data generation module 125 may also use other encryption algorithms that have been agreed with the security authentication module 114 to encrypt the data to be transmitted to the security authentication module 114, and when the security authentication module 114 receives the security verification data. , the corresponding decryption algorithm can be used for decryption to verify the content of the security verification data.

另外,驗證資料產生模塊125所產生的安全驗證資料可以是文字或數字的態樣,也可以是影像或聲音的態樣。例如,驗證資料產生模塊125可以將加密後的資料轉換成以二維條碼或其他影像碼編碼的一或多個影像,以做為安全驗證資料,再利用簡訊模塊126將該一或多個影像以一或多個簡訊的形式(例如,多媒體簡訊)通過電信網路140傳送至指定的簡訊接收端電話號碼。當安全認證模塊114接收到前述的影像時,可先用對應的解碼演算法將影像還原成加密資料,再用對應的解密演算法進行解密,以核驗安全驗證資料的內容。 In addition, the security verification data generated by the verification data generating module 125 may be a text or a digital aspect, or may be an image or a sound. For example, the verification data generation module 125 can convert the encrypted data into one or more images encoded by a two-dimensional barcode or other image code as the security verification data, and then use the short message module 126 to use the one or more images. The designated short message receiving telephone number is transmitted over the telecommunications network 140 in the form of one or more short messages (eg, a multimedia message). When the security authentication module 114 receives the foregoing image, the image may be restored to the encrypted data by using the corresponding decoding algorithm, and then decrypted by the corresponding decryption algorithm to verify the content of the security verification data.

又例如,驗證資料產生模塊125可以將加密後的資料編碼成一或多個音訊檔,以做為安全驗證資料,再利用簡訊模塊126將該一或多個音訊檔以一或多個簡訊的形式(例如,多媒體簡訊)通過電信網路140傳送至指定的簡訊接收端電話號碼。當安全認證模塊114接收到前述的音訊檔時,可先用對應的解碼演算法將音訊檔還原成加密資料,再用對應的解密演算法進行解密,以核驗安全驗證資料的內容。 For another example, the verification data generating module 125 may encode the encrypted data into one or more audio files as the security verification data, and then use the short message module 126 to record the one or more audio files in the form of one or more short messages. (e.g., a multimedia message) is transmitted over the telecommunications network 140 to a designated short message receiving telephone number. When the security authentication module 114 receives the audio file, the audio file may be restored to the encrypted data by using the corresponding decoding algorithm, and then decrypted by the corresponding decryption algorithm to verify the content of the security verification data.

在前述的說明中,驗證啟動模塊127是在接收到使用者的執行命令時開始執行。實作上,也可以設計成是由瀏覽器模塊121在接收到服務處理模塊112傳來的服務內容信息時,自動呼叫驗證啟動模塊127進行前述的流程216或516的運作。 In the foregoing description, the verification activation module 127 starts execution upon receiving an execution command from the user. In practice, the automatic call verification initiation module 127 can also perform the operations of the foregoing process 216 or 516 when the browser module 121 receives the service content information transmitted by the service processing module 112.

在驗證資料產生模塊125是貼附於身分識別模塊124上的薄型電路板的實施例中,驗證資料產生模塊125可在流程410或610中,將驗證資料產生模塊125的識別碼與前述的回應值、動態密碼、及/或服務內容信息一起進行加密,以產生安全驗證資料。在此情況 下,安全認證模塊114在圖3的流程302和304中會核驗解密後的安全驗證資料中是否包含驗證資料產生模塊125的正確識別碼。若該安全驗證資料中未包含有驗證資料產生模塊125的正確識別碼,則安全認證模塊114會進行流程316,發送拒絕服務要求的通知給服務處理模塊112。 In an embodiment where the verification data generation module 125 is a thin circuit board attached to the identity identification module 124, the verification data generation module 125 may, in the process 410 or 610, the identification code of the verification data generation module 125 and the aforementioned response. The value, dynamic password, and/or service content information are encrypted together to generate a secure verification material. In this case Next, the security authentication module 114 verifies in the processes 302 and 304 of FIG. 3 whether the decrypted security verification data includes the correct identification code of the verification data generation module 125. If the correct authentication code of the verification data generation module 125 is not included in the security verification data, the security authentication module 114 performs a process 316 to send a notification of the denial of service request to the service processing module 112.

此外,為了增加服務提供者配發的驗證資料產生模塊125可和使用者的其他身分識別模塊搭配使用的彈性,服務提供者也可以事先和使用者約定好以驗證資料產生模塊125的識別碼取代身分識別模塊124的電話號碼,來做為判斷安全驗證資料的來源身分的依據。因此,在驗證資料產生模塊125會將驗證資料產生模塊125的識別碼加進安全驗證資料的某些實施例中,安全認證模塊114在圖3的流程302和304中可以省略核驗簡訊的來源電話號碼的程序。 In addition, in order to increase the flexibility of the verification data generation module 125 that the service provider dispenses with the user's other identity recognition module, the service provider may also agree with the user in advance to replace the identification code of the verification data generation module 125. The telephone number of the identity recognition module 124 serves as a basis for judging the source identity of the security verification data. Therefore, in some embodiments in which the verification data generation module 125 adds the identification code of the verification data generation module 125 to the security verification data, the security authentication module 114 may omit the source phone of the verification verification message in the flows 302 and 304 of FIG. Number program.

另外,在流程410或610中,驗證資料產生模塊125也可將用戶端裝置120當時所在位置的地理位置信息(例如GPS座標等),與前述的回應值、動態密碼、服務內容信息、及/或驗證資料產生模塊125的識別碼一起進行加密,以產生安全驗證資料。在此情況下,安全認證模塊114在圖3的流程302和304中還會核驗解密後的安全驗證資料中所包含的地理位置信息是否符合一預定條件,例如是否吻合使用者事先向服務提供者登記的可能活動區域範圍。若該安全驗證資料中包含的地理位置信息不符合預定條件,則安全認證模塊114會進行流程316,發送拒絕服務要求的通知給服務處理模塊112。 In addition, in the process 410 or 610, the verification data generating module 125 can also set the geographical location information (such as GPS coordinates, etc.) of the location where the client device 120 is located, and the foregoing response value, dynamic password, service content information, and/or Or the identification code of the verification data generation module 125 is encrypted together to generate security verification data. In this case, the security authentication module 114 also verifies, in the processes 302 and 304 of FIG. 3, whether the geographical location information contained in the decrypted security verification data meets a predetermined condition, such as whether the user matches the user in advance to the service provider. The range of possible activity areas registered. If the geographical location information included in the security verification data does not meet the predetermined condition, the security authentication module 114 performs a process 316 to send a notification of the denial of service request to the service processing module 112.

在某些應用中,驗證啟動模塊127在圖4的流程402中可以只提示 使用者將顯示裝置122上所顯示的挑戰值輸入用戶端裝置120的一預定介面。此時,驗證資料產生模塊125在流程410中就不會將服務提供端系統110傳來的服務內容信息加到安全驗證資料中,而安全認證模塊114在圖3的流程302和304中也不會檢查安全驗證資料中是否有正確的服務內容信息。同樣地,驗證啟動模塊127在圖6的流程602中也可以只提示使用者將顯示裝置122上所顯示的動態密碼輸入用戶端裝置120的一預定介面。此時,驗證資料產生模塊125在流程610中就不會將服務提供端系統110傳來的服務內容信息加到安全驗證資料中,而安全認證模塊114在圖3的流程302和304中也不會檢查安全驗證資料中是否有正確的服務內容信息。 In some applications, the verification launch module 127 may only prompt in the flow 402 of FIG. The user inputs the challenge value displayed on the display device 122 to a predetermined interface of the client device 120. At this time, the verification data generation module 125 does not add the service content information transmitted from the service provider system 110 to the security verification data in the process 410, and the security authentication module 114 does not in the processes 302 and 304 of FIG. It will check if there is correct service content information in the security verification data. Similarly, the verification activation module 127 may also prompt the user to input the dynamic password displayed on the display device 122 into a predetermined interface of the client device 120 in the flow 602 of FIG. At this time, the verification data generation module 125 does not add the service content information transmitted from the service provider system 110 to the security verification data in the process 610, and the security authentication module 114 does not in the processes 302 and 304 of FIG. It will check if there is correct service content information in the security verification data.

在前述圖1的多通道主動式網路身分驗證系統100中,用戶端裝置120中的不同功能方塊是位於單一硬體裝置中,但這只是為了方便說明而使用的實施例。實作上,用戶端裝置120中的不同功能方塊也可以位於不同的硬體裝置中。 In the multi-channel active network identity verification system 100 of FIG. 1, the different functional blocks in the client device 120 are located in a single hardware device, but this is only an embodiment used for convenience of explanation. In practice, different functional blocks in the client device 120 can also be located in different hardware devices.

例如,圖7為本發明第二實施例的多通道主動式網路身分驗證系統700簡化後的功能方塊圖。在多通道主動式網路身分驗證系統700中,瀏覽器模塊121和顯示裝置122是位於同一用戶端裝置720(例如,電腦)中,而儲存裝置123、身分識別模塊124、驗證資料產生模塊125、簡訊模塊126和驗證啟動模塊127,則是位於另一用戶端裝置722(例如,智慧型手機)中。 For example, FIG. 7 is a simplified functional block diagram of a multi-channel active network identity verification system 700 according to a second embodiment of the present invention. In the multi-channel active network identity verification system 700, the browser module 121 and the display device 122 are located in the same client device 720 (eg, a computer), and the storage device 123, the identity recognition module 124, and the verification data generation module 125 The SMS module 126 and the verification activation module 127 are located in another client device 722 (eg, a smart phone).

由前述說明可知,並非單純的將服務提供端系統110透過網際網路130傳來的服務內容信息、挑戰值、及/或動態密碼,利用任何的用戶端裝置通過電信網路140回傳給服務提供端系統110,就能 通過網路身分驗證程序。在本發明提出的多通道主動式網路身分驗證系統100或700中,用戶端裝置120(或722)中必須儲存有驗證啟動模塊127,並搭配使用者專屬的驗證資料產生模塊125一起使用,才能產生與該次服務要求相關的正確安全驗證資料,並透過正確的管道傳送給服務提供端系統110以完成網路身分驗證。即使用戶端裝置120被植入木馬程式、鍵盤側錄程式、或螢幕側錄程式,或是使用者受到網路釣魚的欺騙,或是用戶端裝置120或720與服務處理模塊112間的資料連線遭受到中間人攻擊,導致服務提供端系統110產生的服務內容信息、挑戰值、和/或動態密碼被惡意人士給攔截和知悉,但惡意人士在欠缺驗證資料產生模塊125的情況下,就無法產生正確的安全驗證資料,所以也無法通過安全認證模塊114的網路身分驗證程序。因此,惡意人士假冒使用者身分所發出的服務要求自然也就不會被服務提供端系統110所允許。 It can be seen from the foregoing description that the service content information, the challenge value, and/or the dynamic password transmitted by the service provider system 110 through the Internet 130 are not simply transmitted back to the service through the telecommunication network 140 by using any user equipment. Providing the end system 110, Verify the program through the network identity. In the multi-channel active network identity verification system 100 or 700 proposed by the present invention, the verification startup module 127 must be stored in the client device 120 (or 722) and used together with the user-specific verification data generation module 125. The correct security verification data related to the service request can be generated and transmitted to the service provider system 110 through the correct pipeline to complete the network identity verification. Even if the client device 120 is implanted with a Trojan horse program, a keyboard side program, or a screen recording program, or the user is deceived by phishing, or the data connection between the client device 120 or 720 and the service processing module 112 The line is attacked by a man-in-the-middle, causing the service content information, the challenge value, and/or the dynamic password generated by the service provider system 110 to be intercepted and known by the malicious person, but in the case where the malicious person lacks the verification data generation module 125, The correct security verification data cannot be generated, so the network identity verification program of the security authentication module 114 cannot be passed. Therefore, the service request issued by the malicious person to impersonate the user identity is naturally not allowed by the service provider system 110.

而且,即便有惡意人士假冒使用者身分向電信公司謊報手機SIM卡遺失,而從電信公司騙取到同樣電話號碼的SIM卡,在欠缺服務提供者配發給真正使用者的專屬驗證資料產生模塊125的情況下,惡意人士仍舊無法產生可通過安全認證模塊114的網路身分驗證程序的正確安全驗證資料。 Moreover, even if a malicious person spoofs the user's identity to the telecommunication company to report that the mobile phone SIM card is lost, and the SIM card that defrauds the same phone number from the telecommunication company, the exclusive authentication data generation module 125 is distributed to the real user in the absence of the service provider. In this case, the malicious person still cannot generate the correct security verification data that can pass the network identity verification program of the security authentication module 114.

另外,由於服務提供端系統110每次傳送給用戶端裝置120的挑戰值或動態密碼都是一次性資料,所以驗證資料產生模塊125依據動態密碼或與挑戰值對應的回應值所產生的安全驗證資料,自然也會具有一次性資料的特性。因此,即便惡意人士能攔截到在電信網路140中傳送的安全驗證資料,也無法利用重送攻擊來通過 安全認證模塊114的網路身分驗證程序。 In addition, since the challenge value or the dynamic password transmitted by the service provider system 110 to the client device 120 is a one-time data, the verification data generation module 125 performs security verification according to the dynamic password or the response value corresponding to the challenge value. Information will naturally have the characteristics of one-off materials. Therefore, even if a malicious person can intercept the security verification data transmitted in the telecommunication network 140, it cannot use the resend attack to pass The network identity verification procedure of the security authentication module 114.

由以上說明可以清楚發現,利用本案提出的多通道主動式網路身分驗證系統的架構和相關的電腦程式產品,不僅可提升用戶端裝置所發出的安全驗證資料的不可否認性和安全性,更能有效克服木馬程式、鍵盤側錄程式、螢幕側錄程式,網路釣魚、中間人攻擊、重送攻擊等各種常見的網路攻擊態樣對網路身分驗證造成的衝擊,大幅強化網路身分驗證的正確性和可靠性,進而達成更高等級的網路安全控管目的。 It can be clearly seen from the above description that the architecture and related computer program products of the multi-channel active network identity verification system proposed in the present invention can not only improve the non-repudiation and security of the security verification data issued by the client device, but also It can effectively overcome the impact of various common network attack modes such as Trojan horse program, keyboard side program, screen recording program, phishing, man-in-the-middle attack, and resend attack on network identity verification, and greatly enhance network identity. The correctness and reliability of the verification, in order to achieve a higher level of network security control purposes.

後續申請專利範圍中的某些電腦程式產品請求項中的流程特徵,與前述的流程圖中的部分運作流程內容對應一致。因此,申請專利範圍中的這些電腦程式產品請求項,應當理解為主要透過說明書記載的電腦程式實現前述解決方案的功能模組架構,而不應當理解為主要通過硬體方式實現該解決方案的實體裝置。 The process characteristics in the request items of some computer program products in the scope of the subsequent patent application are consistent with the contents of some of the operational processes in the foregoing flow chart. Therefore, the request for these computer program products in the scope of the patent application should be understood as the functional module architecture that implements the aforementioned solution mainly through the computer program described in the specification, and should not be construed as an entity that mainly implements the solution by hardware. Device.

以上所述僅為本發明之較佳實施例,凡依本發明申請專利範圍所做之均等變化與修飾,皆應屬本發明之涵蓋範圍。 The above are only the preferred embodiments of the present invention, and all changes and modifications made to the scope of the present invention should be within the scope of the present invention.

100‧‧‧多通道主動式網路身分驗證系統 100‧‧‧Multi-channel active network identity verification system

110‧‧‧服務提供端系統 110‧‧‧Service provider system

112‧‧‧服務處理模塊 112‧‧‧Service Processing Module

114‧‧‧安全認證模塊 114‧‧‧Safety Certification Module

120‧‧‧用戶端裝置 120‧‧‧Customer device

121‧‧‧瀏覽器模塊 121‧‧‧Browser module

122‧‧‧顯示裝置 122‧‧‧ display device

123‧‧‧儲存裝置 123‧‧‧Storage device

124‧‧‧身分識別模塊 124‧‧‧ Identity Identification Module

125‧‧‧驗證資料產生模塊 125‧‧‧Verification data generation module

126‧‧‧簡訊模塊 126‧‧‧SMS module

127‧‧‧驗證啟動模塊 127‧‧‧Verification Startup Module

Claims (15)

一種多通道主動式網路身分驗證系統,其包含有:一瀏覽器模塊,用於通過一第一傳輸管道傳送一服務要求;一安全認證模塊,用於產生一挑戰值;一服務處理模塊,用於產生對應該服務要求的服務內容信息,並使用該服務處理模塊與該瀏覽器模塊間的一目標連線,將該服務內容信息和該挑戰值通過該第一傳輸管道傳送給該瀏覽器模塊;一顯示裝置,用於顯示該服務內容信息和該挑戰值;一驗證啟動模塊,用於提示使用者將該顯示裝置所顯示的該服務內容信息及該挑戰值輸入一預定介面;一驗證資料產生模塊,用於依據一挑戰回應演算法產生與該預定介面接收到的挑戰值相對應的一回應值,並使用一金鑰對該服務內容信息及該回應值進行加密,以產生安全驗證資料;以及一簡訊模塊,用於將該安全驗證資料以簡訊形式通過一第二傳輸管道傳送給該安全認證模塊;其中該安全認證模塊接收到該安全驗證資料時,會核驗該安全驗證資料及一來源電話號碼,若該安全驗證資料中未包含該服務內容信息及該回應值、或該來源電話號碼不是一預先約定號碼,則該安全認證模塊會拒絕該瀏覽器模塊通過該第一傳輸管道傳來的該服務要求。 A multi-channel active network identity verification system includes: a browser module for transmitting a service request through a first transmission pipeline; a security authentication module for generating a challenge value; a service processing module, Generating service content information corresponding to the service request, and using a target connection between the service processing module and the browser module, transmitting the service content information and the challenge value to the browser through the first transmission pipeline a display device, configured to display the service content information and the challenge value; a verification activation module, configured to prompt the user to input the service content information and the challenge value displayed by the display device into a predetermined interface; a data generating module, configured to generate a response value corresponding to the challenge value received by the predetermined interface according to a challenge response algorithm, and encrypt the service content information and the response value by using a key to generate a security verification And a short message module, configured to transmit the security verification data to the short message through a second transmission pipeline a full authentication module, wherein the security authentication module verifies the security verification data and a source phone number when the security verification data is received, and if the security verification data does not include the service content information and the response value, or the source phone number If the number is not a pre-agreed number, the security authentication module rejects the service request sent by the browser module through the first transmission pipeline. 一種電腦程式產品,允許一服務提供端系統執行多通道網路身分驗證運作,該多通道網路身分驗證運作包含有: 依據一挑戰回應演算法產生一挑戰值;利用一服務處理模塊使用該服務處理模塊與一用戶端裝置間的一目標連線,將該挑戰值通過一第一傳輸管道傳送給用戶端裝置;接收通過一第二傳輸管道傳來的安全驗證資料;核驗該安全驗證資料;以及若該安全驗證資料中未包含有與該挑戰值相對應的一回應值,則拒絕該用戶端裝置通過該第一傳輸管道傳來的一服務要求。 A computer program product that allows a service provider system to perform a multi-channel network identity verification operation, the multi-channel network identity verification operation comprising: Generating a challenge value according to a challenge response algorithm; using a service processing module to use a target connection between the service processing module and a client device, and transmitting the challenge value to the client device through a first transmission pipeline; receiving Passing the security verification data transmitted through a second transmission pipeline; verifying the security verification data; and rejecting the user equipment through the first if the security verification data does not include a response value corresponding to the challenge value A service request from the transmission pipeline. 如請求項2所述的電腦程式產品,其中該多通道網路身分驗證運作另包含有:若該安全驗證資料中未包含有該服務處理模塊通過該第一傳輸管道傳送給該用戶端裝置的服務內容信息,則拒絕該服務要求。 The computer program product of claim 2, wherein the multi-channel network identity verification operation further comprises: if the security verification data does not include the service processing module being transmitted to the client device through the first transmission pipeline The service content information is rejected by the service request. 如請求項2或3所述的電腦程式產品,其中該多通道網路身分驗證運作另包含有:若該安全驗證資料不是在產生該挑戰值後的一預定時限內收到,則拒絕該服務要求。 The computer program product of claim 2 or 3, wherein the multi-channel network identity verification operation further comprises: rejecting the service if the security verification data is not received within a predetermined time limit after the challenge value is generated Claim. 如請求項4所述的電腦程式產品,其中該多通道網路身分驗證運作另包含有:核驗該安全驗證資料的一來源電話號碼;以及若該來源電話號碼不是一預先約定號碼,則拒絕該服務要求。 The computer program product of claim 4, wherein the multi-channel network identity verification operation further comprises: verifying a source phone number of the security verification data; and rejecting the source phone number if the source phone number is not a pre-agreed number Service requirements. 如請求項4所述的電腦程式產品,其中該多通道網路身分驗證運作另包含有:若該安全驗證資料中未包含有一薄型電路板的識別碼,則拒絕該服務要求。 The computer program product of claim 4, wherein the multi-channel network identity verification operation further comprises: rejecting the service request if the security verification data does not include an identification code of a thin circuit board. 如請求項4所述的電腦程式產品,其中該多通道網路身分驗證運作另包含有: 若該安全驗證資料中包含的地理位置信息不符合一預定條件,則拒絕該服務要求。 The computer program product of claim 4, wherein the multi-channel network identity verification operation further comprises: If the geographical location information contained in the security verification material does not meet a predetermined condition, the service request is rejected. 如請求項4所述的電腦程式產品,其中核驗該安全驗證資料的流程另包含有:利用一金鑰解密該安全驗證資料。 The computer program product of claim 4, wherein the process of verifying the security verification data further comprises: decrypting the security verification data by using a key. 一種電腦程式產品,允許具有一驗證資料產生模塊的用戶端裝置執行主動式網路身分驗證運作,該主動式網路身分驗證運作包含有:提示使用者將一服務提供端系統通過一第一傳輸管道傳來的一挑戰值,輸入該用戶端裝置的一預定介面;利用該預定介面接收該挑戰值;利用該驗證資料產生模塊依據一挑戰回應演算法產生與該挑戰值相對應的一回應值;利用該驗證資料產生模塊產生與該回應值相關的一安全驗證資料;以及將該安全驗證資料以一或多個簡訊的形式通過一第二傳輸管道傳送至一指定電話號碼。 A computer program product, which allows a client device having a verification data generation module to perform an active network identity verification operation, the active network identity verification operation comprising: prompting a user to pass a service provider system through a first transmission Passing a challenge value from the pipeline, inputting a predetermined interface of the client device; receiving the challenge value by using the predetermined interface; and using the verification data generation module to generate a response value corresponding to the challenge value according to a challenge response algorithm And using the verification data generation module to generate a security verification data related to the response value; and transmitting the security verification data to a designated telephone number through a second transmission pipeline in the form of one or more short messages. 如請求項9所述的電腦程式產品,另包含有:提示使用者將該服務提供端系統通過該第一傳輸管道傳來的服務內容信息輸入該預定介面;其中產生該安全驗證資料的流程包含有:利用該驗證資料產生模塊對該回應值和使用者輸入的服務內容信息進行加密,以產生該安全驗證資料。 The computer program product of claim 9, further comprising: prompting the user to input the service content information transmitted by the service provider system through the first transmission pipeline into the predetermined interface; wherein the process of generating the security verification data includes There is: using the verification data generation module to encrypt the response value and the service content information input by the user to generate the security verification data. 如請求項10所述的電腦程式產品,其中產生該安全驗證資料的流程包含有: 利用該驗證資料產生模塊對該回應值、使用者輸入的服務內容信息、以及該驗證資料產生模塊的識別碼進行加密,以產生該安全驗證資料。 The computer program product of claim 10, wherein the process for generating the security verification data comprises: The verification data generation module encrypts the response value, the service content information input by the user, and the identification code of the verification data generation module to generate the security verification data. 如請求項10所述的電腦程式產品,其中產生該安全驗證資料的流程包含有:利用該驗證資料產生模塊對該回應值、使用者輸入的服務內容信息、以及一地理位置信息進行加密,以產生該安全驗證資料。 The computer program product of claim 10, wherein the process of generating the security verification data includes: using the verification data generation module to encrypt the response value, the service content information input by the user, and a geographic location information, Generate this security verification data. 如請求項10所述的電腦程式產品,其中產生該安全驗證資料的流程包含有:利用該驗證資料產生模塊使用一金鑰對該回應值和使用者輸入的服務內容信息進行加密,以產生該安全驗證資料。 The computer program product of claim 10, wherein the process of generating the security verification data comprises: using the verification data generation module to encrypt the response value and the service content information input by the user by using a key to generate the Security verification data. 如請求項10所述的電腦程式產品,其中將該安全驗證資料傳送至該指定電話號碼的流程包含有:將加密後的資料轉換成一或多個影像或音訊檔,以做為該安全驗證資料。 The computer program product of claim 10, wherein the process of transmitting the security verification data to the designated telephone number comprises: converting the encrypted data into one or more images or audio files as the security verification data . 如請求項10所述的電腦程式產品,其中該指定電話號碼是由該驗證資料產生模塊直接指定,且使用者無法更動。 The computer program product of claim 10, wherein the designated telephone number is directly specified by the verification data generation module, and the user cannot change.
TW100143507A 2011-11-28 2011-11-28 Multi-channel active identityauthentication system and related computer program product and method TWI459786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW100143507A TWI459786B (en) 2011-11-28 2011-11-28 Multi-channel active identityauthentication system and related computer program product and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW100143507A TWI459786B (en) 2011-11-28 2011-11-28 Multi-channel active identityauthentication system and related computer program product and method

Publications (2)

Publication Number Publication Date
TW201322722A TW201322722A (en) 2013-06-01
TWI459786B true TWI459786B (en) 2014-11-01

Family

ID=49032569

Family Applications (1)

Application Number Title Priority Date Filing Date
TW100143507A TWI459786B (en) 2011-11-28 2011-11-28 Multi-channel active identityauthentication system and related computer program product and method

Country Status (1)

Country Link
TW (1) TWI459786B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI710921B (en) * 2015-07-27 2020-11-21 香港商阿里巴巴集團服務有限公司 User identity verification method, system and verification server

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI710921B (en) * 2015-07-27 2020-11-21 香港商阿里巴巴集團服務有限公司 User identity verification method, system and verification server

Also Published As

Publication number Publication date
TW201322722A (en) 2013-06-01

Similar Documents

Publication Publication Date Title
AU2013272182B2 (en) Enterprise triggered 2CHK association
US9838205B2 (en) Network authentication method for secure electronic transactions
US9231925B1 (en) Network authentication method for secure electronic transactions
US9832183B2 (en) Key management using quasi out of band authentication architecture
EP2859489B1 (en) Enhanced 2chk authentication security with query transactions
US9444809B2 (en) Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iPhones™
JP5066827B2 (en) Method and apparatus for authentication service using mobile device
KR101381789B1 (en) Method for web service user authentication
CN108616352B (en) Dynamic password generation method and system based on secure element
CN111615105A (en) Information providing method, information obtaining method, information providing device, information obtaining device and terminal
US20180130056A1 (en) Method and system for transaction security
US20180262471A1 (en) Identity verification and authentication method and system
TWI459786B (en) Multi-channel active identityauthentication system and related computer program product and method
WO2011060739A1 (en) Security system and method
TWI755693B (en) Method for identity verification and system using the same