WO2008113302A2 - Procédé pour la génération d'une signature électronique autorisée d'une personne autorisée et dispositif pour effectuer le procédé - Google Patents

Procédé pour la génération d'une signature électronique autorisée d'une personne autorisée et dispositif pour effectuer le procédé Download PDF

Info

Publication number
WO2008113302A2
WO2008113302A2 PCT/CZ2008/000026 CZ2008000026W WO2008113302A2 WO 2008113302 A2 WO2008113302 A2 WO 2008113302A2 CZ 2008000026 W CZ2008000026 W CZ 2008000026W WO 2008113302 A2 WO2008113302 A2 WO 2008113302A2
Authority
WO
WIPO (PCT)
Prior art keywords
token
data
jak
code
electronic signature
Prior art date
Application number
PCT/CZ2008/000026
Other languages
English (en)
Other versions
WO2008113302A3 (fr
Inventor
Bretislav Endrys
Original Assignee
Monet+, A.S.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Monet+, A.S. filed Critical Monet+, A.S.
Publication of WO2008113302A2 publication Critical patent/WO2008113302A2/fr
Publication of WO2008113302A3 publication Critical patent/WO2008113302A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • G06Q20/3255Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/02Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the invention relates to the method for generation of the authorized electronic signature of the authorized person and it relates to the device to perform the method.
  • the afore-said disadvantages are removed by the method for generation of the authorized electronic signature of the authorized person and the device to perform the method according to the present invention.
  • the present solution uses security features of tokens.
  • the token is able to protect itself against external attacks.
  • it enables secure performance of operations, both cryptographic and non- cryptographic ones.
  • it can provide active support for the functions associated with the check of electronically signed data, prior to its signing.
  • the data which are to be electronically signed are entered into the control system.
  • the essence of this method is that the data being signed are stored in the internal memory of the token, the holder of which is the authorized person, in its complete form and/or in the form of a cryptographic hash.
  • an additional authorization code relating to the data being signed is generated and the authorized person is informed about the data being signed, along with the one-time authorization code, via a separate, independent information device which is not part of the control system so that the authorized person can check such data.
  • the one-time authorization code together with other security elements are entered in the token, where they are used as an access condition to produce the electronic signature, i.e. the check is carried out in the token if the one-time authorization code, or other security elements, have been entered correctly.
  • the token generates and provides to the control system an electronic signature value which is sent together with the data to the entity for which the electronic signature is being generated, particularly to the banking application or another independent and reliable entity.
  • the advantages of this method include strengthening the principle of non-repudiation of electronic data - the authorized person, who is informed by a device independent of the control system about what is being signed, must approve the signature by entering an additional one-time authorization code, which is temporarily valid only for the data being signed.
  • the independence of the information device of the control system makes the potential attack considerably difficult - the potential attacker is unable to find out the value of the one-time authorization code, which means they are unable to perform any operation of the electronic signature about which the authorized person has not been informed.
  • the signing authorized person i.e. the originator of the data, knows exactly what is being signed, and the recipient, i.e. the data consumer, has a defined level of certainty about the message originator's identity.
  • the one-time authorization code is produced in the token prior to electronic signature generation and it is disclosed to the authorized person along with the data being signed via a separate, independent information device, which is advantageously a reading device, with the transfer of the one-time authorization code from the token to the control system being blocked.
  • a further advantageous modification of the method according to the present invention is characterized in that the one-time authorization code is generated prior the production of the electronic signature by the entity for which the authorized electronic signature is being produced, or by a different, independent and reliable system.
  • the entity, or this different independent and reliable system which generates the one-time authorization code, writes the one-time authorization code along with the data to be signed in the token in a way preventing any unathorized entity from obtaining or modifying the one-time authorization code value or from modifying the data to be signed or their cryptographic hash.
  • the token shares a secret used for establishing this cryptographic channel with the entity or the separate independent reliable system which generates the one-time authorization code.
  • the one-time authorization code is disclosed to the authorized person together with the data being signed through a separate, independent information device which is unaffectable by the control system, advantageously it is shown on the display of the device which is advantageously the authorized person's mobile phone.
  • the advantage is that using the current infrastructure and existing devices it is possible to build up a system for generation of the authorized electronic signature relatively quickly.
  • the significant advantage is that the authorized person uses the device they know and they do not have to learn to operate a new device.
  • the security of the performance of the method can be strengthened by generating the one-time authorization code within a temporary session, during which the token is able to sign data, which means that the code can be used to authorize the signature of the data which have been sent to the token during the session only, i.e. the validity of the one-time authorization code expires upon disconnecting the token from the power supply, resetting the token, initiating a new session for generation of electronic signature, etc.
  • the advantage is that the validity of the one-time authorization code can be terminated early and thus the generation of electronic signature can be aborted, if necessary.
  • the method is advantageously performed in such a way that the operation of generation of the electronic signature for specific data is blocked if the check in the token has revealed the exceeding number of permissible incorrect entries of the one-time authorization code or other security components.
  • the advantage is that the token itself can abort the generation of the electronic signature on suspicion of an attack when a potential atacker is trying to work out the value of the one-time authorization code or other security components.
  • control system is connected to the entity for which the electronic signature is being generated, using the first communications infrastructure.
  • control system is two-way connected with a separate control-system independent information device, which is advantageously an independent reading device two-way connected with the token and which is modified for data transfer between the control system and the token and for the disclosure of selected transferred data to the authorized person, who is the token holder.
  • This independent information device is modified to prevent the transfer of selected sensitive data from the token to the control system.
  • a further advantageous modification of the device for performance of the method is created in such a way that using the first communications infrastructure the control system is connected to the entity for which the electronic signature is being generated, and this entity is connected both using the second communications infrastructure, independent of the first network communications infrastructure, with a separate information device to transfer the one-time authorization code and the data to be signed to the authorized person who is the token holder, and using the first communications infrastructure and via the control system it is connected to the token.
  • a further advantageous modification for performance of the method is created in such a way that using the first communications infrastructure the control system is connected to the entity for which the electronic signature is being generated and to an entity-independent and reliable system for generating and/or encrypting the one-time authorization code and advantageously employing additional security components for the data being signed for the token, and the independent and reliable system is connected using the second communications infrastructure, independent of the first network infrastructure, with an independent information device in order to transfer the one-time authorization code and data to be signed to the authorized person, who is the token holder.
  • the independent and reliable system for generating and/or encrypting the one-time authorization code and applying security components to the data being signed for the token can be either part of the entity for which the data to be signed are produced, or it can be an independent but reliable system which provides services to multiple independent entities for which electronic signatures of data are generated.
  • the advantages include costs saving as the costs of establishment and operation of such system are shared by multiple entities.
  • the Internet network is advantageously used as as the first communications infrastructure.
  • GSM network can be advantageously used as the second communications infrastructure.
  • a personal computer is advantageously used as the control system by the device.
  • Functions of the token are advantageously implemented together in a traditional, smart card, or another similar traditional device and in the additional independent device.
  • the advantage is that smart cards used up to now without the integrated support of forcing of additional authorization using the one-time code can be used for authorized electronic signature generation in the way presented in this invention.
  • the missing functionalities of generation and verification of the one-time authorization code are implemented in the independent device which, together with the smart card, forms the token as it is described in this invention.
  • Figures 1 and 2 of the drawings show the device and the separate steps of the method of the authorized generation of electronic signature using the modifications when the one-time authorization code (JAK code) is generated outside the token.
  • the values of both the JAK code and the content of the data being signed are displayed using an independent channel, e.g. in the form of GSM network, the operator services and the mobile phone.
  • the modification as illustrated in Figure 1 of the drawings shows the case when the entity for which the data are being signed, communicates with the signing person and the token
  • the modification as illustrated in Figure 2 of the drawings shows the case when there is an additional reliable entity in the system, which is independent of the entity for which the data are being signed, and which provides reliable communication with the authorized person, i.e. the signing person, and the token.
  • Figure 3 of the drawings shows the device and steps of the method of the authorized generation of the electronic signature using the modification where the JAK code is generated inside the token.
  • the value of the JAK code and the content of the data being signed are displayed using a special reading device equipped with a display.
  • Figure 4 of the drawings shows the token created from the independent additional device and a traditional device for electronic signature generation, represented for example by a conventional smart card.
  • control system D in order to communicate with the web application of a bank, or an entity A and via the Internet browser also other additional SW and HW performing the functions of authentication, particularly the placement and signing of the payment order.
  • a separate information device F 1 e.g. a mobile phone and GSM network, which serves for sending both the JAK code and the content of the transaction which is being signed to the authorized person E, e.g. the bank's client, see the flow chart in Figures 1 and 2,
  • a special reading device H monitoring and, if necessary, modifying communication between the personal computer and the token G, and being able to display important information, such as the JAK code value and the data which are being signed, in addition, it is able to prevent the transfer of the JAK code value from the token G, or the smart card, to control system D, or the personal computer, see the flow chart in Figure 3.
  • the modification of the method performed by the device according to Figure 1 of the drawings is characterized in that the one-time authorization JAK code is generated externally, i.e. outside the token G, using the first communications infrastructure C, which is the Internet network, and using the second communications infrastructure B, which is GSM network, as an independent channel for the display of the data which are being signed and the associated onetime authorization JAK code.
  • step 1 the authorized person E, in this case the client of the entity A, i.e. the bank, enters data of the electronic transaction which the bank is to perform using the form in the control system D, which is a personal computer in this case. These data are transferred using the first communications infrastructure C, which is the Internet network, to the environment of the entity A, i.e. the bank.
  • step 2 the entity A, i.e. the bank, generates a random value of the one-time authorization JAK code for the electronic transaction data.
  • the JAK code value consists of four digits, for instance.
  • the bank generates the hash of the data which are to be signed and sends it and its encrypted form to the token G.
  • Encrypted storing of the data to the token G can include several steps: a) switching on the power supply of the token G -1 b) selection of PKI application, c) a request to the token G to generate a block of data which will be used for establishment of the encrypted channel, d) in the bank's secure environment the data obtained in the previous step are used to generate an encryption key (minimum 3DES algorithm, preferably AES, the key exchange algorithm can be proprietary or one of the standardized methods can be used, such as Diffie-Hellman key agreement). e) a block of data for the token G is made using the generated encryption key, and the block of data includes: i. advantageously additional information, which will be used to derive the applied encryption key by the token G, ii.
  • the bank sends the value of the generated JAK code, together with all the details of the electronic transaction entered by the authorized person E in step 1_, e.g. type of transaction, target account, amount, variable symbol, etc. via the second communications infrastructure B, such as GSM networks, in an SMS message to the authorized person E's mobile phone.
  • the authorized person E's mobile phone number is kept in the bank's internal database. At this point it is crucial that the communication with the GSM operator be sufficiently secured so that it cannot be abused by a potential attacker.
  • the authorized person E i.e. the bank's client and at the same time the holder of the independent information device F 1 e.g. a mobile phone, and the token G, checks the particulars of the transaction, especially if they match the transaction parameters entered by the authorized person E in step one. At the same time the authorized person reads the JAK code value. If the particulars of the payment match the transaction parameters, the bank's client proceeds to the following step 7. If the bank's client does not intend to authorize the transaction with their signature, they will abort the whole process.
  • the bank's client does not intend to authorize the transaction with their signature, they will abort the whole process.
  • step 7 by entering PIN code, the bank's client logs in to the token G and, by entering the JAK code, authorizes the transaction, i.e. confirms the transaction parameters. It is necessary to point out that the token G was pre- initiated in step 2.
  • the token G checks the PIN, if it has not been entered correctly, the token's firmware enables PIN re-entry until it is blocked. Similarly, the token G checks the JAK code - re-entry of the JAK code is allowed until the maximum number of re-entries of the incorrect JAK code value is reached, typically 3 tries. If any of the verification codes - PIN, JAK - has been blocked, or if the token G has been resetted or disconnected from the power supply, the operation is disabled. If all the access conditions have been verified correctly, the operation proceeds to step 8.
  • the electronic signature value of the data whose cryptographic hash was stored in the token G's memory in step 2 is computed in the token G.
  • the value of the electronic signature is sent to the bank where it is processed further, using standard procedures.
  • the advantage of this modification is that to perform the function of authorized electronic code generation it uses two separate existing communications infrastructures, namely the first communications infrastructure C, which is the Internet network, for the communication between the entity A, i.e. the bank, on the one hand, and the authorized person E, the control system D, i.e. the personal computer, and the token G on the other hand.
  • the first communications infrastructure C serves for the transfer of the data to be signed, the transfer of the JAK code relating to the specific transaction, and the transfer of the data signature itself.
  • the second communications infrastructure B which is the operator's GSM network, serves for sending information messages containing the externally generated one-time JAK code, which is transferred by the authorized person E to the token G, e.g. a smart card, where it is compared with the one-time JAK code stored in an encrypted form in the smart card before.
  • a further modification of the method is performed by the device according to Figure 2 of the drawings where the JAK code is generated externally again, using a GSM network as a separate channel for the display of both the data to be signed and the associated value of the JAK code, using a reliable, independent system
  • step 1 the authorized person E 1 i.e. the bank's client, uses the form on the control system D, i.e. the personal computer, to type the data of the electronic transaction which is to be performed by the bank.
  • the data are sent via the communications infrastructure C, advantageously the Internet network, to the environment of the bank and the independent reliable system L
  • step 2 the independent, reliable system i generates a random value of the JAK code for the electronic transaction data.
  • the JAK code value may consist of four digits, for instance.
  • the independent, reliable system i generates a cryptographic hash of the data which are to be signed and it ensures its encrypted storing in the token G.
  • Encrypted storing of the data to be signed to the token G can, in reality, consists of several substeps: a) switching on the power supply for the token G 1 b) selection of PKI application, c) a request to the token G to generate a block of data which will be used to establish an encrypted channel, d) in the secure, independent and reliable system
  • the data obtained in the previous step are used to generate an encryption key (minimum 3DES algorithm, preferably AES, the key exchange algorithm can be proprietary, or one of the standardized methods can be used, such as Diffie-Hellman key agreement), e) a block of data for the token G is made using the generated encryption key, and the block of data includes: i.
  • advantageously additional information, which the token G will use to derive the applied encryption key ii. advantageously encrypted information about the maximum number of re-tries to enter the JAK code value by the user, typically 3 incorrect entries are allowed, iii. an encrypted JAK code value, iv. an encrypted, or at least signed, hash value of the data being signed, v. advantageously, an electronic signature of all or selected parts of the block of data sent to the token G which verifies the signature to determine whether the data have been generated by a reliable system.
  • the block of data as described in the previous point, is tranferred to the token G, where it is processed, i.e. an encryption key is generated and syntactic and cryptographic checks are carried out.
  • step 3 the independent, reliable system I sends the value of the generated JAK code, along with all the important details of the electronic transaction entered by the client in step 1 , e.g. type of transaction, target account, amount, variable symbol, etc., via the second communications infrastructure B, such as a GSM network, in an SMS message to the client's mobile phone number, with the client's mobile phone number being kept in the internal database of an independent, reliable system ⁇ .
  • the second communications infrastructure B such as a GSM network
  • the authorized person E i.e. the bank's client
  • the holder of the separate information device F i.e. a mobile phone
  • the token G checks the details of the transaction, particularly if they match the parameters of the transaction entered by them in step 1. At the same time they read the value of the JAK code. If the details of the payment match the transaction parameters, the authorized person E proceeds to step 7. If the authorized person E does not intend to authorize for example a banking transaction with the signature, they will abort the whole process.
  • step 7 by entering PIN, the authorized person E logs in to the token G and, by entering the JAK code, confirms the parameters of the transaction of the token G, thus the transaction is authorized to be processed.
  • the token G was pre-initiated in step 2.
  • the token G checks the PIN, if it has not been entered correctly, the token G's firmware enables PIN re-entry until it is blocked.
  • the token G checks the JAK code similarly. Re-entries of the JAK code are allowed until the maximum number of incorrect JAK code value re-entries has been reached - typically 3 tries. If any of the verification codes, PIN or JAK, has been blocked, or if the token G has been resetted or disconnected from the power supply, the operation cannot be finished. If all the access conditions have been verified correctly, the operation proceeds to step 8.
  • the electronic signature value of the data can be computed in token G as part of step 8.
  • the value of the electronic signature is sent to the bank where it is processed further, using standardized procedures.
  • the advantage of this modification is that to perform the function of authorized code generation it uses two independent and existing communications infrastructures. It is the afore-mentioned first communications infrastructure C, which is the Internet network, for communication between the entity A and the independent reliable system i, on the one hand, and the authorized person E, i.e. the bank's client, and the control system D and the token G, on the other hand.
  • the first communications infrastructure C is used to transfer the data to be signed, the encrypted JAK code relating to the specific transaction and the data signature itself.
  • this modification uses a different, independent communications infrastructure B, which is a GSM network, for sending information messages containing the externally generated one-time JAK code, which is transferred by the authorized person E to the token G, which can be for instance a smart card, where it is compared with the JAK code, which was written in an encrypted form in the smart card previously.
  • a GSM network for sending information messages containing the externally generated one-time JAK code, which is transferred by the authorized person E to the token G, which can be for instance a smart card, where it is compared with the JAK code, which was written in an encrypted form in the smart card previously.
  • a further advantage of this modification is that the additional operations for encrypted communication with the token G and SMS notification of the authorized person E, i.e. token G's holder, is performed by the independent, reliable system
  • the entity A i.e. the bank, does not need to build up any additional encryption systems, and, one independent, reliable entity
  • the JAK code is generated inside the token G, i.e. the smart card, and the special reading device H is used to display the data to be signed and the associated value of the JAK code by analysing and modifying the communication between the control system D and the token G.
  • step 1 the authorized person E, i.e. the bank's client, uses the form in the control system D, which is for instance a personal computer, to enter the data of the electronic transaction which is to be performed by the bank.
  • the entered data are transferred via the independent information device, which is the special reading device H, to the token G's memory.
  • Storing of the data in the token G can consist of several substeps: a) switching on the power supply of token G, b) optional reading of the configuration data from the token G's memory - the configuration data can be used by the reading device to "learn" to monitor the communication between the personal computer and token G, c) optional authentication of the personal computer's software for the token G - the token G knows that a reliable application is communicating with it, d) optional authentication of the reading device's software for the token G.
  • the authentication can be two-sided, i.e. both the token G and the special reading device JH trust each other, and the result can be the generation of the common encryption key for the session, i.e. the token G and the independent information device, i.e.
  • the special reading device H can communicate with each other in an encrypted form. e) setting up of a cryptographic operation and storing of the data to be signed in the token G. At this point the data to be signed are monitored by the special reading device H, they are hashed by the token G, correct receiving of the data to be signed is indicated by the token G and subsequently the special reading device H can serve for its transfer to the authorized person E, i.e. the token G's holder. In the following step 5, after the acceptance of the complete data to be signed by the token G, a random JAK code is generated for this data in the token G, which may consist for example of four digits, and a maximum number of permissible incorrect entries is set up, e.g. to value 3.
  • the JAK code value is sent to the special reading device H by the token G, the communication can be encrypted, as mentioned in step 4.
  • the reading device H ensures that the JAK code value does not get to the control system D, which is a personal computer.
  • the JAK code value is disclosed to the authorized person E, i.e. the token G's holder.
  • the data to be signed transferred in step 4 are also disclosed to the token G's holder by the reading device H, see step 6.
  • the authorized person E i.e. the token G's holder, has now the data to be signed, which were sent to be signed to the token G, and the one-time JAK code, by entering of which the authorized person E can confirm the data have been checked. If the data to be signed correspond with the signing person's intention, the operation proceeds to step 7. Otherwise, the user can stop the operation using the personal computer or simply by taking the card out of the reading device.
  • step 7 the authorized person E, i.e. the bank's client, using the personal computer, enters the authentication data necessary to generate the electronic signature.
  • the authentication data compulsorily include the JAK code value, and advantageously PIN.
  • the token G checks the PIN, if it has not been entered correctly, the token G's firmware enables a repeated PIN entry until it is blocked.
  • the token G checks the JAK code similarly - until the maximum number of re-entries of an incorrect JAK code value has been reached - typically 3 tries - re-entries of the JAK code are allowed. If any of the verification codes, PIN or JAK, has been blocked, or if the token G has been resetted or disconnected from the power supply, the operation cannot be finished. If all the access conditions have been verified correctly, the operation proceeds to step 8.
  • the electronic signature value of the data which were written in the token's memory in step 4, can be computed in token G as part of step 8.
  • the value of the electronic signature is sent to the bank where it is processed further, using standardized procedures.
  • the personal computer ensures sending the electronic signature value, and sending the data being signed as well.
  • the advantage of this modification is that to perform the one-time authorization JAK code generation it uses the special reading device H, thanks to which it is possible to generate the one-time authorization JAK code directly in the token G.
  • the special reading device JH ensures that the JAK code, along with the data to be signed or with a substantial part of them, are disclosed directly to the authorized person E, i.e. the token G's holder, practically immediately after the data to be signed have been sent along with the request to generate the electronic signature from the personal computer to the token G, with the possibility to transfer the authorization JAK code from the token G to the personal computer's environment being blocked.
  • an external communication channel the operation of which could increase the costs of transaction.
  • Each type of the electronic signature can use its own group of signature schemes. These are defined by a set of parameters - e.g. the applied type (or algorithm) of one-way compression function (hash), the applied typ (or algorithm) of adding data in the electronic signature (so called padding), the applied type (or algorithm) for electronic signature generation, etc.
  • the operation of authorized electronic signature generation, using the JAK code value as it is described in this invention can be indicated by a specified mark placed, for example, at the beginning of the data being signed.
  • the internal program code of the token G is able to assign different access conditions to the operations of electronic signature generation based upon signature schemes.
  • the recipient of the signed data can advantageously use the knowledge of the method of the authorization to modify the level of trust in the signed message for generation of a particular type of signature scheme.
  • the modification according to Figure 3 of the drawings can be advantageously performed even using traditional smart cards with implemented mechanisms for electronic signature generation, however without the support of functions of the authorized electronic signature generation using the JAK code as it is described in this invention.
  • the method of implementation of the solution with such smart card, or another similar traditional device K for electronic signature generation can be that the additional functions relating to the JAK code value generation and verification are performed by the additional, independent device J, which together with the traditional device K, i.e. smart card, forms one whole - the token G, as it is indicated in Figure 4 of the drawings.
  • the onetime authorization JAK code is generated within the additional, independent device J in step 5 in the way described in the modification according to Figure 3 of the drawings.
  • Step 7 is performed in sub-steps inside the composite token G as follows: a) in sub-step 7.1 user verification codes are sent to the traditional device K in order to generate the electronic signature, where they are checked. This step can be repeated with various values until the verification codes are blocked. If the traditional device K for electronic signature generation verifies the validity of these codes, it will transfer the electronic signature value to the additional, independent device J in substep 7.2. b) In sub-step 7.3 the additional, independent device J will keep the electronic signature value obtained from the traditional device K in sub-step 7.2 until the one- time authorization JAK code value, which was generated in step 5, is successfully checked. The additional, independent device J typically enables 3 attempts to verify the one-time authorization JAK code value.
  • the method for authorized generation of electronic signature of data according to the present invention is an industrially applicable solution which can be used especially in applications requiring a strong principle of non-repudiation. These application include above all electronic banking applications which perform financial transactions directly, which makes them very interesting for potential attackers.
  • the invention enables the authorized person E, i.e. the bank's client, to check what operation is being performed, and the entity A, i.e. the bank, has a higher degree of trust in transactions signed in such way.
  • the system can be applied, for example, in electronic communication between a citizen and the state administration, or in other electronic signature- based systems.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention renforce la fiabilité d'une signature électronique des données par inclusion d'un mécanisme de commande supplémentaire avec une interaction active de la personne autorisée (E) qui révèle une attaque potentielle sur les données signées. Le procédé de génération de signature électronique autorisée par la personne autorisée (E) est caractérisé par le fait que les données signées qui doivent porter la signature électronique sont introduites dans un système de commande (D), puis sont sauvegardées dans la mémoire interne d'un jeton (G) dont le détenteur est la personne autorisée (E). Les données signées sont sauvegardées dans le jeton (G) sous leur forme complète et/ou sous la forme de hachage cryptographique, puis, avant la génération de la signature électronique, un code JAK d'autorisation unique apparenté aux données signées est généré de manière externe, à savoir à l'extérieur du jeton (G). Les données signées, conjointement avec le code JAK d'autorisation unique, sont divulguées, à l'aide d'un dispositif d'informations indépendant, séparé, qui ne fait pas partie du système de commande (D), à la personne autorisée (E), qui les vérifie, puis entre le code JAK d'autorisation unique, de façon avantageuse conjointement avec d'autres composants de sécurité, dans le jeton (G) où il est utilisé comme condition d'accès pour la génération de la signature électronique, une vérification étant effectuée dans le jeton (G), que le code JAK d'autorisation unique et d'autres composants de sécurité aient été entrés correctement ou non, et dans l'affirmative, le jeton (G) génère la valeur de signature électronique qui est envoyée, conjointement avec les données, à l'entité (A) pour laquelle la signature électronique autorisée est générée, notamment à une banque ou autre entité.
PCT/CZ2008/000026 2007-03-16 2008-03-05 Procédé pour la génération d'une signature électronique autorisée d'une personne autorisée et dispositif pour effectuer le procédé WO2008113302A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CZ2007-205A CZ307787B6 (cs) 2007-03-16 2007-03-16 Způsob vytváření autorizovaného elektronického podpisu oprávněné osoby a zařízení k provádění tohoto způsobu
CZPV2007-205 2007-03-16

Publications (2)

Publication Number Publication Date
WO2008113302A2 true WO2008113302A2 (fr) 2008-09-25
WO2008113302A3 WO2008113302A3 (fr) 2008-11-13

Family

ID=39666565

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CZ2008/000026 WO2008113302A2 (fr) 2007-03-16 2008-03-05 Procédé pour la génération d'une signature électronique autorisée d'une personne autorisée et dispositif pour effectuer le procédé

Country Status (2)

Country Link
CZ (1) CZ307787B6 (fr)
WO (1) WO2008113302A2 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2194499A1 (fr) * 2008-11-27 2010-06-09 Giesecke & Devrient GmbH Procédé de sécurisation des transactions
EP2336985A1 (fr) * 2009-12-03 2011-06-22 Nxp B.V. Système d'authentification amélioré
WO2015088986A1 (fr) * 2013-12-09 2015-06-18 Sureclinical Inc. Système et procédé pour signature numérique en nuage à haut niveau de confiance et automatisation des flux de travaux dans les sciences de la santé
US11328234B2 (en) 2015-12-11 2022-05-10 Sureclinical Inc. Interactive project progress tracking interface

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10102779A1 (de) * 2001-01-22 2002-08-29 Utimaco Safeware Ag Verfahren zur Autorisierung in Datenübertragungssystemen
DE10118794A1 (de) * 2001-04-05 2002-10-17 Deutsche Telekom Ag Verfahren und Vorrichtung zum digitalen Signieren einer Transaktion
US20020178122A1 (en) * 2001-05-23 2002-11-28 International Business Machines Corporation System and method for confirming electronic transactions

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10102779A1 (de) * 2001-01-22 2002-08-29 Utimaco Safeware Ag Verfahren zur Autorisierung in Datenübertragungssystemen
DE10118794A1 (de) * 2001-04-05 2002-10-17 Deutsche Telekom Ag Verfahren und Vorrichtung zum digitalen Signieren einer Transaktion
US20020178122A1 (en) * 2001-05-23 2002-11-28 International Business Machines Corporation System and method for confirming electronic transactions

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2194499A1 (fr) * 2008-11-27 2010-06-09 Giesecke & Devrient GmbH Procédé de sécurisation des transactions
EP2336985A1 (fr) * 2009-12-03 2011-06-22 Nxp B.V. Système d'authentification amélioré
WO2015088986A1 (fr) * 2013-12-09 2015-06-18 Sureclinical Inc. Système et procédé pour signature numérique en nuage à haut niveau de confiance et automatisation des flux de travaux dans les sciences de la santé
US10999079B2 (en) 2013-12-09 2021-05-04 Sureclinical Inc. System and method for high trust cloud digital signing and workflow automation in health sciences
US11310056B2 (en) 2013-12-09 2022-04-19 Sureclinical Inc. System and method for high trust cloud digital signing and workflow automation in health sciences
US11328234B2 (en) 2015-12-11 2022-05-10 Sureclinical Inc. Interactive project progress tracking interface
US11853934B2 (en) 2015-12-11 2023-12-26 Sureclinical Inc. Interactive project progress tracking interface

Also Published As

Publication number Publication date
CZ2007205A3 (cs) 2008-09-24
CZ307787B6 (cs) 2019-05-09
WO2008113302A3 (fr) 2008-11-13

Similar Documents

Publication Publication Date Title
EP3861507A1 (fr) Systèmes et procédés d'authentification cryptographique de cartes sans contact
EP2481230B1 (fr) Procédé d'authentification, procédé d'autorisation de paiement et équipements électroniques correspondants
AU2019351878A1 (en) Systems and methods for cryptographic authentication of contactless cards
US10887106B2 (en) Systems and methods for cryptographic authentication of contactless cards
US11804964B2 (en) Systems and methods for cryptographic authentication of contactless cards
US11784820B2 (en) Systems and methods for cryptographic authentication of contactless cards
EP3861511A1 (fr) Systèmes et procédés d'authentification cryptographique de cartes sans contact
US11438164B2 (en) Systems and methods for email-based card activation
EP2113115A2 (fr) Carte à circuit intégré avec client otp
US20230254339A1 (en) Systems and methods for signaling an attack on contactless cards
CN112352410A (zh) 智能卡用作安全令牌
WO2008113302A2 (fr) Procédé pour la génération d'une signature électronique autorisée d'une personne autorisée et dispositif pour effectuer le procédé
US10721081B2 (en) Method and system for authentication
WO2023022927A1 (fr) Techniques et systèmes pour effectuer des opérations d'authentification et de paiement avec une carte sans contact pour fournir des articles et des services

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08715426

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08715426

Country of ref document: EP

Kind code of ref document: A2