WO2009059535A1 - Procédé d'authentification, système, serveur et nœud d'utilisateur - Google Patents
Procédé d'authentification, système, serveur et nœud d'utilisateur Download PDFInfo
- Publication number
- WO2009059535A1 WO2009059535A1 PCT/CN2008/072863 CN2008072863W WO2009059535A1 WO 2009059535 A1 WO2009059535 A1 WO 2009059535A1 CN 2008072863 W CN2008072863 W CN 2008072863W WO 2009059535 A1 WO2009059535 A1 WO 2009059535A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user node
- server
- session key
- password
- valid period
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Definitions
- the present invention relates to the field of network information security, and in particular, to an authentication method, system, server, and user node. Background technique
- Grid computing As a distributed computing model, represents a new class of systems. This type of system combines heterogeneous computing resources, such as computers, storage, sensors, applications, and experimental results, over the Internet to provide convenient access to a larger user base. For example, when users request some computing and data resources, the grid can be provided to them seamlessly, transparently, and dynamically over the Internet, much like the power grid powers to end users.
- the prior art proposes an effective and practical password-based authentication scheme to solve the authentication problem.
- the specific method steps of the program are as follows:
- E(x, y) The symmetric encryption algorithm encrypts with X as the key
- HQ A secure one-way hash function.
- the server first stores (//), ( ⁇ , / ⁇ )) in the database by key.
- mod p is omitted for convenience.
- Step 1 User U selects a random number and calculates £(/ ⁇ , ). Then, the user U sends the calculation result and the identity as a login request to the server.
- Step 2 After the server s receives the login request, the server first finds the corresponding f (K, pw) from the database according to the identity, and then uses the password/w to decrypt and select a random number ⁇ , and calculates the server s. Session key , and send the calculation result to user u.
- Step 1 User U selects a random number ⁇ and a new password w' to calculate J E(/w,(/w'
- Step 2 When receiving the login request, the server s uses the password; w gets ⁇ .
- the server needs to maintain the stored verification table, which increases the maintenance cost.
- the login request data is longer, for example, the length of p is 1024, then ⁇ needs 1024 bits long.
- an embodiment of the present invention provides an authentication method, system, server, and user node.
- the technical solution is as follows:
- An authentication method comprising:
- the server receives login information from a user node, where the login information includes the identity information, a login information parameter, and a valid period, where the login information parameter is based on the user node password and an algebraic curve of the user node. Generate meta point generation;
- the server generates a user node session key parameter according to the generation element of the algebraic curve according to the identity information, the login information parameter, and the valid period generating server session key in the login information, and sends the user node to the user node.
- a session key parameter the user node session key parameter is used by the user node to generate a user node session secret according to the user node session key parameter after the user node session key parameter received by the user node Key; the server and the user node perform mutual authentication according to the generated session key.
- a network system the system includes: a server and a user node, where
- the server is configured to receive identity information from the user node, select a valid period, generate a user node password according to the identity information and a valid period, and send a registration including the user node password and a valid period to the user node.
- Receiving login information from the user node generating a user node session key parameter according to the generation point of the algebraic curve according to the identity information, the login information parameter, and the valid period generation server session key included in the login information, Transmitting the user node session key parameter to the user node; authenticating the user node according to the server session key;
- the user node is configured to send identity information to the server; receive registration information from the server including a password of the user node and a valid period, and generate a login information parameter according to the generated node of the user node password and the algebraic curve; Transmitting, to the server, login information including the identity information, a login information parameter, and a valid period; receiving a user node session key parameter from the server, and generating a user node session according to the received user node session key parameter a key that authenticates the server according to the user node session key.
- a server comprising:
- a registration module configured to receive identity information from the user node, select a valid period, generate a user node password according to the identity information and the valid period, and send registration information including the user node password and a valid period to the user node;
- the response module is configured to: after receiving the login information of the user node, generate a user node according to the generation information element of the algebraic curve according to the identity information, the login information parameter, and the valid period generation server session key included in the login information a session key parameter, sending the user node session key parameter to the user node;
- the authentication module authenticates the user node according to the server session key.
- a user node including:
- a registration module configured to send identity information to the server; and receive registration information returned by the server and carrying the password of the user node and a valid period
- a login module configured to generate the login information parameter according to the generated node point of the user node password and the algebraic curve, and send the login information including the identity information, the login information parameter, and the valid period to the server;
- a user node session key generation module configured to receive the user node session key parameter from the server, and generate the user node session key according to the received user node session key parameter;
- an authentication module configured to authenticate the server according to the user node session key.
- the embodiment of the invention has the following advantages:
- the user nodes of the authentication side generate the login information parameter according to the generated element point of the user node password and the algebraic curve, and the server only needs to generate the user session key parameter according to the generated element point of the algebraic curve.
- Password-based secure and effective two-way authentication can be realized, which is simple and feasible compared with the previous authentication scheme; and at the same time, password-based mutual authentication is realized.
- FIG. 1 is a flowchart of an authentication method according to Embodiment 1 of the present invention.
- FIG. 2 is a flowchart of a method for changing a login password according to Embodiment 2 of the present invention
- FIG. 3 is a schematic diagram of a network system according to Embodiment 3 of the present invention.
- FIG. 4 is a schematic diagram of a server provided in Embodiment 4 of the present invention.
- FIG. 5 is a detailed schematic diagram of a server provided in Embodiment 4 of the present invention.
- FIG. 6 is a schematic diagram of a user node according to Embodiment 5 of the present invention.
- FIG. 7 is a detailed schematic diagram of a user node according to Embodiment 5 of the present invention. detailed description
- the method provided by the embodiment of the present invention includes: the server receives the identity information from the user node, selects a valid period, generates a user node password according to the identity information and the valid period, and sends the user node password and the validity period to the user node. Registration information;
- the server receives the login information from the user node, where the login information includes the identity information, the login information parameter, and the valid period, wherein the login information parameter is generated by the user node according to the user node password and the generation curve of the algebraic curve; the server is based on the identity in the login information.
- the information, the login information parameter and the valid period generate a server session key, generate a user node session key parameter according to the generated element point of the algebraic curve, and send the user node session key parameter to the user node; the user node session key parameter is used for the user After the user node session key parameter is received by the node, the user node generates a user node session key according to the user node session key parameter;
- the server and the user node perform mutual authentication according to the respective generated session key.
- the method provided by the embodiment of the present invention further includes: the user node sends the identity information, the old user node password, and the valid period to the server through the secure channel established after the server is authenticated; the server is based on the server key and the identity information. And generating a user node password during the valid period, determining whether the generated user node password is equal to the old user node password, and if equal, the server selects a new valid period and generates according to the new server key, identity information, and new valid period. A new user node password, and the new user node password and validity period are sent to the user node over the secure channel.
- the network type of the embodiment of the present invention may be a mobile network, a fixed network, a mobile fixed mobile convergence network, or the like, and may be a local area network, a metropolitan area network, or a wide area network, and may be an access network, a core network, a transmission network, or may be a point-to-point network. (P2P), client/server architecture network (C/S), etc.
- P2P point-to-point network
- C/S client/server architecture network
- An embodiment of the present invention provides an authentication method, where the method includes:
- the server receives the identity information submitted by the user node, generates a user node password, and sends registration information including the user node password and the valid period to the user node; the user node generates the login information parameter, and sends the login information to the server; the server generates the server session key, according to Generating a meta-point of the algebraic curve to generate a user node session key parameter, and transmitting a user node session key parameter to the user node; the user node generates a user node session key according to the received user node session key parameter; the server and the user node according to the respective The generated session key is authenticated.
- the algebraic curve can be an elliptic curve, a hyperelliptic curve or a conic curve.
- a user node U is used as a user node for accessing resources
- a server S is used as a trusted server for providing resources.
- the algebraic curve is specifically an elliptic curve as an example, and is provided based on an elliptic curve cryptography technique.
- a method of authentication the method comprising the steps of:
- ID the identity of the user node exposed by the user node
- ⁇ a low entropy password from the user node in D
- the user node submits its own identity information to the trusted server.
- the identity information is taken as an example.
- the server checks the identity, the user node password is generated, and the user node password and the valid period registration are carried.
- the information is returned to the user node, completing the registration of the user node on the server.
- Step 101 User node U submits identity to server S /
- the login user node can perform the following login authentication phase based on the identity/user node password and its valid period ⁇ :
- Step 105 After receiving the (R 2 , /3 ⁇ 4) sent by the server S, the user node U calculates the user node session key s k Then, the server S is authenticated, and the verification is completed by checking whether / ? 0 ⁇ '
- //)), and compares the calculated / 3 ⁇ 4 ' with the received 4, if the equation / 3 ⁇ 4 ' /3 ⁇ 4 holds, then User node U is authenticated and authorized to access resources.
- the user nodes of the authentication side generate the login information parameter according to the generated element point of the user node password and the algebraic curve, and the server only needs to generate the user session key parameter according to the generated element point of the algebraic curve,
- Implementing password-based secure and effective two-way authentication is simple and feasible compared with the authentication scheme provided by the prior art, and only requires the construction of an algebraic curve group (such as an elliptic curve group, etc.) and a secure hash function.
- an algebraic curve group such as an elliptic curve group, etc.
- a secure hash function At the same time, for the server side, only one key needs to be saved, and the user node password table does not need to be stored, which is convenient for maintenance and enhances security.
- an embodiment of the present invention provides a method for a user node to change a login password after a mutual authentication between a user node and a server.
- the specific steps of the method are as follows:
- Step 201 The user node U sends the old password and the valid period to the server S through the secure channel established by mutual authentication with the server S;
- Step 202 After the server receives the identity ID, the old password, and the valid period, check whether the equation is established. If it is established, the server S selects a new valid period 'and And will be sent to the user node U through the secure channel, so that the user node gets a new password /w 'and.
- the server may generate a new valid period and a new password by authenticating the old password and the valid period of the user node, and return to the user node through the secure channel, and the method is simple and feasible.
- an embodiment of the present invention provides a network system, including:
- the server 301 is configured to receive identity information from the user node 302, select a valid period, generate a user node password according to the identity information and the valid period, and send, to the user node 302, registration information including the user node password and the valid period; and receiving the user node.
- the user node session key parameter is generated according to the generation point of the algebraic curve according to the identity information, the login information parameter, and the valid period generation server 301 session key, and the user node 302 session key parameter is sent to the user node 302.
- the user node 302 is configured to send the identity information to the server 301; after receiving the registration information, generate the login information parameter according to the user node 302 password and the generation point of the algebraic curve. Sending the login information including the identity information, the login information parameter, and the valid period to the server 301; after receiving the session key parameter of the user node 302, generating the session key of the user node 302 according to the received session key parameter of the user node 302, according to The user node 302 session key and server 301 authenticate.
- the user node 302 After the user node 302 and the server 301 pass the authentication, the user node 302 can access the resource.
- the algebraic curve may be an elliptic curve, a hyperelliptic curve or a conic curve.
- the network system provided by the embodiment of the present invention is simple and feasible compared with the authentication scheme provided by the prior art, and only needs the construction of an algebraic curve group (such as an elliptic curve group) and the use of a secure hash function.
- an algebraic curve group such as an elliptic curve group
- a secure hash function for the server side, only one key needs to be saved, and the user node password table does not need to be stored, which is convenient for maintenance and enhances security.
- an embodiment of the present invention further provides a server, including:
- the registration module 401 is configured to receive identity information from the user node, select a valid period, generate a user node password according to the identity information and the valid period, and send registration information including the user node password and the valid period to the user node;
- the response module 402 is configured to: After receiving the login information of the user node, generating a server session key according to the generation information element of the algebraic curve according to the identity information, the login information parameter, and the valid period generation server session key included in the login information, and sending the user node session key parameter to the user node User node session key parameter;
- the authentication module 403 authenticates the user node according to the server session key.
- the server provided by the embodiment of the present invention further includes:
- the receiving module 404 is configured to receive identity information, an old password, and a valid period sent by the user node.
- the password change module 405 is configured to determine, according to the own server key, the identity information received by the receiving module 404, and the validity period, the user node password, and determine whether the generated user node password and the old user node password received by the receiving module are Similarly, if they are the same, a new valid period is selected and a new user node password is generated based on the new server key, identity information, and new valid period, and the new user node password and the new valid period are sent to the user node.
- the server in the embodiment of the present invention may be an authentication server, an AM (Authentication, Authorization, Accounting, Authentication, Authorization, and Accounting) server.
- AM Authentication, Authorization, Accounting
- the server provided by the embodiment of the present invention as a server, only needs to save a key, and does not need to store a user node password table, thereby realizing authentication of the user node, facilitating maintenance, and enhancing security.
- Example 5 The server provided by the embodiment of the present invention, as a server, only needs to save a key, and does not need to store a user node password table, thereby realizing authentication of the user node, facilitating maintenance, and enhancing security.
- an embodiment of the present invention further provides a user node, including:
- the registration module 501 is configured to send identity information to the server, and receive registration information that is returned by the server and carries a password of the user node and a valid period;
- the login module 502 is configured to generate a login information parameter according to the generated node point of the user node password and the algebraic curve, and send the login information including the identity information, the login information parameter, and the valid period to the server;
- a user node session key generation module 503 configured to receive a user node session key parameter from the server, and generate a user node session key according to the received user node session key parameter;
- the authentication module 504 is configured to authenticate the server according to the user node session key.
- the login module 502 includes:
- a generating unit 5021 configured to select a random number, perform a point multiplication operation on the generating element point of the algebraic curve according to the random number and the user node password, and generate a login information parameter;
- the sending unit 5022 is configured to send, to the server, login information including the identity information, the login information parameter generated by the generating unit 5021, and the valid period.
- the user node is authorized by the server to access the resources.
- Each module of the user node in the embodiment of the present invention may integrate several modules according to actual needs.
- the user node in this embodiment may be a router, a switch, a base station, a base station controller, a digital subscriber line access multiplexer (DSLAM), a home location register (HLR), a mobile phone, and a personal digital assistant (Personal Digital Assistant).
- DSLAM digital subscriber line access multiplexer
- HLR home location register
- PDA Personal Digital Assistant
- computers servers, home appliances, and various electronic devices, network devices, or computer-related devices.
- the user node provided by the embodiment of the present invention is simple and feasible compared with the authentication scheme provided by the prior art from the perspective of implementation, and only needs the construction of an algebraic curve group (such as an elliptic curve group, etc.) and the use of a secure hash function. , easy to use.
- the technical solution provided by the embodiment of the present invention provides a certification design that is particularly simple compared with the prior art authentication scheme, and only requires the construction and operation of an algebraic curve group (such as an elliptic curve group).
- the hash function For the server side, since only one key needs to be saved, and there is no need to store a user node password table, the maintenance is simpler and the security is enhanced. For example, in order to achieve the intensity of the 1024-bit RSA, the order of the elliptic curve group is only 160 bits, so the transmitted request message is shortened.
- the technical solution described in the embodiment of the present invention only needs the construction of an elliptic curve group and the use of a secure hash function, which is simple and feasible compared with the previous authentication scheme from the implementation point of view; for the server side, only one key needs to be saved. There is no need to store the user node password table, which is convenient for maintenance, enhances security, and implements password-based mutual authentication.
- the embodiment of the present invention is constructed based on an elliptic curve, the login data is short, but Achieve higher security.
- the server When the user node changes the login password, the server generates a new valid period and a new password by authenticating the old password and the valid period of the user node, and returns it to the user node through the secure channel.
- the method is simple and feasible.
- the technical solution described in the foregoing embodiments of the present invention can be used not only as a general authentication but also as a grid computing platform authentication.
- the embodiments of the present invention are constructed based on an elliptic curve group, and may also implement the method according to the embodiment of the present invention based on other algebraic curve groups, such as based on a hyperelliptic curve group or a conic curve group.
- the present invention can be implemented by hardware, or can be implemented by means of software plus necessary general hardware platform.
- the technical solution of the present invention may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a USB flash drive, a mobile hard disk, etc.), including several The instructions are for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- Computer And Data Communications (AREA)
Description
说 明 书
一种认证方法、 系统、 服务器和用户节点 技术领域
本发明涉及网络信息安全领域, 特别涉及一种认证方法、 系统、 服务器和用户节点。 背景技术
近年来, 网格计算无论是在学术领域还是在应用研究领域均得到了广泛深入的研究。 网格计算, 作为一种分布式计算模型, 代表着一类新的系统。 这类系统可以通过 Internet 的连接将各种异构的计算资源, 如计算机、 存储空间、 传感器、 应用软件和实验结果组合 在一起, 从而为更大范围内的用户群提供方便的访问。 例如, 当用户请求一些计算和数据 资源时, 网格可以通过 Internet无缝地、 透明地、 动态地提供给他们, 这种方式非常类似 于电力网络供电给终端用户的情况。
然而, 由于网格计算的目的在于仅提供安全的网格服务资源给合法的用户, 因此安全 问题成为网格计算中一个非常重要的问题。 为了阻止不合法的用户去访问网格资源, 用户 与服务器之间必需保证互相认证。
现有技术提出了一个有效的实用的基于口令的认证方案以解决认证问题。 该方案具体 方法步骤如下:
其中, U: 用户;
S: 可信任的服务器;
ID: 用户公开的用户身份;
用户低熵的口令;
K -. 服务器密钥;
p,q : 两个大素数满足 p - i ;
g : 中阶为 的生成元;
E(x,y): 对称加密算法以 X作为密钥加密 ;
HQ : 安全的单向哈希函数。
服务器首先通过密钥 将 (//), (^ ,/^))存放在数据库中。 描述中为方便省略 mod p。 登录认证阶段:
第一步: 用户 U选择一个随机数 , 计算 £(/^, )。 然后, 用户 U将计算结果以及身 份 乍为登录请求发送给服务器。
第二步: 当服务器 s接收到登录请求后, 服务器首先根据身份 从数据库中找到对应 的 f (K, pw) , 然后用 解密 之后再使用口令/ w获取 选择一个随机数^,计算服 务器 s的会话密钥
, 并将计算结果发送给用户 u。
第三步: 用户 u根据接收到的信息, 计算用户 U的会话密钥 ^' = ^ ) 通过检查等式 H( , ) =H( ,g"来认证服务器 S。 如果成立, 服务器 S被认证。 计算 H(W,g ), 将 结果 HC^', ;)和 发送给服务器 s。
第四步: 服务器 s 用 自 己的 和 ^ 计算哈希值 D并确定等式 HC^,g )=HC^',g )是否成立。 如果成立, 用户被认证。 那么服务器 s授权用户 u访问资 源。 同时, 经过用户 u与服务器 s之间的互相认证, = w = g 用作会话密钥。
变更口令阶段:
第一步: 用户 U选择一个随机数^和一个新的口令 w', 计算JE(/w,(/w'||^))。 U将计 算结果和 发送给服务器 S作为登录请求。
第二步: 当接收到登录请求, 服务器 s使用口令; w获取^。服务器 S选择一个随机数 r2,计算会话密钥^ = fe ) 以及^¾和^0^,^), 并发送结果给用户 U。
第三步: 用户 U计算会话密钥 ^ = (^ ) 检查 H( , ) =H(W,g"是否成立, 如果 成立, 那么认证服务器 S并计算 H(W,g ;), 发送计算结果和 给服务器≤。
第四步:服务器 S用自己的 ^和 计算哈希值 /( , gr- )并确定 HC^, gr- ) = H(sk gr- ) 是否成立。 如果成立, 服务器 S同意用户 U访问, 同时将 替换为 ;)。 经过 u与 s之间的互相认证, ^ = w = f2用作会话密钥。
在实现本发明过程中, 发明人发现现有技术中至少存在如下问题:
1. 需要使用对称加密算法, 因而软 (硬) 件设计较为复杂;
2. 服务器端需要维护存放 的验证表, 增加了维护代价;
3. 基于 GF(P), 为了保证安全性, 登录请求数据如 较长, 例如, p的长度 为 1024, 那么 ,^需要 1024比特长。
发明内容
为了优化用户节点认证, 本发明实施例提供了一种认证方法、 系统、 服务器和用户节 点。 所述技术方案如下:
一种认证方法, 所述方法包括:
服务器接收来自用户节点的身份信息, 选择有效期间, 根据所述身份信息和有效期间 生成用户节点口令, 向所述用户节点发送包含所述用户节点口令和有效期间的注册信息;
所述服务器接收来自用户节点的登录信息, 所述登录信息包含所述身份信息、 登录信 息参数和有效期间, 其中, 所述登录信息参数为所述用户节点根据所述用户节点口令和代 数曲线的生成元点生成;
所述服务器根据所述登录信息中的身份信息、 登录信息参数和有效期间生成服务器会 话密钥, 根据代数曲线的生成元点生成用户节点会话密钥参数, 向所述用户节点发送所述 用户节点会话密钥参数; 所述用户节点会话密钥参数用于当所述用户节点收到的用户节点 会话密钥参数后, 由所述用户节点根据所述用户节点会话密钥参数生成用户节点会话密钥; 所述服务器和用户节点根据各自生成的会话密钥进行相互认证。
一种网络系统, 所述系统包括: 服务器和用户节点, 其中,
所述服务器, 用于接收来自所述用户节点的身份信息, 选择有效期间, 根据所述身份 信息和有效期间生成用户节点口令, 向所述用户节点发送包含所述用户节点口令和有效期 间的注册信息; 接收来自所述用户节点的登录信息, 根据所述登录信息中包含的身份信息、 登录信息参数和有效期间生成服务器会话密钥, 根据代数曲线的生成元点生成用户节点会 话密钥参数, 向所述用户节点发送所述用户节点会话密钥参数; 根据所述服务器会话密钥 对所述用户节点进行认证;
所述用户节点, 用于向所述服务器发送身份信息; 接收来自所述服务器的包含用户节 点口令和有效期间的注册信息, 根据所述用户节点口令和代数曲线的生成元点生成登录信 息参数; 向所述服务器发送包含所述身份信息、 登录信息参数和有效期间的登录信息; 接 收来自所述服务器的用户节点会话密钥参数, 根据所述接收到的用户节点会话密钥参数生 成用户节点会话密钥, 根据所述用户节点会话密钥对所述服务器进行认证。
一种服务器, 包括:
注册模块, 用于接收来自用户节点的身份信息, 选择有效期间, 根据所述身份信息和 有效期间生成用户节点口令, 向所述用户节点发送包含所述用户节点口令和有效期间的注 册信息;
响应模块, 用于在接收到所述用户节点的登录信息后, 根据所述登录信息中包含的身 份信息、 登录信息参数和有效期间生成服务器会话密钥, 根据代数曲线的生成元点生成用 户节点会话密钥参数, 向所述用户节点发送所述用户节点会话密钥参数;
认证模块, 根据所述服务器会话密钥对所述用户节点进行认证。
一种用户节点, 包括:
注册模块, 用于向服务器发送身份信息; 并接收所述服务器返回的携带所述用户节点 口令和有效期间的注册信息;
登录模块, 用于根据所述用户节点口令和代数曲线的生成元点生成所述登录信息参数, 向所述服务器发送包含所述身份信息、 登录信息参数和有效期间的登录信息;
用户节点会话密钥生成模块, 用于接收来自所述服务器的所述用户节点会话密钥参数, 根据收到的所述用户节点会话密钥参数生成所述用户节点会话密钥;
认证模块, 用于根据所述用户节点会话密钥对所述服务器进行认证。
与现有技术相比, 本发明实施例具有以下优点:
本发明实施例所述的技术方案, 认证双方用户节点根据所述用户节点口令和代数曲线 的生成元点生成登录信息参数, 且服务器仅需要根据代数曲线的生成元点生成用户会话密 钥参数, 即可实现基于口令的安全有效的双向认证, 实现角度上与以往认证方案相比简单 可行; 并且同时实现了基于口令的双向认证。 附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实施例或现有技 术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明 的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动性的前提下, 还可以 根据这些附图获得其他的附图。
图 1是本发明实施例 1提供的一种认证方法流程图;
图 2是本发明实施例 2提供的一种变更登录口令的方法流程图;
图 3是本发明实施例 3提供的网络系统示意图;
图 4是本发明实施例 4提供的服务器示意图;
图 5是本发明实施例 4提供的服务器详细示意图;
图 6是本发明实施例 5提供的用户节点示意图;
图 7是本发明实施例 5提供的用户节点详细示意图。 具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地 描述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于本发明 中的实施例, 本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
本发明实施例提供的方法包括: 服务器接收来自用户节点的身份信息, 选择有效期间, 根据身份信息和有效期间生成用户节点口令, 向用户节点发送包含用户节点口令和有效期
间的注册信息;
服务器接收来自用户节点的登录信息, 登录信息包含身份信息、 登录信息参数和有效 期间, 其中, 登录信息参数为用户节点根据用户节点口令和代数曲线的生成元点生成; 服务器根据登录信息中的身份信息、 登录信息参数和有效期间生成服务器会话密钥, 根据代数曲线的生成元点生成用户节点会话密钥参数, 向用户节点发送用户节点会话密钥 参数; 用户节点会话密钥参数用于当用户节点收到的用户节点会话密钥参数后, 由用户节 点根据用户节点会话密钥参数生成用户节点会话密钥;
服务器和用户节点根据各自生成的会话密钥进行相互认证。
其中, 进一步地, 本发明实施例提供的方法还包括: 用户节点将身份信息、 旧的用户 节点口令以及有效期间通过与服务器认证后建立的安全信道发送给服务器; 服务器根据服 务器密钥、 身份信息和有效期间生成用户节点口令, 判断生成的用户节点口令与旧的用户 节点口令是否相等, 如果相等, 则服务器选择一个新的有效期间并根据新的服务器密钥、 身份信息和新的有效期间生成新的用户节点口令, 并通过安全信道将新的用户节点口令和 有效期间发送给用户节点。
其中, 本发明实施例的网络类型可以是移动网络、 固定网络、 移动固定移动融合网络 等, 可以是局域网、 城域网、 广域网, 可以是接入网、 核心网、 传输网, 可以是点对点网 络 (P2P)、 客户机 /服务器架构的网络 (C/S ) 等。
为使本发明的目的、 技术方案和优点更加清楚, 下面将结合附图对本发明实施方式作 进一步地详细描述。 实施例 1
本发明实施例提供了一种认证方法, 该方法包括:
服务器接收用户节点提交的身份信息, 生成用户节点口令, 向用户节点发送包含用户 节点口令和有效期间的注册信息; 用户节点生成登录信息参数, 向服务器发送登录信息; 服务器生成服务器会话密钥, 根据代数曲线的生成元点生成用户节点会话密钥参数, 向用 户节点发送用户节点会话密钥参数; 用户节点根据收到的用户节点会话密钥参数生成用户 节点会话密钥; 服务器和用户节点根据各自生成的会话密钥进行认证。
其中, 代数曲线可以为椭圆曲线、 超椭圆曲线或圆锥曲线。 如图 1 所示, 本发明实施 例以用户节点 U作为访问资源的用户节点, 以服务器 S作为提供资源的可信任服务器, 以 代数曲线具体为椭圆曲线为例, 基于椭圆曲线密码学技术提供了一种认证的方法, 该方法 包括以下步骤:
本实施例中涉及的符号如下:
U: 用户节点;
S: 可信任的服务器;
ID: 用户节点公开的用户节点身份;
G: 椭圆曲线 ( )上阶为 的子群, Ρ = (χΡ, )为其生成元点;
D-. 均匀分布的字典空间, 其大小为 |/)|=2 48<^<112;
^:取自于 D中的用户节点低熵的口令;
Κ: 服务器密钥;
h: 安全的单向哈希函数, / {0,lf →{0,1 , / = 160;
[mf : 字符串 的最高H立比特;
" 口令 W的有效期间。
首先, 需要进行基于椭圆曲线群的构造, 即:
令 ρ〉 3为一个安全的大素数, 选择两个域元素《,^^ 满足4«3+2762≠(^0(^, 定义 上非奇异椭圆曲线方程 = X3 +ax + 6modp。即满足同余方程式 = x3+ax+bmodp 所有解 (Χ, £ Χ 的集合, 加上无穷远点 O。 选择一个 上的生成元点 p = (xP, , 其阶为^ 并且 P≠O。 这样椭圆曲线 上阶为 的子群 G就构造出来了。
在注册阶段, 用户节点向可信任服务器提交自己身份信息, 本发明实施例中身份信息 以身份 为例, 服务器经检查身份 后, 生成用户节点口令, 并将携带有用户节点口令 和有效期间的注册信息返回用户节点, 完成用户节点在服务器上的注册。
步骤 101: 用户节点 U向服务器 S提交身份/
步骤 102: 服务器 S对收到的用户节点 U的身份 进行有效性检查, 选择有效期间 z', 通过服务器密钥^ r计算哈希值 v = /7( ||/D|| ), 生成用户节点口令/ w = [ , 并将携带有用 户节点口令 = [v 以及有效期间 的注册信息返回用户节点 U。
至此, 注册阶段已经完成, 希望登录用户节点可以根据身份/ 用户节点口令 及其 有效期间 ^进行下面的登录认证阶段:
步骤 103: 用户节点 U选择一个随机数 £2:, 其中 是小于 q并与 q互素的所有正 整数构成的群, 并计算登录信息参数 =(/^ ;^, 然后把其身份 ζ和有效期间 作为 登录信息 (JD, R} , )发送给服务器 S。
步骤 104: 服务器 S收到用户节点 U发送的登录信息 后, 获取用户节点身份 ID 和有效期间 再根据原有的服务器密钥计算哈希值 ν =
, 用户节点口令 ;^=[ν^和服务器会话密钥参数 '=^- ^ = ιΡ。 在 中任意选取一个数 2,计算用户节
点会话密钥参数^ = r2P, 服务器会话密钥 sk = r2Rx ' = 2Ρ和 = h(sk || R,), 并把服务器响 应消息 (R2, 发送给用户节点 U。
步骤 105 : 用户节点 U 收到服务器 S 发送的 (R2, /¾)后, 计算用户节点会话密钥 sk
, 然后认证服务器 S, 此处具体通过检查/?0^ ' | | ?2) = /¾1是否成立完成验证, 如果等式成立, 则服务器 S通过认证。 否则, 服务器 S未通过认证。 服务器 S通过认证后, 用户节点 U计算并发送 /¾ = /7( W 11 ID)给服务器 S。
步骤 106 : 服务器3计算/72 ' = /7^ || //)), 并对计算得出的/ ¾ '和收到的 4进行比较, 如 果等式/ ¾ ' = /¾成立, 则用户节点 U通过认证, 并授权其访问资源。
此外, 当用户节点 U与服务器 S之间通过了互相认证之后, ^ = Γ 乍为会话密钥用 于以后操作, 例如, 当会话密钥^: = Γ Ρ在用户节点 U和服务器 S之间共享后, 他们之间 就可以建立一条安全信道。
本发明实施例提供的方法, 认证双方用户节点根据所述用户节点口令和代数曲线的生 成元点生成登录信息参数, 且服务器仅需要根据代数曲线的生成元点生成用户会话密钥参 数, 即可实现基于口令的安全有效的双向认证, 从实现角度上与现有技术提供的认证方案 相比简单可行, 仅需要一个代数曲线群 (如椭圆曲线群等) 的构造和一个安全的哈希函数 的运用, 同时对于服务器端, 仅需要保存一个密钥, 而不需要存贮用户节点口令表, 便于 维护, 增强了安全性。 实施例 2
如图 2所示, 本发明实施例提供了一种当用户节点与服务器之间通过了互相认证之后, 用户节点变更登录口令的方法, 该方法具体步骤如下:
步骤 201 : 用户节点 U通过和服务器 S之间相互认证后建立的安全信道, 将身份 ft 旧的口令 以及有效期间 发送给服务器 S;
步骤 202 : 服务器收到身份 ID, 旧的口令 以及有效期间 后, 检查等式 否成立, 如果成立, 那么服务器 S 选择一个新的有效期间 '和
, 并通过安全信道将 发送给用户节点 U, 从而用户节点得到新 的口令 /w '和 。
本发明实施例提供的用户节点变更登录口令的方法, 服务器可以通过认证用户节点旧 的口令和有效期间后生成新的有效期间和新的口令, 并通过安全信道返回给用户节点, 方 法简单可行。
实施例 3
如图 3所示, 本发明实施例提供一种网络系统, 包括:
服务器 301, 用于接收来自用户节点 302的身份信息, 选择有效期间, 根据身份信息和 有效期间生成用户节点口令, 向用户节点 302 发送包含用户节点口令和有效期间的注册信 息; 以及收到用户节点 302 的登录信息后, 根据身份信息、 登录信息参数和有效期间生成 服务器 301 会话密钥, 根据代数曲线的生成元点生成用户节点会话密钥参数, 向用户节点 302发送用户节点 302会话密钥参数; 根据服务器 301会话密钥和用户节点 302进行认证; 用户节点 302, 用于向服务器 301 发送身份信息; 在收到注册信息后, 根据用户节点 302口令和代数曲线的生成元点生成登录信息参数; 向服务器 301发送包含身份信息、登录 信息参数和有效期间的登录信息; 收到用户节点 302 会话密钥参数后, 根据收到的用户节 点 302会话密钥参数生成用户节点 302会话密钥,根据用户节点 302会话密钥和服务器 301 进行认证。
当用户节点 302和服务器 301认证通过后, 用户节点 302可以进行资源的访问。
其中, 代数曲线具体可以为椭圆曲线、 超椭圆曲线或圆锥曲线等。
本发明实施例提供的网络系统, 从实现角度上与现有技术提供的认证方案相比简单可 行, 仅需要一个代数曲线群 (如椭圆曲线群) 的构造和一个安全的哈希函数的运用, 同时 对于服务器端, 仅需要保存一个密钥, 而不需要存贮用户节点口令表, 便于维护, 增强了 安全性。 实施例 4
参见图 4, 本发明实施例还提供了一种服务器, 具体包括:
注册模块 401, 用于接收来自用户节点的身份信息, 选择有效期间, 根据身份信息和有 效期间生成用户节点口令, 向用户节点发送包含用户节点口令和有效期间的注册信息; 响应模块 402,用于在接收到用户节点的登录信息后,根据登录信息中包含的身份信息、 登录信息参数和有效期间生成服务器会话密钥, 根据代数曲线的生成元点生成用户节点会 话密钥参数, 向用户节点发送用户节点会话密钥参数;
认证模块 403, 根据所述服务器会话密钥对所述用户节点进行认证。
进一步地, 参见图 5, 本发明实施例提供的服务器还包括:
接收模块 404, 用于接收用户节点发送的身份信息、 旧的口令和有效期间;
口令更改模块 405, 用于根据自身服务器密钥、接收模块 404接收的身份信息和有效期 间生成用户节点口令, 判断生成的用户节点口令与接收模块接收的旧的用户节点口令是否
相同, 如果相同, 则选择一个新的有效期间并根据新的服务器密钥、 身份信息和新的有效 期间生成新的用户节点口令, 将新的用户节点口令和新的有效期间发送给用户节点。
本发明实施例的服务器的各个模块可以根据实际需要, 将若干个模块集成在一起。 本发明实施例的服务器可以是认证服务器、 AM (Authentication, Authorization, Accounting , 认证、 授权和记账) 服务器等。
本发明实施例提供的服务器作为服务端, 仅需要保存一个密钥, 而不需要存贮用户节 点口令表, 便可实现用户节点的认证, 便于维护, 增强了安全性。 实施例 5
参见图 6, 本发明实施例还提供了一种用户节点, 包括:
注册模块 501, 用于向服务器发送身份信息; 并接收服务器返回的携带用户节点口令和 有效期间的注册信息;
登录模块 502, 用于根据用户节点口令和代数曲线的生成元点生成登录信息参数, 向服 务器发送包含身份信息、 登录信息参数和有效期间的登录信息;
用户节点会话密钥生成模块 503, 用于接收来自服务器的用户节点会话密钥参数, 根据 收到的用户节点会话密钥参数生成用户节点会话密钥;
认证模块 504, 用于根据用户节点会话密钥对服务器进行认证。
其中, 参见图 7, 上述登录模块 502包括:
生成单元 5021, 用于选择随机数, 根据随机数和用户节点口令对代数曲线的生成元点 进行点乘运算, 生成登录信息参数;
发送单元 5022, 用于向服务器发送包含身份信息、 生成单元 5021生成的登录信息参数 和有效期间的登录信息。
认证通过后, 用户节点得到服务器的授权, 对资源进行访问。
本发明实施例的用户节点的各个模块可以根据实际需要, 将若干个模块集成在一起。 本实施例的用户节点可以是路由器、 交换机、 基站、 基站控制器、 数字用户线路接入 复用器 (DSLAM)、 归属位置寄存器 (Home Location Register, HLR)、 手机、 个人数码助 理 (Personal Digital Assistant , PDA) , 计算机、 服务器、 家用电器、 以及各种电子设 备、 网络设备或计算机相关设备等。
本发明实施例提供的用户节点, 从实现角度上与现有技术提供的认证方案相比简单可 行, 仅需要一个代数曲线群 (如椭圆曲线群等) 的构造和一个安全的哈希函数的运用, 使 用方便快捷。
综上所述, 本发明实施例提供的技术方案, 所提供的的认证设计与现有技术认证方案 相比特别简单, 仅需要一个代数曲线群 (如椭圆曲线群等) 的构造和运用一个安全的哈希 函数。 对于服务器端来讲, 由于仅需要保存一个密钥, 而不需要存贮一张用户节点口令表, 因此维护更为简单, 安全性增强。 例如, 为了达到 1024比特 RSA的强度, 椭圆曲线群的阶 只要 160比特, 因此传送的请求消息缩短。
本发明实施例所述的技术方案仅需要一个椭圆曲线群的构造和一个安全的哈希函数的 运用, 从实现角度上与以往认证方案相比简单可行; 对于服务器端, 仅需要保存一个密钥, 而不需要存贮用户节点口令表, 便于维护, 增强了安全性, 同时实现了基于口令的双向认 证; 此外, 由于本发明实施例是基于椭圆曲线构造的, 这样登录数据虽短, 但可达到较高 的安全性。 当用户节点变更登录口令时, 服务器通过认证用户节点旧的口令和有效期间后 生成新的有效期间和新的口令, 并通过安全信道返回给用户节点, 方法简单可行。 上述本 发明实施例所述的技术方案, 不仅可以作为一般认证, 还适用于网格计算平台认证。
本发明实施例是基于椭圆曲线群构造的, 也可以基于其他的代数曲线群来实现本发明 实施例所述的方法, 如基于超椭圆曲线群或圆锥曲线群等。
通过以上的实施方式的描述, 本领域的技术人员可以清楚地了解到本发明可以通过硬 件实现, 也可以可借助软件加必要的通用硬件平台的方式来实现。 基于这样的理解, 本发 明的技术方案可以以软件产品的形式体现出来, 该软件产品可以存储在一个非易失性存储 介质(可以是 CD-ROM, U盘, 移动硬盘等) 中, 包括若干指令用以使得一台计算机设备(可 以是个人计算机, 服务器, 或者网络设备等) 执行本发明各个实施例所述的方法。
以上所述仅为本发明的较佳实施例, 并不用以限制本发明, 凡在本发明的精神和原则 之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。
Claims
1. 一种认证方法, 其特征在于, 所述方法包括:
服务器接收来自用户节点的身份信息, 选择有效期间, 根据所述身份信息和有效期间 生成用户节点口令, 向所述用户节点发送包含所述用户节点口令和有效期间的注册信息; 所述服务器接收来自用户节点的登录信息, 所述登录信息包含所述身份信息、 登录信 息参数和有效期间, 其中, 所述登录信息参数为所述用户节点根据所述用户节点口令和代 数曲线的生成元点生成;
所述服务器根据所述登录信息中的身份信息、 登录信息参数和有效期间生成服务器会 话密钥, 根据代数曲线的生成元点生成用户节点会话密钥参数, 向所述用户节点发送所述 用户节点会话密钥参数; 所述用户节点会话密钥参数用于当所述用户节点收到的用户节点 会话密钥参数后, 由所述用户节点根据所述用户节点会话密钥参数生成用户节点会话密钥; 所述服务器和用户节点根据各自生成的会话密钥进行相互认证。
2. 根据权利要求 1所述的方法, 其特征在于, 所述服务器接收来自用户节点的身份信 息, 选择有效期间, 根据所述身份信息和有效期间生成用户节点口令包括:
所述服务器接收用户节点提交的身份信息, 对所述身份信息进行有效性检查; 所述服务器选择有效期间, 将所述服务器的密钥、 所述身份信息和所述有效期间连接 后进行哈希计算, 生成哈希值, 选取所述哈希值的最高 >Η立比特生成用户节点口令。
3. 根据权利要求 1所述的方法, 其特征在于, 所述用户节点根据所述用户节点口令和 代数曲线的生成元点生成登录信息参数包括:
所述用户节点选择一个群中的随机数, 将所述随机数、 用户节点口令一起对代数曲线 的生成元点进行点乘运算, 生成登录信息参数。
4. 根据权利要求 1所述的方法, 其特征在于, 所述服务器根据所述身份信息、 登录信 息参数和有效期间生成服务器会话密钥, 根据代数曲线的生成元点生成用户节点会话密钥 参数包括:
将所述服务器的密钥、 所述身份信息和所述有效期间连接后进行哈希计算, 生成哈希 值, 选取所述哈希值的最高 位比特生成用户节点口令;
将所述用户节点口令与登录信息参数进行点乘运算, 生成服务器会话密钥参数; 选择一个群中的随机数, 将所述随机数和服务器会话密钥参数进行点乘运算, 生成服 务器会话密钥;
将所述随机数和代数曲线的生成元点进行点乘运算, 生成用户节点会话密钥参数。
5. 根据权利要求 1所述的方法, 其特征在于, 所述服务器和用户节点根据各自生成的
会话密钥进行相互认证包括:
所述服务器将所述服务器会话密钥和用户节点会话密钥参数连接后进行哈希计算, 生 成第一哈希值, 将所述第一哈希值发送给所述用户节点;
所述用户节点将所述用户节点会话密钥和用户节点会话密钥参数连接后进行哈希计 算, 生成第二哈希值, 判断所述第一哈希值与所述第二哈希值是否相等, 如果相等, 所述 服务器通过认证, 并将所述用户节点会话密钥和身份信息连接后进行哈希计算, 生成第三 哈希值, 并发送给所述服务器;
所述服务器将服务器会话密钥和身份信息连接后进行哈希计算, 生成第四哈希值, 判 断所述第三哈希值与所述第四哈希值是否相等, 如果相等, 所述用户节点通过认证。
6. 根据权利要求 1所述的方法, 其特征在于, 所述方法还包括:
所述用户节点将身份信息、 旧的用户节点口令以及有效期间通过与服务器认证后建立 的安全信道发送给服务器;
所述服务器根据服务器密钥、 所述身份信息和有效期间生成用户节点口令, 判断所述 生成的用户节点口令与所述旧的用户节点口令是否相等, 如果相等, 则所述服务器选择一 个新的有效期间并根据所述新的服务器密钥、 身份信息和新的有效期间生成新的用户节点 口令, 并通过安全信道将所述新的用户节点口令和有效期间发送给用户节点。
7. 根据权利要求 1-6中任一权利要求所述的方法, 其特征在于, 所述代数曲线的类型 包括:
椭圆曲线、 或超椭圆曲线、 或圆锥曲线。
8. 一种网络系统, 其特征在于, 所述系统包括: 服务器和用户节点, 其中, 所述服务器, 用于接收来自所述用户节点的身份信息, 选择有效期间, 根据所述身份 信息和有效期间生成用户节点口令, 向所述用户节点发送包含所述用户节点口令和有效期 间的注册信息; 接收来自所述用户节点的登录信息, 根据所述登录信息中包含的身份信息、 登录信息参数和有效期间生成服务器会话密钥, 根据代数曲线的生成元点生成用户节点会 话密钥参数, 向所述用户节点发送所述用户节点会话密钥参数; 根据所述服务器会话密钥 对所述用户节点进行认证;
所述用户节点, 用于向所述服务器发送身份信息; 接收来自所述服务器的包含用户节 点口令和有效期间的注册信息, 根据所述用户节点口令和代数曲线的生成元点生成登录信 息参数; 向所述服务器发送包含所述身份信息、 登录信息参数和有效期间的登录信息; 接 收来自所述服务器的用户节点会话密钥参数, 根据所述接收到的用户节点会话密钥参数生 成用户节点会话密钥, 根据所述用户节点会话密钥对所述服务器进行认证。
9. 根据权利要求 8所述的网络系统, 其特征在于, 所述代数曲线的类型包括: 椭圆曲线、 或超椭圆曲线、 或圆锥曲线。
10. 一种服务器, 其特征在于, 包括:
注册模块, 用于接收来自用户节点的身份信息, 选择有效期间, 根据所述身份信息和 有效期间生成用户节点口令, 向所述用户节点发送包含所述用户节点口令和有效期间的注 册信息;
响应模块, 用于在接收到所述用户节点的登录信息后, 根据所述登录信息中包含的身 份信息、 登录信息参数和有效期间生成服务器会话密钥, 根据代数曲线的生成元点生成用 户节点会话密钥参数, 向所述用户节点发送所述用户节点会话密钥参数;
认证模块, 根据所述服务器会话密钥对所述用户节点进行认证。
11. 如权利要求 10所述的服务器, 所述服务器还包括:
接收模块, 用于接收用户节点发送的身份信息、 旧的口令和有效期间;
口令更改模块, 用于根据自身服务器密钥、 所述接收模块接收的身份信息和有效期间 生成所述用户节点口令, 判断所述生成的用户节点口令与所述接收模块接收的旧的用户节 点口令是否相同, 如果相同, 则选择一个新的有效期间并根据所述新的服务器密钥、 身份 信息和新的有效期间生成新的用户节点口令, 将所述新的用户节点口令和新的有效期间发 送给用户节点。
12. —种用户节点, 其特征在于, 包括:
注册模块, 用于向服务器发送身份信息; 并接收所述服务器返回的携带所述用户节点 口令和有效期间的注册信息;
登录模块, 用于根据所述用户节点口令和代数曲线的生成元点生成所述登录信息参数, 向所述服务器发送包含所述身份信息、 登录信息参数和有效期间的登录信息;
用户节点会话密钥生成模块, 用于接收来自所述服务器的所述用户节点会话密钥参数, 根据收到的所述用户节点会话密钥参数生成所述用户节点会话密钥;
认证模块, 用于根据所述用户节点会话密钥对所述服务器进行认证。
13. 如权利要求 12所述的用户节点, 其特征在于, 所述登录模块包括:
生成单元, 用于选择随机数, 根据所述随机数和用户节点口令对代数曲线的生成元点 进行点乘运算, 生成登录信息参数;
发送单元, 用于向所述服务器发送包含身份信息、 所述生成单元生成的登录信息参数 和有效期间的登录信息。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP08846871.5A EP2093927A4 (en) | 2007-10-29 | 2008-10-28 | AUTHENTICATION METHOD, SYSTEM, SERVER AND USER N UD |
US12/497,930 US8510556B2 (en) | 2007-10-29 | 2009-07-06 | Authentication method, system, server, and user node |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710176473.7A CN101425897B (zh) | 2007-10-29 | 2007-10-29 | 一种用户认证方法、系统、服务器和用户节点 |
CN200710176473.7 | 2007-10-29 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/497,930 Continuation US8510556B2 (en) | 2007-10-29 | 2009-07-06 | Authentication method, system, server, and user node |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009059535A1 true WO2009059535A1 (fr) | 2009-05-14 |
Family
ID=40616253
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2008/072863 WO2009059535A1 (fr) | 2007-10-29 | 2008-10-28 | Procédé d'authentification, système, serveur et nœud d'utilisateur |
Country Status (4)
Country | Link |
---|---|
US (1) | US8510556B2 (zh) |
EP (1) | EP2093927A4 (zh) |
CN (1) | CN101425897B (zh) |
WO (1) | WO2009059535A1 (zh) |
Families Citing this family (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7650509B1 (en) * | 2004-01-28 | 2010-01-19 | Gordon & Howard Associates, Inc. | Encoding data in a password |
US20070194881A1 (en) | 2006-02-07 | 2007-08-23 | Schwarz Stanley G | Enforcing payment schedules |
KR100901872B1 (ko) * | 2006-12-01 | 2009-06-09 | 한국전자통신연구원 | 그리드 서비스를 이용한 이종 노매딕/이동 통신 네트워크간 협업 시스템 및 그 방법 |
US9026267B2 (en) | 2007-03-09 | 2015-05-05 | Gordon*Howard Associates, Inc. | Methods and systems of selectively enabling a vehicle by way of a portable wireless device |
CN101425897B (zh) | 2007-10-29 | 2011-05-18 | 上海交通大学 | 一种用户认证方法、系统、服务器和用户节点 |
CN102378165B (zh) * | 2010-08-16 | 2014-06-11 | 中兴通讯股份有限公司 | 演进型节点b的身份认证方法及系统 |
US8918791B1 (en) * | 2011-03-10 | 2014-12-23 | Applied Micro Circuits Corporation | Method and system for queuing a request by a processor to access a shared resource and granting access in accordance with an embedded lock ID |
US8799165B2 (en) | 2012-01-11 | 2014-08-05 | Rawllin International Inc. | Electronic signature security algorithms |
CN103369526A (zh) * | 2012-03-31 | 2013-10-23 | 华为终端有限公司 | 密钥信息处理方法及设备 |
US11037147B2 (en) * | 2012-07-09 | 2021-06-15 | The Western Union Company | Money transfer fraud prevention methods and systems |
US9665997B2 (en) | 2013-01-08 | 2017-05-30 | Gordon*Howard Associates, Inc. | Method and system for providing feedback based on driving behavior |
CN103973433B (zh) * | 2013-01-31 | 2017-03-08 | 中国科学院空间科学与应用研究中心 | 一种基于计算关联成像的网络密钥分发方法及系统 |
CN103166761B (zh) * | 2013-02-05 | 2015-11-04 | 清华大学深圳研究生院 | 指纹锁及身份认证方法 |
US8928471B2 (en) | 2013-03-14 | 2015-01-06 | Gordon*Howard Associates, Inc. | Methods and systems related to remote tamper detection |
US9840229B2 (en) | 2013-03-14 | 2017-12-12 | Gordon*Howard Associates, Inc. | Methods and systems related to a remote tamper detection |
US9035756B2 (en) | 2013-03-14 | 2015-05-19 | Gordon*Howard Associates, Inc. | Methods and systems related to remote tamper detection |
US9378480B2 (en) | 2013-03-14 | 2016-06-28 | Gordon*Howard Associates, Inc. | Methods and systems related to asset identification triggered geofencing |
US20140325225A1 (en) * | 2013-04-27 | 2014-10-30 | Quantron Inc. | Self-authenticated method with timestamp |
US9013333B2 (en) | 2013-06-24 | 2015-04-21 | Gordon*Howard Associates, Inc. | Methods and systems related to time triggered geofencing |
KR101516881B1 (ko) * | 2013-09-23 | 2015-05-04 | 숭실대학교산학협력단 | 사용자 인증 방법 및 장치 |
US20150227733A1 (en) * | 2014-02-10 | 2015-08-13 | Hyundai Motor Company | Automatic login system and automatic login method |
CN103905437B (zh) * | 2014-03-22 | 2017-02-22 | 哈尔滨工程大学 | 一种基于口令的远程认证协议方法 |
CN105812124A (zh) * | 2014-12-31 | 2016-07-27 | 环达电脑(上海)有限公司 | 密码生成方法和密码验证方法 |
US9701279B1 (en) | 2016-01-12 | 2017-07-11 | Gordon*Howard Associates, Inc. | On board monitoring device |
CN106096379A (zh) * | 2016-06-29 | 2016-11-09 | 浪潮电子信息产业股份有限公司 | 一种计算节点的安全加固的方法及装置 |
CN107506602A (zh) * | 2017-09-07 | 2017-12-22 | 北京海融兴通信息安全技术有限公司 | 一种大数据健康预测系统 |
US11025425B2 (en) | 2018-06-25 | 2021-06-01 | Elasticsearch B.V. | User security token invalidation |
US11223626B2 (en) | 2018-06-28 | 2022-01-11 | Elasticsearch B.V. | Service-to-service role mapping systems and methods |
US11196554B2 (en) * | 2018-07-27 | 2021-12-07 | Elasticsearch B.V. | Default password removal |
CN109347626B (zh) * | 2018-09-03 | 2021-05-25 | 杭州电子科技大学 | 一种具有反跟踪特性的安全身份认证方法 |
US11023598B2 (en) | 2018-12-06 | 2021-06-01 | Elasticsearch B.V. | Document-level attribute-based access control |
CN109347887B (zh) * | 2018-12-17 | 2021-04-30 | 郑州云海信息技术有限公司 | 一种身份认证的方法及装置 |
CN110890962B (zh) * | 2019-12-20 | 2021-04-13 | 支付宝(杭州)信息技术有限公司 | 认证密钥协商方法、装置、存储介质及设备 |
JP7451738B2 (ja) * | 2020-02-29 | 2024-03-18 | ホアウェイ・テクノロジーズ・カンパニー・リミテッド | 鍵更新方法および関連装置 |
CN111818015A (zh) * | 2020-06-10 | 2020-10-23 | 胡全生 | 一种适用于远程节点访问的安全保护系统 |
CN114065171B (zh) * | 2021-11-11 | 2022-07-08 | 北京海泰方圆科技股份有限公司 | 一种身份认证方法、装置、系统、设备及介质 |
CN115828200B (zh) * | 2022-11-03 | 2023-08-25 | 广州市迪声音响有限公司 | 一种动态均衡增益参数的可视化曲线界面系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427609A (zh) * | 2001-12-20 | 2003-07-02 | 西北工业大学 | 一次性口令及交易认证方法 |
JP2005165631A (ja) * | 2003-12-02 | 2005-06-23 | Sony Corp | 情報処理システム、情報処理装置および方法、並びにプログラム |
US20060069921A1 (en) * | 2004-07-15 | 2006-03-30 | Allan Camaisa | System and method for blocking unauthorized network log in using stolen password |
CN1980127A (zh) * | 2005-12-08 | 2007-06-13 | 中国银联股份有限公司 | 口令认证系统及口令认证方法 |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09252323A (ja) * | 1996-01-11 | 1997-09-22 | Sony Corp | 通信システムおよび通信装置 |
US5737424A (en) * | 1996-06-04 | 1998-04-07 | Software Security, Inc. | Method and system for secure distribution of protected data using elliptic curve systems |
US6119229A (en) * | 1997-04-11 | 2000-09-12 | The Brodia Group | Virtual property system |
GB9709136D0 (en) * | 1997-05-02 | 1997-06-25 | Certicom Corp | A log-on verification protocol |
CA2255285C (en) * | 1998-12-04 | 2009-10-13 | Certicom Corp. | Enhanced subscriber authentication protocol |
US6446205B1 (en) * | 1998-12-10 | 2002-09-03 | Citibank, N.A. | Cryptosystems with elliptic curves chosen by users |
US6757825B1 (en) * | 1999-07-13 | 2004-06-29 | Lucent Technologies Inc. | Secure mutual network authentication protocol |
US6802000B1 (en) * | 1999-10-28 | 2004-10-05 | Xerox Corporation | System for authenticating access to online content referenced in hardcopy documents |
US7096354B2 (en) * | 2000-08-04 | 2006-08-22 | First Data Corporation | Central key authority database in an ABDS system |
FI115098B (fi) * | 2000-12-27 | 2005-02-28 | Nokia Corp | Todentaminen dataviestinnässä |
US7246238B2 (en) * | 2001-01-25 | 2007-07-17 | Schlumberger Omnes, Inc. | System and method for providing integration via a dial-up interface |
US20030065956A1 (en) * | 2001-09-28 | 2003-04-03 | Abhijit Belapurkar | Challenge-response data communication protocol |
US7024548B1 (en) * | 2003-03-10 | 2006-04-04 | Cisco Technology, Inc. | Methods and apparatus for auditing and tracking changes to an existing configuration of a computerized device |
CN1774687A (zh) * | 2003-04-14 | 2006-05-17 | 松下电器产业株式会社 | 使用挑战响应原理的客户端服务器鉴别 |
CN1444169A (zh) * | 2003-04-23 | 2003-09-24 | 浙江大学 | 一种椭圆曲线上基于公钥证书的身份认证方法 |
US7895436B2 (en) * | 2003-10-28 | 2011-02-22 | The Foundation For The Promotion Of Industrial Science | Authentication system and remotely-distributed storage system |
US7373509B2 (en) * | 2003-12-31 | 2008-05-13 | Intel Corporation | Multi-authentication for a computing device connecting to a network |
US7694335B1 (en) * | 2004-03-09 | 2010-04-06 | Cisco Technology, Inc. | Server preventing attacks by generating a challenge having a computational request and a secure cookie for processing by a client |
US7606918B2 (en) * | 2004-04-27 | 2009-10-20 | Microsoft Corporation | Account creation via a mobile device |
WO2006084183A1 (en) * | 2005-02-04 | 2006-08-10 | Qualcomm Incorporated | Secure bootstrapping for wireless communications |
CN1925390A (zh) * | 2005-11-17 | 2007-03-07 | 胡玉莲 | 实用不可展的公钥加密系统 |
CN101425897B (zh) | 2007-10-29 | 2011-05-18 | 上海交通大学 | 一种用户认证方法、系统、服务器和用户节点 |
-
2007
- 2007-10-29 CN CN200710176473.7A patent/CN101425897B/zh not_active Expired - Fee Related
-
2008
- 2008-10-28 EP EP08846871.5A patent/EP2093927A4/en not_active Withdrawn
- 2008-10-28 WO PCT/CN2008/072863 patent/WO2009059535A1/zh active Application Filing
-
2009
- 2009-07-06 US US12/497,930 patent/US8510556B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427609A (zh) * | 2001-12-20 | 2003-07-02 | 西北工业大学 | 一次性口令及交易认证方法 |
JP2005165631A (ja) * | 2003-12-02 | 2005-06-23 | Sony Corp | 情報処理システム、情報処理装置および方法、並びにプログラム |
US20060069921A1 (en) * | 2004-07-15 | 2006-03-30 | Allan Camaisa | System and method for blocking unauthorized network log in using stolen password |
CN1980127A (zh) * | 2005-12-08 | 2007-06-13 | 中国银联股份有限公司 | 口令认证系统及口令认证方法 |
Non-Patent Citations (1)
Title |
---|
LIU JUN ET AL.: "AN AUTHENTICATION PROTOCOL WITHOUT VALIDATING TABLE BASED ON ELLIPSE CURVE", NETWORK & COMPUTER SECURITY, 28 February 2007 (2007-02-28), pages 9 - 10 * |
Also Published As
Publication number | Publication date |
---|---|
EP2093927A4 (en) | 2013-10-09 |
CN101425897A (zh) | 2009-05-06 |
EP2093927A1 (en) | 2009-08-26 |
US20090271624A1 (en) | 2009-10-29 |
US8510556B2 (en) | 2013-08-13 |
CN101425897B (zh) | 2011-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009059535A1 (fr) | Procédé d'authentification, système, serveur et nœud d'utilisateur | |
CN108111301B (zh) | 基于后量子密钥交换实现ssh协议的方法及其系统 | |
JP4527358B2 (ja) | 鍵供託を使用しない、認証された個別暗号システム | |
Chen et al. | A robust mutual authentication protocol for wireless sensor networks | |
JP5201136B2 (ja) | 匿名認証システムおよび匿名認証方法 | |
JP3864249B2 (ja) | 暗号通信システム、その端末装置及びサーバ | |
Wang et al. | Ultra super fast authentication protocol for electric vehicle charging using extended chaotic maps | |
US20150319149A1 (en) | Cryptographic method and system for secure authentication and key exchange | |
Tang et al. | Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol | |
Xie et al. | Cryptanalysis and security enhancement of a robust two‐factor authentication and key agreement protocol | |
Ma et al. | Distributed access control with adaptive privacy preserving property for wireless sensor networks | |
He et al. | Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards. | |
CN107395627B (zh) | 一种基于单向函数的轻量级认证协议 | |
Goyal | How to re-initialize a hash chain | |
US8954728B1 (en) | Generation of exfiltration-resilient cryptographic keys | |
Braeken | PUF‐Based Authentication and Key Exchange for Internet of Things | |
Zahednejad et al. | A Lightweight, Secure Big Data‐Based Authentication and Key‐Agreement Scheme for IoT with Revocability | |
Lee et al. | Communication-efficient three-party protocols for authentication and key agreement | |
Hwang et al. | A new efficient authentication protocol for mobile networks | |
Pal et al. | Diffie-Hellman key exchange protocol with entities authentication | |
Chhikara et al. | Construction of elliptic curve cryptography‐based authentication protocol for internet of things | |
Wu et al. | ID-based remote authentication with smart cards on open distributed system from elliptic curve cryptography | |
Al-Attab et al. | Authentication scheme for insecure networks in cloud computing | |
Hsu et al. | Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map | |
Mangipudi et al. | Authentication and Key Agreement Protocols Preserving Anonymity. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2008846871 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08846871 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |