WO2005060206A1 - Enregistrement d'identite avec infrastructure de cle publique - Google Patents
Enregistrement d'identite avec infrastructure de cle publique Download PDFInfo
- Publication number
- WO2005060206A1 WO2005060206A1 PCT/GB2004/005200 GB2004005200W WO2005060206A1 WO 2005060206 A1 WO2005060206 A1 WO 2005060206A1 GB 2004005200 W GB2004005200 W GB 2004005200W WO 2005060206 A1 WO2005060206 A1 WO 2005060206A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- digital certificate
- certificate
- secure
- information
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
Definitions
- This invention relates to the secure registration of users with a service provider, making use of digital certificates.
- Many online services require user authentication, using means such as usemames with passwords, or more secure methods such as digital certificates.
- a user In order to allow a user to employ such an authentication scheme, he needs to register his identity and his means of authentication with the service provider. For example, he needs to supply a usemame and password, or provide a digital certificate, which must be mapped to his account with the online service provider.
- a digital certificate is an electronically encoded set of data that associates a digital public "key" with other identity, validity and issuer information. The certificate is digitally signed by the Issuer (the certification authority).
- the digital public key is one of a pair of codes, the other being a "digital private key".
- These keys are selected such that data encrypted using the public key can only be decrypted using the private key, thereby providing confidentiality, and also such that data that can be decrypted using the public key can only have been encrypted using the private key, thereby providing authentication and data integrity.
- the private key cannot be derived from the public key.
- the public key can therefore be used to ensure data encrypted thereby can only be read by the holder of the private key. Moreover, if encrypted data can be recovered by using the public key, that is evidence that the data had originally been encrypted by the holder of the private key.
- a digital certificate is issued by a Certification Authority, which is a trusted third party, together with a private key, to be known only to the certificate owner.
- the certificate contains details of the owner's identity, checked by the Certification Authority prior to issuing, so the online service can trust these details too.
- the owner uses the private key to digitally sign data; the certificate contains the public key, which can be used to validate, signatures made by just that private key and no other. This allows the owner to prove his identity, as only he has access to the correct private key.
- the authenticity of the certificate may be verified by checking with the issuing authority.
- the digital certificate can be used to confirm that the user transmitting the message is the holder of that certificate.
- An online service may hold copies of digital certificates for those of its customers who have registered them, so that the customer may be readily identified when accessing the service, by using the private key.
- the customer may use the same digital certificate to access the services of several service providers, without the risk of his account details being passed from one service provider to another, since only the customer has the private key.
- This is a difference from the password system, in which the operator of one service would be able to access any other services for which the user has allocated the same password.
- the private key is held securely by the user in some form from which it can be readily used to validate any authentication requests, such as carried on a smart card of the type defined by ISO standard 7816 - ideally with some further protection such as a PIN or password. Should the private key become compromised the certificate can be declared invalid by reporting to the issuing authority, which will then render invalid all attempts to use the private key to access any service provider.
- Certificate Revocation List (CRL) which is a signed blacklist of revoked certificates.
- Service providers check all certificates submitted to them against the latest CRL, and reject those that appear on it.
- the digital certificate merely identifies that the person accessing the service has the private key corresponding to that certificate. It is important to recognise that the certificate merely identifies that the user is the same person who supplied the certificate to the service provider in the first place. It does not itself provide a positive identification that the owner of the certificate is a customer of the service provider.
- the web server could validate a client certificate, but would have no means to identify the user beyond reading the details in the certificate and checking with the issuer of the certificate that it has not been revoked.
- a method for associating validated digital certificate information relating to a user with other information relating to that user held in a user database by creating a secure communications connection between a server system associated with the user database and a client system, the secure connection being based upon an initial login identifying the user information in the user database associated with the initial login details, performing a renegotiation of the secure connection requiring a client authentication process, accessing a user's digital certificate, identifying whether the digital certificate is already recorded in the user database, and if the digital certificate is not so recorded, using the authentication process of the secure communications connection to validate a digital certificate submitted in the registration process, and thence storing the validated digital certificate information in the user database, associated with an existing information record relating to the user.
- a data handling system providing access to secure data, comprising interface means for establishing a secure communications connection with another processor, authorisation means for checking the authenticity of a digital certificate received by the data handling system over a secure communications connection established by the interface means, and for checking other authentication information received over the same connection against previously stored data instances, and means for associating the digital certificate data with the previously stored data instances for future retrieval.
- the client merely submits a digital certificate, which is designed as a public document.
- a secure communications system is used merely to authenticate previously-registered certificates, and the registration process is normally manual or requires special software to be installed on browsers.
- Web servers can be set up to map a digital certificate to an account on a service.
- the secure connection is provided by a Secure Sockets Layer
- Sockets Layer (SSL) connection Mutual authentication is possible with SSL, from version 3 and subsequent versions, and with TLS.
- SSL Sockets Layer
- Both the server and client (browser) use a certificate - the web server signs a random challenge from the client and the certificate contains the DNS name of the web site, whilst the browser signs a server challenge, using a key pair and certificate selected by the user.
- the present invention provides a secure way of registering the user's digital certificate when first subscribing to a service, and thereby prove ownership of the private key corresponding to an existing certificate, using standard technology available in web browsers and servers. This could be used as part of a registration process, in the way that users provide passwords currently, so they can authenticate themselves in future.
- This method has the advantages that the authentication is more secure than a password, which may be intercepted, since the private key itself is never transmitted.
- This invention uses the tried and tested security of SSL (for authentication) to secure the registration process.
- the same certificate can be registered for several services without compromising the security of the individual services. For example, a user may use the same certificate for access to a retail service and a bank account, without risk of the retailer thereby gaining access to the bank account.
- the server storing the registered certificate only has the means to authenticate that user's signature or logon attempt; this information cannot be used to impersonate that user. This is an improvement on most password authentication schemes, in which anyone having access to the server could misuse the information.
- the invention may also be used to validate and register several user certificates against a single Service Provider's user account for the purpose of an emergency certificate cancellation service, or for the purpose of supporting multiple personalised user-contexts driven by the user's choice of certificate at login, or for the purpose of supporting access to that one user account by multiple independent users (e.g committee members accessing a sports society bank account).
- a single Service Provider's user account for the purpose of an emergency certificate cancellation service, or for the purpose of supporting multiple personalised user-contexts driven by the user's choice of certificate at login, or for the purpose of supporting access to that one user account by multiple independent users (e.g committee members accessing a sports society bank account).
- Figure 1 illustrates schematically the elements participating in the process according to the invention
- Figure 2 is a flow chart illustrating an overview of both the prior art process and the process according to the invention
- Figure 3 is a flow chart illustrating a set-up process common to the prior art and the invention
- Figure 4 is a flow chart illustrating a process according to the invention
- Figure 5 is a flow chart showing a variant of the process of Figure 4
- any or all of the software used to implement the invention can be contained on various transmission and/or storage mediums such as a floppy disc, CD-ROM, or magnetic tape so that the program can be loaded onto one or more general purpose computers or could be downloaded over a computer network using a suitable transmission medium.
- FIG. 1 shows a server computer 1 and a client computer 2, connected over an open, insecure network 3, such as the Internet.
- the server and client are also capable of communication with a server 4 controlled by a certification authority - in the case of the server 10, this is through an authentication engine 14.
- the server computer 1 operates a web server 10 that supports a Secure Sockets Layer (SSL) interface.
- SSL Secure Sockets Layer
- the server also includes an authentication processor 11 for handling mutual (server-to-client and client-to-server) certificate authentication.
- the server also hosts a user database 12 for holding user details, including certificates, when they register.
- the user database 12 is preferably accessed by a link 13, rather than being held on the server 10 which faces the Internet 3 directly.
- the client computer 2 can be any device with a modern web browser 20 compatible with the Secure Sockets Layer.
- the process of registering operates as follows. Before starting, the user must previously have obtained at least one digital certificate 5 from the certification authority 4, and made it available to his web browser 20.
- the server 1 also has such a certificate.
- a digital certificate is a set of computer data containing details relating to the user and to the authority that issued it. It can be transmitted between computers to prove the authenticity of the sender, and allow encryption of messages between them. Its essential elements are a code 50 identifying the certificate owner, a code 51 identifying the issuing authority 4, and a public key 52.
- the public key 52 can be used to decode any transmission encoded using a corresponding private key 53, which is not part of the certificate 5 but held separately by the user. Thus, if the a transmission can be decoded using the public key 52 that is a guarantee that the transmission was indeed generated by the holder of the matching private key 53.
- the public key 52 may also be used to encode data: such encoded data can only be decoded by the holder of the private key 53 - in particular it cannot be decoded by another holder of the public key.
- the public key therefore has two purposes: it can be used to positively identify the owner of the private key as the originator of data, and it can also be used to protect data so that it can be read only by the owner of the private key.
- the user is responsible for protecting the private key 53 corresponding to the registered certificate 5. This may be stored on the hard disk of the computer 2, with local password protection, or on a PIN-protected smart card. Unlike other security systems, neither the key nor the password protecting it are ever transmitted over the open network, so the risk of it being compromised is considerably reduced.
- a user 2 wishing to access the service connects to the web server 1 (step 100).
- An SSL connection is then created (step 101) - this is a secure connection between the client 2 and the server 1, and is well known in the art.
- the server 1 first presents its own web server certificate details (step 102), and ownership is proved by the sending of a random challenge (103) by the user 2 (using the server's public key), to which the server 1 generates a response (104) with its private key.
- the user's web browser checks the signature and the authenticity of the certificate from the issuing authority 4 before proceeding (step 105).
- the user selects his own certificate 5, and the web browser 20 sends this to the authentication processor 11 of the server 1 (step 106), which issues a random challenge (step 107) which the user's browser digitally signs with the matching private key (step 108), thereby proving ownership of the certificated public/private key pair.
- the authentication processor 11 next interrogates its cryptographic authorisation engine 14. This is contained in a browser or server, for instance, with the root certificate of the issuing Certification Authority (to trust), and possibly the latest CRL if revocation is being checked. Alternatively, it may establish a connection with the issuing authority 4 (which need not be the same one as in step 105 above) to ensure that the certificate 5 is valid (step 109).
- This conventional SSL (with mutual authentication) therefore checks that a user's digital certificate is valid, by ensuring it is not expired or revoked and that it is issued by a certification authority it trusts. If the certificate has been revoked (for example because the owner has allowed the private key to be compromised) the certification authority informs the authentication processor 11 and the user is not permitted to progress further (step 110). Otherwise, the SSL initiation is concluded and the server 10 is enabled so that the user's web browser 20 can access the link through an encrypted SSL tunnel 30.
- This link 30 comprises server side code (which may be an Active Server Page, server-side Java or a CGI, or any other means of running code on the web server).
- the user has now been proved to be the rightful owner of the certificate 5, as the SSL tunnel setup proved that the user had the matching private key 53.
- the certificate has been proved to have been issued by a reputable and trusted Certification Authority 4. Note that at this stage the certificates have been used only to create the encrypted SSL link 30.
- the server 10 has not at this stage associated the client 2 with its records in the user database 12. What happens next depends on whether the certificate has already been recorded in the user database 12. If the certificate 5 is valid, the authentication processor 11 next checks the user database 12 (step 111) to identify whether the certificate 5 has been recorded therein. If it has, this may be used as positive identification of the user 2, and the server 10 can thus be enabled to give access to his account details or other confidential data over the SSL connection 3 (step 112).
- the digital certificate 5 is a public document, only the authorised user has the private key 53.
- the public key can only be used to extract data generated using the private key. Any unauthorised user who attempts to use the certificate 5 will therefore be unable to complete the authentication process since this requires generation of such data.
- matching the certificate 5 to the user record 12 is sufficient to ensure that only the certificate holder can transmit data that can be decoded using the public key.
- a user can only access his account details over the SSL connection 30 if his digital certificate 5 has previously been registered on the user database 12.
- the invention provides a novel process for initial registration of a certificate 5 with the server.
- the initial stages of the process 1, 101, 111 are the same as in the prior art ( Figure 3), but in the event of a certificate not being found in the user database 12, instead of denying access (113, Figure 3), a process is initiated to register the certificate over the secure link 3. Since SSL has already checked the certificate and private key ownership during the link setup, the online service can copy the certificate (by interrogating the web server on which it is running and map it to the user account.
- the user is invited to register his certificate (step 114) and the user responds with a password or other security process (step 115) over the secure link 30.
- This password will have been issued to the user previously when the user first asked to use the service accessed by the server 10. It may have been provided to the customer in person, if positive identification or inspection of other documents is required to open an account, and/or sent by post, to ensure address details provided to the service provider are correct.
- the password is only required for initial registration, and therefore does not need to continue to be memorised by the user once registration has succeeded. In order to avoid misuse, it may be made valid for only a limited period, or for only a single use.
- the user may use the usemame and password for the service, previously issued by the service provider, at initial login (step 115) to obtain basic rights to the service, without SSL.
- he selects "register certificate”
- he initiates SSL and through this submits and registers the certificate, to the account already identified by password, (step 116, 117, 118, 119).
- the certificate 5 once registered may be used as identification on subsequent logins (step 101).
- the certificate 5 can be associated with the user's records in the user database 12 (step 120).
- step 106 presentation of the certificate (step 106) is sufficient identification to allow the authentication processor 11 to enable the server 10 to transmit the user's records to the user over the link 3, encrypted using the public key 52 (step 112).
- the user 2 wishes to authenticate himself to the server, he can access the appropriate service page, protected by SSL (step 101). He can either use his usemame/password (step 115) for basic rights on the service, or select a previously- registered certificate (step 106).
- the authentication processor 11 accepts the certificate 5 and compares it to those in the user database 12 (step 111). As the certificate 5 is now in the user database the user can be authenticated as being the registered owner of the account and can proceed to provide access (step 112) as described above.
- the certificate 5 itself is in the public domain, but it would be of no use to any unauthorised person who might attempt to use it to access the user's records.
- the server 10 would indeed transmit the records to such a user, but would encrypt them using the public key 52. Only the authorised user 2, who has the private key 53, can decode them.
- the invention may be used to validate more than one certificate for the same user record. This may be used, for example to each holder of a joint bank account to have independent access to it. It may also be used to allow a single user to have access using different user-contexts. For example, a user may wish to have an identity providing limited access, such as cash withdrawal to a predetermined limit, when in a non-secure environment.
- a single user may also validate a number of certificates, provided for different purposes, with the server of a cancellation service. As with known card cancellation services, this would allow the user to revoke all his certificates simultaneously with a single instruction. The cancellation service would then contact the certificate issuing authorities to carry out the revocation, and if required to issue one or more replacement certificates.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0329338A GB0329338D0 (en) | 2003-12-18 | 2003-12-18 | Public key infrastructure credential registration |
GB0329338.8 | 2003-12-18 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005060206A1 true WO2005060206A1 (fr) | 2005-06-30 |
Family
ID=30471305
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2004/005200 WO2005060206A1 (fr) | 2003-12-18 | 2004-12-10 | Enregistrement d'identite avec infrastructure de cle publique |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB0329338D0 (fr) |
WO (1) | WO2005060206A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009081418A1 (fr) * | 2007-11-20 | 2009-07-02 | Rediff.Com India Limited | Systèmes et procédés pour l'établissement d'un canal de communication sécurisé au moyen d'un composant de navigation |
CN101873333A (zh) * | 2010-07-09 | 2010-10-27 | 中国工商银行股份有限公司 | 基于银行系统的企业数据维护方法、装置及系统 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6438690B1 (en) * | 1998-06-04 | 2002-08-20 | International Business Machines Corp. | Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system |
-
2003
- 2003-12-18 GB GB0329338A patent/GB0329338D0/en not_active Ceased
-
2004
- 2004-12-10 WO PCT/GB2004/005200 patent/WO2005060206A1/fr active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6438690B1 (en) * | 1998-06-04 | 2002-08-20 | International Business Machines Corp. | Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system |
Non-Patent Citations (2)
Title |
---|
FREIER A O ET AL: "THE SSL PROTOCOL VERSION 3.0", INTERNET DRAFT, 18 November 1996 (1996-11-18), pages ABSTRACTS,1 - 72, XP002923866 * |
VERISIGN: "Implementing Web Site Client Authentication Using Digital IDsSM and the Netscape Enterprise Server 2.0", 1998, XP002324685, Retrieved from the Internet <URL:http://www.verisign.com/repository/clientauth/ent_ig.htm> [retrieved on 20050414] * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009081418A1 (fr) * | 2007-11-20 | 2009-07-02 | Rediff.Com India Limited | Systèmes et procédés pour l'établissement d'un canal de communication sécurisé au moyen d'un composant de navigation |
CN101897166A (zh) * | 2007-11-20 | 2010-11-24 | 雷迪夫.Com印度有限公司 | 用于使用浏览器组件建立安全通信信道的系统和方法 |
CN101873333A (zh) * | 2010-07-09 | 2010-10-27 | 中国工商银行股份有限公司 | 基于银行系统的企业数据维护方法、装置及系统 |
Also Published As
Publication number | Publication date |
---|---|
GB0329338D0 (en) | 2004-01-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8214884B2 (en) | Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys | |
US8219808B2 (en) | Session-based public key infrastructure | |
EP1697818B1 (fr) | Système d'authentification pour applications informatiques en réseau | |
JP5695120B2 (ja) | システム間シングルサインオン | |
EP1498800B1 (fr) | Gestion de connexions protégées dans des réseaux dynamiques | |
US7689828B2 (en) | System and method for implementing digital signature using one time private keys | |
CN100580657C (zh) | 分布式单一注册服务 | |
US20050108575A1 (en) | Apparatus, system, and method for faciliating authenticated communication between authentication realms | |
US20090293111A1 (en) | Third party system for biometric authentication | |
JP2005532736A (ja) | 生物測定学的私設キーインフラストラクチャ | |
MX2008015958A (es) | Estructura de verificacion de credencial biometrica. | |
US20080005573A1 (en) | Credentials for blinded intended audiences | |
US20130019093A1 (en) | Certificate authority | |
US20070033400A1 (en) | System and method for secure electronic data delivery | |
Kizza | Authentication | |
JPH05298174A (ja) | 遠隔ファイルアクセスシステム | |
KR100750214B1 (ko) | 공인 인증서를 이용한 로그인 방법 | |
KR102062851B1 (ko) | 토큰 관리 데몬을 이용한 싱글 사인 온 서비스 인증 방법 및 시스템 | |
EP1689120B1 (fr) | Procédé d'authentification en matière d'application de stockage d'informations | |
JP2005157845A (ja) | サーバシステム、クライアントサーバシステム、及びクライアントサーバシステムへのログイン方法 | |
WO2005060206A1 (fr) | Enregistrement d'identite avec infrastructure de cle publique | |
KR100559152B1 (ko) | 컨텐츠의 보안 유지 방법 및 장치 | |
TWI389534B (zh) | 單一登錄系統與方法及其電腦可讀取媒體 | |
JP4219076B2 (ja) | 電子文書管理方法、電子文書管理システム及び記録媒体 | |
JP2005318399A (ja) | データ通信制御システム及び通信管理サーバ並びに通信制御サーバ |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |