WO2011075906A1 - Method for achieving public key acquisition, certificate validation and authentication of entity - Google Patents

Method for achieving public key acquisition, certificate validation and authentication of entity Download PDF

Info

Publication number
WO2011075906A1
WO2011075906A1 PCT/CN2009/076044 CN2009076044W WO2011075906A1 WO 2011075906 A1 WO2011075906 A1 WO 2011075906A1 CN 2009076044 W CN2009076044 W CN 2009076044W WO 2011075906 A1 WO2011075906 A1 WO 2011075906A1
Authority
WO
WIPO (PCT)
Prior art keywords
entity
public key
message
authentication
certificate
Prior art date
Application number
PCT/CN2009/076044
Other languages
French (fr)
Chinese (zh)
Inventor
铁满霞
曹军
赖晓龙
黄振海
Original Assignee
西安西电捷通无线网络通信股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安西电捷通无线网络通信股份有限公司 filed Critical 西安西电捷通无线网络通信股份有限公司
Priority to PCT/CN2009/076044 priority Critical patent/WO2011075906A1/en
Publication of WO2011075906A1 publication Critical patent/WO2011075906A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Definitions

  • the present invention relates to the field of network security technologies, and in particular, to a method for implementing public key acquisition, certificate verification, and authentication of an entity.
  • entity authentication or one-way authentication or two-way authentication, between the user and the network must be completed before the user logs into the network for secure communication.
  • the authentication mechanisms used generally fall into two categories: based on symmetric key algorithms and based on public key (asymmetric key) algorithms.
  • the authentication mechanism based on public key algorithm and technology requires that the participant entity must have a pair of keys, namely public and private key pairs, where the public key needs to be notified to other participant entities.
  • the available notification methods are the out-of-band notification method and the certificate method.
  • the out-of-band notification method is less used because it is difficult to update, and the certificate method is widely used.
  • the entity authentication method using public key certificates generally needs to be based on a public key infrastructure.
  • the public key infrastructure is a universal security infrastructure that implements and provides security services by using the concepts and technologies of public keys. Provide security services such as authentication, integrity, confidentiality, and more.
  • Two important concepts in public key infrastructure are public key certificates and certificate authorities.
  • Public key certificates are usually issued by the certificate authority.
  • the signature in the public key certificate is provided by the certificate authority.
  • the certificate authority verifies the public key certificate by providing a signature. The binding relationship between the holder and the holder's public key.
  • a public key certificate that has been verified by a certificate authority usually has a lifetime, and the certificate fails after the end of the lifetime. If the private key corresponding to the public key certificate is leaked, the public key certificate also fails. There are also other cases where the public key certificate is invalidated, such as a job change that causes it to fail.
  • Entities participating in authentication in network communications typically refuse to establish secure communications with entities holding expired public key certificates, so public key acquisition and certificate verification typically surround and provide services for the entity authentication process.
  • the existing authentication mechanism must have a valid public key of the claimant or know the public key certificate status of the claimant before or during the operation. Otherwise, the authentication process may be damaged or cannot be successfully completed.
  • entity A and entity B need to complete the authentication between them by performing an authentication protocol.
  • Trusted third party (TP) is a third-party entity trusted by entity A and entity B, and entity A and Entity B must be obtained by a trusted third party TP prior to authentication The status of the effective public key or public key certificate of the end entity.
  • CRL Download Certificate Revocation List CRL (Certificate Revocation List) to obtain the status of the public key certificate, including all certificate list downloads and incremental certificate list downloads.
  • CRL Download Certificate Revocation List CRL (Certificate Revocation List) to obtain the status of the public key certificate, including all certificate list downloads and incremental certificate list downloads.
  • an entity needs to verify the status of a public key certificate, it downloads the latest certificate revocation list from the server and then checks if the public key certificate that needs to be verified is in the latest certificate revocation list CRL.
  • Online Certificate Status Protocol OCSP
  • client and server It is a typical client/server architecture. The client sends a request to the server and the server returns a response. The request contains a series of certificates that need to be verified. The response contains the status of the series certificate and the full certificate interval.
  • the network structure is the access network of the user, the access point, and the server ternary structure.
  • the entity authentication mechanism is usually implemented to implement the user access control function. Before the authentication mechanism is successfully completed, the user is prohibited from accessing the network. Therefore, the user cannot use the certificate revocation list CRL or the online certificate status protocol before authentication. Methods such as OCSP verify the validity of the access point certificate or obtain a valid public key for the access point. Therefore, if you want to complete the authentication completely successfully, you can only rely on the user to complete the authentication and establish the network communication, such as IEEE 802.
  • Hi and IEEE 802.16 Key Management PKM (Privacy Key Management) protocol, that is, afterwards Get the status of a valid public or public key certificate for the access point. Whether obtaining the status of a valid public key or public key certificate of the opposite entity in advance or afterwards, the process of obtaining the valid public key and the public key certificate is separated into two separate processes, which is not conducive to improving the protocol execution. Efficiency, even in some application environments, introduces unsafe factors that affect the authenticity of the authentication.
  • the user is also difficult to use the certificate revocation list CRL, the online certificate status protocol OCSP, etc. in the process of authentication.
  • the user equipment may have limited storage resources, or the user is not willing to store the certificate revocation list CRL, which may result in the periodic download certificate revocation list CRL being impossible.
  • the access network there may be problems such as policy restrictions on the access network.
  • the user uses the online query mechanism such as the online certificate status protocol OCSP, the user needs to execute a separate online certificate status protocol OSCP and other protocols through the background server. These protocols often Running on the HTTP protocol, belonging to the application layer protocol, it is very complicated to use these protocols directly before the authentication of the access network has not been completed. Even if it can be used, it needs to be completed by the structure of the user-server and the access point-server. It does not conform to the structure of the user-in-one server, and cannot be directly and conveniently applied.
  • the present invention solves the above technical problems existing in the background art, and proposes a method for realizing public key acquisition, certificate verification and authentication of an entity.
  • the technical solution of the present invention is:
  • the present invention is a method for realizing public key acquisition, certificate verification and authentication of an entity, including:
  • Entity B sends message 2 to entity A, message 2 includes random number R B , request ReqB and optional text
  • the entity A After receiving the message 2, the entity A sends a message 3 to the trusted third party TP, and the message 3 includes the identity ID A , the request ReqAT, and the optional text Text4;
  • the trusted third party determines to respond to RepTA and returns a message 4 to entity A, which includes a response RepTA and an optional text Text5;
  • the entity A After receiving the message 4 from the trusted third party TP, the entity A returns a message 5 to the entity B, and the message 5 includes the token TokenAB and the response RepB;
  • the entity B After receiving the message 5 from the entity A, the entity B performs processing to obtain the authentication result of the entity A.
  • the trusted third party TP after receiving the message 3, the method comprising determining a response RepTA: The effectiveness of the active public identity ID A of the entity A, the public key certificate Cert Control A check or by the entity distinguishing identifier A search for the entity A key.
  • the processing of the message 5 by the entity B includes:
  • Entity A sends message 1 to entity B, message 1 includes random number R A , identity ID A and optional text Text 1; entity B receives message 1.
  • the message 2 includes a token TokenBA, an identity ID B , a request ReqB, and an optional text Text3.
  • the trusted third party TP determines that the method for responding to the RepTA includes: checking the validity of the public key certificates Cert A and Cert B according to the identity IDs A and ID B of the entity A and the entity B;
  • the processing steps of the entity A for the message 4 include:
  • the processing steps of the entity B to the message 5 include:
  • the response RepB is verified according to the public key authentication protocol or the distribution protocol used, and the state of the public key or the public key certificate of the entity A is obtained if the verification is passed, and the signature of the entity A included in the token TokenAB is verified. Then, it is checked whether the identity field ID B included in the signature data of the token TokenAB is consistent with the identity field of the entity B, and whether the random number R B sent to the entity A in step 1) is included in the token TokenAB The random numbers R B are identical, and the identification result of the entity A is obtained.
  • the ReqB and the ReqAT are respectively a request generated by the entity B and the entity A, requesting the original public information of the valid public key or the public key certificate of the opposite entity; and the RepTA and the RepB are responses generated for requesting the ReqAT and the ReqB, respectively.
  • the form and definition of the ReqB, ReqAT, RepTA, and RepB are determined according to a public key authentication protocol or a distribution protocol that is specifically used, which is a certificate status protocol or a server-based certificate verification protocol.
  • the ReqTA is equal to ReqB, and RepTA is equal to RepB.
  • the ReqTA contains the content of ReqB
  • the RepTA contains the content of RepB.
  • the present invention employs a three-entity framework.
  • Entity A and entity B need to obtain a public key or certificate of a trusted third party before authentication, and obtain a user certificate issued by a trusted third party or give their public key to be trusted.
  • the third party keeps the state without knowing the status of the valid public key or public key certificate of the opposite entity in advance.
  • Ben The invention integrates the entity's public key acquisition, certificate verification and authentication functions in one protocol, which is beneficial to improve the efficiency and effect of protocol execution, and is convenient for combination with various public key acquisition and public key certificate status query protocols.
  • the network user's wife enters the network structure of a server to meet the authentication requirements of the access network.
  • 1 is a schematic diagram of the operation of the authentication mechanism in the prior art
  • FIG. 2 is a schematic diagram of a method according to Embodiment 1 of the present invention.
  • FIG. 3 is a schematic diagram of a method according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic diagram of a method according to Embodiment 3 of the present invention.
  • the method of the invention involves three security elements, namely two entities ⁇ and ⁇ and a trusted third party TP, through the online trusted third party TP, the entity A and B complete the authentication, and obtain the effective of the peer entity The status of the public or public key certificate.
  • Entity A or B is represented by entity X; then R x represents a random number generated by entity X; Cert x is a public key certificate of entity X; ID X is an identity of entity X, represented by certificate Certx or entity identifier X; ReqX represents the request generated by the entity X, requesting the status of the valid public key or the public key certificate of the opposite entity; ReqXT represents the request generated by the entity X or forwarded to the trusted third party TP; RepX represents the entity to the ReqX
  • the response sent by X that is, information such as the status of the valid public key or public key certificate of the entity requested by the entity X; RepTX indicates the response generated by the trusted third party TP for ReqXT; Token is the token field; Text is Optional text field.
  • ID A A or CertA
  • ID B B or CertB
  • ReqB, ReqAT, RepTA, and RepB are determined according to the specific public key authentication protocol or distribution protocol.
  • These online public key authentication protocols or distribution protocols include certificate status protocols (see GB/T 19713) and server-based certificate verification protocols ( See IETF RFC5055) or other public key distribution or verification protocols.
  • Entity A sends message 1 to entity B, message 1 includes random number R A , identity ID A And optional text Textl;
  • the entity A After receiving the message 2, the entity A sends a message 3 to the trusted third party TP.
  • the message 3 includes the request ReqAT and the optional text Text4, wherein the ReqAT needs to contain the content of the ReqB, and the request ReqAT indicates that the entity B requests the effective public of the entity A.
  • Information such as the status of the key or public key certificate, and information such as the status of the valid public key or public key certificate of entity B requesting entity B;
  • the trusted third party TP After receiving the message 3, the trusted third party TP checks the validity of the public key certificates Cert A and Cert B according to the identity IDs A and ID B of the entity A and the entity B, or searches for entities through the entity identifiers A and B.
  • the valid public key of A and entity B is determined to respond to RepTA, where RepTA needs to include the content of RepB, indicating the status of the valid public key or public key certificate of entity A determined by the trusted third party TP, and the effective public of entity B.
  • Information such as the status of the key or public key certificate, perform step 5);
  • step 6.2 After entity A receives the message from the trusted third party TP 4, the following steps are completed: 6.1) verifying the response RepTA according to the public key authentication protocol or distribution protocol used, and if the verification is passed, proceeding to step 6.2);
  • step 8.2 Verify the response RepB according to the public key authentication protocol or distribution protocol used, if the verification passes Then proceed to step 8.2);
  • steps 7) and 8) may be omitted on the basis of the two-way authentication process, and some fields in messages 1 through 5 may also be omitted.
  • step 1) may be omitted on the basis of the two-way authentication process, and some fields in message 2 to message 5 may also be omitted, and the specific working process thereof may be omitted. as follows:
  • the entity B sends a message 2 to the entity A, the message 2 includes a random number R B , a request ReqB and an optional text Text3, wherein the request ReqB indicates that the entity B requests the peer entity, that is, the state of the valid public key or the public key certificate of the entity A.
  • Information includes a random number R B , a request ReqB and an optional text Text3, wherein the request ReqB indicates that the entity B requests the peer entity, that is, the state of the valid public key or the public key certificate of the entity A.
  • the entity A After receiving the message 2, the entity A sends a message 3 to the trusted third party TP, and the message 3 includes the identity ID A , the request ReqAT, and the optional text Text4, where ReqAT is equal to ReqB, indicating that the entity B requests the valid public entity A.
  • Information such as the status of the key or public key certificate;
  • the trusted third party TP after receiving the message 3, depending on the effectiveness identity ID A of the entity A, checking or public key certificate Cert Control A valid public key of the entity A symbol A search by distinguishing the entity, determine a response
  • RepTA where RepTA is equal to RepB, and RepB is information indicating the status of the valid public key or public key certificate of the entity A determined by the trusted third party TP, and performing step 5);
  • step 8.2 Verify the response RepB according to the public key authentication protocol or distribution protocol used, if the verification passes Then proceed to step 8.2);

Abstract

A method for achieving public key acquisition, certificate validation and authentication of an entity is provided, and the method adopts the framework of three entities. Before the authentication, an entity A and an entity B need to acquire the public key or the certificate of a trusted third party, and acquire user certificates issued by the trusted third party to them or commit their public keys to the trusted third party's safekeeping without knowing the valid public key or the state of the public key certificate of the entity at the opposite end in advance. The method fuses the functions of the public key acquisition, certificate validation and authentication of the entity in one protocol and accomplishes them, thereby helping the enhancement of the execution efficiency and the effect of the protocol and facilitating the combination with various public key acquisition and public key certificate state enquiry protocols. The method suits with a user-access point-server network structure of the access network and meets the authentication requirement of the access network.

Description

一种实现实体的公钥获取、 证书验证及鉴别的方法 技术领域  Method for realizing public key acquisition, certificate verification and authentication of an entity
本发明涉及网络安全技术领域, 尤其涉及一种实现实体的公钥获取、证书 验证及鉴别的方法。  The present invention relates to the field of network security technologies, and in particular, to a method for implementing public key acquisition, certificate verification, and authentication of an entity.
背景技术 Background technique
在目前的计算机网络和通信网络中, 当用户登录网络进行安全通信前, 必 须完成用户和网络之间的实体鉴别,或单向鉴别或双向鉴别。使用的鉴别机制 一般分为两类: 基于对称密钥算法和基于公钥 (非对称密钥) 算法。  In current computer networks and communication networks, entity authentication, or one-way authentication or two-way authentication, between the user and the network must be completed before the user logs into the network for secure communication. The authentication mechanisms used generally fall into two categories: based on symmetric key algorithms and based on public key (asymmetric key) algorithms.
基于公钥算法和技术的鉴别机制要求参与者实体必须具有一对密钥,即公 私钥对, 其中公钥需通知给其他的参与者实体。可用的通知方式有带外通知方 式和证书方式, 其中带外通知方式由于难于更新而较少使用,证书方式则应用 广泛。  The authentication mechanism based on public key algorithm and technology requires that the participant entity must have a pair of keys, namely public and private key pairs, where the public key needs to be notified to other participant entities. The available notification methods are the out-of-band notification method and the certificate method. The out-of-band notification method is less used because it is difficult to update, and the certificate method is widely used.
釆用公钥证书的实体鉴别方法一般需基于公钥基础设施,公钥基础设施是 一种利用公钥的概念与技术来实施和提供安全服务的、具有普适性的安全基础 设施, 它可以提供鉴别、 完整性、 机密性等安全服务。 公钥基础设施中很重要 的两个概念就是公钥证书和证书权威, 其中公钥证书通常由证书权威颁发,公 钥证书中的签名由证书权威提供,证书权威通过提供签名来证实公钥证书持有 者和该持有者公钥的绑定关系。  The entity authentication method using public key certificates generally needs to be based on a public key infrastructure. The public key infrastructure is a universal security infrastructure that implements and provides security services by using the concepts and technologies of public keys. Provide security services such as authentication, integrity, confidentiality, and more. Two important concepts in public key infrastructure are public key certificates and certificate authorities. Public key certificates are usually issued by the certificate authority. The signature in the public key certificate is provided by the certificate authority. The certificate authority verifies the public key certificate by providing a signature. The binding relationship between the holder and the holder's public key.
经过证书权威证实的公钥证书通常存在生命期, 在生命期结束后证书失 效。 如果公钥证书所对应的私钥泄漏, 则该公钥证书也失效。 此外还存在一些 其他使公钥证书失效的情况, 比如工作变动导致其失效等。  A public key certificate that has been verified by a certificate authority usually has a lifetime, and the certificate fails after the end of the lifetime. If the private key corresponding to the public key certificate is leaked, the public key certificate also fails. There are also other cases where the public key certificate is invalidated, such as a job change that causes it to fail.
在网络通信中参与鉴别的实体通常会拒绝与持有失效公钥证书的实体建 立安全通信, 因此公钥获取和证书验证通常围绕实体鉴别过程并为之提供服 务。 目前现有的鉴别机制在运行之前或运行当中,验证者必须具有声称者的有 效公开密钥或者知晓声称者的公钥证书状态,否则鉴别过程会受到损害或不能 成功完成。 如图 1所示, 其中实体 A和实体 B需要通过执行鉴别协议完成它 们之间的鉴别, 可信第三方 TP ( Trusted third Party )为实体 A和实体 B信任 的第三方实体,且实体 A和实体 B必须在鉴别之前通过可信第三方 TP获得对 端实体的有效公钥或公钥证书的状态。 Entities participating in authentication in network communications typically refuse to establish secure communications with entities holding expired public key certificates, so public key acquisition and certificate verification typically surround and provide services for the entity authentication process. Currently, the existing authentication mechanism must have a valid public key of the claimant or know the public key certificate status of the claimant before or during the operation. Otherwise, the authentication process may be damaged or cannot be successfully completed. As shown in Figure 1, entity A and entity B need to complete the authentication between them by performing an authentication protocol. Trusted third party (TP) is a third-party entity trusted by entity A and entity B, and entity A and Entity B must be obtained by a trusted third party TP prior to authentication The status of the effective public key or public key certificate of the end entity.
目前获取公钥证书的状态通常使用以下两种方式:  Currently, the status of obtaining a public key certificate is usually in two ways:
1 ) CRL: 下载证书吊销列表 CRL ( Certificate Revocation List )获取公钥 证书的状态, 包括全部的证书列表下载和增量证书列表下载。 某个实体需要验 证某个公钥证书的状态时,从服务器下载最新的证书吊销列表, 然后检查需要 验证的公钥证书是否在最新的证书吊销列表 CRL中。  1) CRL: Download Certificate Revocation List CRL (Certificate Revocation List) to obtain the status of the public key certificate, including all certificate list downloads and incremental certificate list downloads. When an entity needs to verify the status of a public key certificate, it downloads the latest certificate revocation list from the server and then checks if the public key certificate that needs to be verified is in the latest certificate revocation list CRL.
2 )在线查询获取公钥证书的状态。例如:在线证书状态协议 OCSP ( Online Certificate Status Protocol )。在线证书状态协议 OCSP主要涉及客户端和服务器 两个实体, 是一种典型的客户端 /服务器结构。 客户端向服务器发送请求, 服 务器返回响应。请求中包含需要验证的系列证书, 响应中包含系列证书的状态 和马全证间隔。  2) Online query to obtain the status of the public key certificate. For example: Online Certificate Status Protocol (OCSP). Online Certificate Status Protocol OCSP mainly involves two entities, client and server. It is a typical client/server architecture. The client sends a request to the server and the server returns a response. The request contains a series of certificates that need to be verified. The response contains the status of the series certificate and the full certificate interval.
事先获得对端实体的有效公钥或公钥证书状态,这一保障需求条件在很多 应用环境下都得不到满足, 比如在网络结构是用户、接入点、 服务器三元结构 的接入网络中, 包含大多数的通信网络,通常釆用实体鉴别机制实现用户接入 控制功能, 在鉴别机制成功完成前, 禁止用户访问网络, 因而在鉴别之前用户 无法使用证书吊销列表 CRL、 在线证书状态协议 OCSP等方法验证接入点证 书的有效性或获得接入点的有效公钥。 因此想彻底成功地完成鉴别, 只能依赖 用户在完成鉴别、已经建立网络通信后再进行验证,例如 IEEE 802. Hi和 IEEE 802.16(e)中密钥管理 PKM (Privacy Key Management)协议, 即事后获得接入点 的有效公钥或公钥证书的状态。不论是事前获得还是事后获得对端实体的有效 公钥或公钥证书的状态 ,均将鉴别过程与获得有效公钥和公钥证书状态的过程 分隔成两个单独的过程, 不利于提高协议执行效率,甚至在某些应用环境中会 引入不安全的因素, 影响鉴别的真实性。  Obtaining the status of the effective public key or public key certificate of the peer entity in advance, this guarantee requirement condition cannot be satisfied in many application environments, for example, the network structure is the access network of the user, the access point, and the server ternary structure. Including most communication networks, the entity authentication mechanism is usually implemented to implement the user access control function. Before the authentication mechanism is successfully completed, the user is prohibited from accessing the network. Therefore, the user cannot use the certificate revocation list CRL or the online certificate status protocol before authentication. Methods such as OCSP verify the validity of the access point certificate or obtain a valid public key for the access point. Therefore, if you want to complete the authentication completely successfully, you can only rely on the user to complete the authentication and establish the network communication, such as IEEE 802. Hi and IEEE 802.16 (e) Key Management PKM (Privacy Key Management) protocol, that is, afterwards Get the status of a valid public or public key certificate for the access point. Whether obtaining the status of a valid public key or public key certificate of the opposite entity in advance or afterwards, the process of obtaining the valid public key and the public key certificate is separated into two separate processes, which is not conducive to improving the protocol execution. Efficiency, even in some application environments, introduces unsafe factors that affect the authenticity of the authentication.
另, 在某些应用中, 用户在进行鉴别的过程中, 也难于使用证书吊销列表 CRL、 在线证书状态协议 OCSP等方式。 首先用户设备可能存储资源有限、 或 者用户根本不愿意存储证书吊销列表 CRL, 导致周期下载证书吊销列表 CRL 无法实现。接入网络虽然不存在资源限制, 然而接入网络可能存在政策限制等 问题。 其次, 当用户使用在线证书状态协议 OCSP等在线查询机制时, 用户需 要通过后台服务器执行单独的在线证书状态协议 OSCP等协议,这些协议往往 运行在 HTTP协议上, 属于应用层的协议, 在接入网络的鉴别尚未完成之前, 直接使用这些协议将非常复杂。 即使能够使用,也需要通过用户一服务器和接 入点一服务器的结构完成, 不符合用户 入点一服务器这种结构, 无法直接 的方便的应用。 In addition, in some applications, the user is also difficult to use the certificate revocation list CRL, the online certificate status protocol OCSP, etc. in the process of authentication. First, the user equipment may have limited storage resources, or the user is not willing to store the certificate revocation list CRL, which may result in the periodic download certificate revocation list CRL being impossible. Although there is no resource limitation in the access network, there may be problems such as policy restrictions on the access network. Secondly, when the user uses the online query mechanism such as the online certificate status protocol OCSP, the user needs to execute a separate online certificate status protocol OSCP and other protocols through the background server. These protocols often Running on the HTTP protocol, belonging to the application layer protocol, it is very complicated to use these protocols directly before the authentication of the access network has not been completed. Even if it can be used, it needs to be completed by the structure of the user-server and the access point-server. It does not conform to the structure of the user-in-one server, and cannot be directly and conveniently applied.
发明内容 Summary of the invention
本发明为解决背景技术中存在的上述技术问题,而提出一种实现实体的公 钥获取、 证书验证和鉴别为一体的方法。  The present invention solves the above technical problems existing in the background art, and proposes a method for realizing public key acquisition, certificate verification and authentication of an entity.
本发明的技术解决方案是: 本发明为一种实现实体的公钥获取、证书验证 及鉴别的方法, 包括:  The technical solution of the present invention is: The present invention is a method for realizing public key acquisition, certificate verification and authentication of an entity, including:
实体 B向实体 A发送消息 2 , 消息 2包括随机数 RB、 请求 ReqB及可选文本Entity B sends message 2 to entity A, message 2 includes random number R B , request ReqB and optional text
Text3; Text3;
实体 A收到消息 2后, 向可信第三方 TP发送消息 3 , 消息 3包括身份标 识 IDA、 请求 ReqAT和可选文本 Text4; After receiving the message 2, the entity A sends a message 3 to the trusted third party TP, and the message 3 includes the identity ID A , the request ReqAT, and the optional text Text4;
可信第三方 TP收到消息 3后,确定响应 RepTA,并向实体 A返回消息 4, 消息 4包括响应 RepTA和可选文本 Text5;  After receiving the message 3, the trusted third party determines to respond to RepTA and returns a message 4 to entity A, which includes a response RepTA and an optional text Text5;
实体 A收到到来自可信第三方 TP的消息 4后, 向实体 B返回消息 5 , 消 息 5包括权标 TokenAB和响应 RepB;  After receiving the message 4 from the trusted third party TP, the entity A returns a message 5 to the entity B, and the message 5 includes the token TokenAB and the response RepB;
实体 B收到来自实体 A的消息 5后,进行处理,得到实体 A的鉴别结果。 所述可信第三方 TP收到消息 3后, 确定响应 RepTA的方法包括: 根据实体 A的身份标识 IDA, 检查公钥证书 CertA的有效性或通过实体区 分符 A搜索实体 A的有效公钥。 After receiving the message 5 from the entity A, the entity B performs processing to obtain the authentication result of the entity A. The trusted third party TP after receiving the message 3, the method comprising determining a response RepTA: The effectiveness of the active public identity ID A of the entity A, the public key certificate Cert Control A check or by the entity distinguishing identifier A search for the entity A key.
所述实体 B对消息 5的处理包括:  The processing of the message 5 by the entity B includes:
根据使用的公钥验证协议或分发协议来验证响应 RepB, 若验证通过则获 得实体 A的公钥或公钥证书的状态,验证包含在权标 TokenAB中的实体 A的 签名,检查所述消息 2中的随机数 RB是否与包含在权标 TokenAB中的随机数 RB相一致, 得到实体 A的鉴别结果。 Verifying the response RepB according to the public key authentication protocol or distribution protocol used, and obtaining the state of the public key or public key certificate of the entity A if the verification is passed, verifying the signature of the entity A included in the token TokenAB, and checking the message 2 whether the random number R B contained in the token TokenAB in the random number R B are consistent, the entity a to obtain the results of discrimination.
在所述实体 B向实体 A发送消息 2之前还包括:  Before the entity B sends the message 2 to the entity A, it also includes:
实体 A发送消息 1给实体 B , 消息 1包括随机数 RA、 身份标识 IDA及可 选文本 Text 1; 实体 B接收消息 1。 所述消息 2 包括权标 TokenBA、 身份标识 IDB、 请求 ReqB及可选文本 Text3。 Entity A sends message 1 to entity B, message 1 includes random number R A , identity ID A and optional text Text 1; entity B receives message 1. The message 2 includes a token TokenBA, an identity ID B , a request ReqB, and an optional text Text3.
所述可信第三方 TP收到消息 3后, 确定响应 RepTA的方法包括: 根据实体 A和实体 B的身份标识 IDA和 IDB,检查公钥证书 CertA和 CertB 的有效性; After receiving the message 3, the trusted third party TP determines that the method for responding to the RepTA includes: checking the validity of the public key certificates Cert A and Cert B according to the identity IDs A and ID B of the entity A and the entity B;
或者, 通过实体区分符 A和 B搜索实体 A和实体 B的有效公钥。  Or, search for valid public keys of entity A and entity B through entity specifiers A and B.
所述实体 A对消息 4的处理步骤包括:  The processing steps of the entity A for the message 4 include:
根据使用的公钥验证协议或分发协议来验证响应 RepTA,若验证通过则获 得实体 B的公钥或公钥证书的状态, 验证包含在权标 TokenBA中的实体 B的 签名; 然后检查包含在权标 TokenBA的签名数据中的身份标识字段 IDA是否 与实体 A的身份标识一致, 检查在步骤 0 )步中发送给实体 B的随机数 RA是 否与包含在权标 TokenBA中的随机数 RA相一致, 得到实体 B的鉴别结果。 Verify the response RepTA according to the public key authentication protocol or distribution protocol used. If the verification succeeds, obtain the status of the entity B public key or public key certificate, verify the signature of the entity B included in the token TokenBA; and then check the inclusion rights. signature data marked TokenBA in the identity field ID a is consistent with the identity of the entity a, checking the random number R a if step 0) step is sent to the entity B the random number R a contained in the token TokenBA in Consistently, the identification result of entity B is obtained.
所述实体 B对消息 5的处理步骤包括:  The processing steps of the entity B to the message 5 include:
根据使用的公钥验证协议或分发协议来验证响应 RepB, 若验证通过则获 得实体 A的公钥或公钥证书的状态,验证包含在权标 TokenAB中的实体 A的 签名。 然后检查包含在权标 TokenAB的签名数据中的身份标识字段 IDB是否 与实体 B的身份标识字段一致, 检查在步骤 1 ) 中发送给实体 A的随机数 RB 是否与包含在权标 TokenAB中的随机数 RB相一致, 得到实体 A的鉴别结果。 The response RepB is verified according to the public key authentication protocol or the distribution protocol used, and the state of the public key or the public key certificate of the entity A is obtained if the verification is passed, and the signature of the entity A included in the token TokenAB is verified. Then, it is checked whether the identity field ID B included in the signature data of the token TokenAB is consistent with the identity field of the entity B, and whether the random number R B sent to the entity A in step 1) is included in the token TokenAB The random numbers R B are identical, and the identification result of the entity A is obtained.
所述 ReqB和 ReqAT分别为实体 B和实体 A产生的请求, 请求对端实体 的有效公钥或公钥证书的原状态信息; 所述 RepTA和 RepB分别为针对请求 ReqAT和 ReqB而产生的响应。  The ReqB and the ReqAT are respectively a request generated by the entity B and the entity A, requesting the original public information of the valid public key or the public key certificate of the opposite entity; and the RepTA and the RepB are responses generated for requesting the ReqAT and the ReqB, respectively.
所述 ReqB、 ReqAT, RepTA和 RepB的形式和定义才艮据具体使用的公钥 验证协议或分发协议确定,所述公钥验证协议或分发协议是证书状态协议或基 于服务器的证书验证协议。  The form and definition of the ReqB, ReqAT, RepTA, and RepB are determined according to a public key authentication protocol or a distribution protocol that is specifically used, which is a certificate status protocol or a server-based certificate verification protocol.
所述 ReqTA等于 ReqB, RepTA等于 RepB。  The ReqTA is equal to ReqB, and RepTA is equal to RepB.
所述 ReqTA包含 ReqB的内容, RepTA包含 RepB的内容。  The ReqTA contains the content of ReqB, and the RepTA contains the content of RepB.
本发明釆用三实体构架, 实体 A和实体 B在鉴别之前需获得可信第三方 的公钥或证书,并获得可信第三方颁发给自己的用户证书或将自己的公钥交给 可信第三方保管, 而无需事先知晓对端实体的有效公钥或公钥证书的状态。本 发明将实体的公钥获取、证书验证和鉴别功能融合在一个协议中完成,有利于 提高协议执行的效率和效果,便于和各种公钥获取和公钥证书状态查询协议相 结合,适合接入网络的用户 妻入点一服务器的网络结构, 满足接入网络的鉴 别要求。 The present invention employs a three-entity framework. Entity A and entity B need to obtain a public key or certificate of a trusted third party before authentication, and obtain a user certificate issued by a trusted third party or give their public key to be trusted. The third party keeps the state without knowing the status of the valid public key or public key certificate of the opposite entity in advance. Ben The invention integrates the entity's public key acquisition, certificate verification and authentication functions in one protocol, which is beneficial to improve the efficiency and effect of protocol execution, and is convenient for combination with various public key acquisition and public key certificate status query protocols. The network user's wife enters the network structure of a server to meet the authentication requirements of the access network.
附图说明 DRAWINGS
图 1为现有技术中的鉴别机制工作示意图;  1 is a schematic diagram of the operation of the authentication mechanism in the prior art;
图 2为本发明实施例一的方法示意图;  2 is a schematic diagram of a method according to Embodiment 1 of the present invention;
图 3为本发明实施例二的方法示意图;  3 is a schematic diagram of a method according to Embodiment 2 of the present invention;
图 4为本发明实施例三的方法示意图。  4 is a schematic diagram of a method according to Embodiment 3 of the present invention.
具体实施方式 detailed description
本发明的方法涉及三个安全元素, 即两个实体 Α和 Β及一个可信第三方 TP, 通过在线的可信第三方 TP, 实体 A和 B之间完成鉴别, 且获取对端实体 的有效公钥或公钥证书的状态。  The method of the invention involves three security elements, namely two entities Α and Β and a trusted third party TP, through the online trusted third party TP, the entity A and B complete the authentication, and obtain the effective of the peer entity The status of the public or public key certificate.
实体 A或 B以实体 X表示; 则 Rx表示实体 X产生的随机数; Certx为实 体 X的公钥证书; IDX为实体 X的身份标识, 由证书 Certx或者实体的区分符 X表示; ReqX表示由实体 X产生的请求, 请求对端实体的有效公钥或公钥证 书的状态等信息; ReqXT表示由实体 X产生的或转发给可信第三方 TP的请求; RepX表示针对 ReqX向实体 X发送的响应, 即向实体 X响应其所请求的实体 的有效公钥或公钥证书的状态等信息; RepTX表示针对 ReqXT由可信第三方 TP产生的响应; Token为权标字段; Text为可选文本字段。 各符号定义如下: IDA= A or CertA Entity A or B is represented by entity X; then R x represents a random number generated by entity X; Cert x is a public key certificate of entity X; ID X is an identity of entity X, represented by certificate Certx or entity identifier X; ReqX represents the request generated by the entity X, requesting the status of the valid public key or the public key certificate of the opposite entity; ReqXT represents the request generated by the entity X or forwarded to the trusted third party TP; RepX represents the entity to the ReqX The response sent by X, that is, information such as the status of the valid public key or public key certificate of the entity requested by the entity X; RepTX indicates the response generated by the trusted third party TP for ReqXT; Token is the token field; Text is Optional text field. The symbols are defined as follows: ID A = A or CertA
IDB = B or CertB ID B = B or CertB
ReqB、 ReqAT、 RepTA、 RepB 的形式根据具体使用的公钥验证协议或分 发协议确定, 这些在线公钥验证协议或分发协议包括证书状态协议(见 GB/T 19713 )、 基于服务器的证书验证协议(见 IETF RFC5055 )或者其他公钥分发 或验证协议。  The forms of ReqB, ReqAT, RepTA, and RepB are determined according to the specific public key authentication protocol or distribution protocol. These online public key authentication protocols or distribution protocols include certificate status protocols (see GB/T 19713) and server-based certificate verification protocols ( See IETF RFC5055) or other public key distribution or verification protocols.
参见图 2,本发明实现实体 A和实体 B之间的双向鉴别的具体方法流程如 下:  Referring to FIG. 2, the specific method for implementing the two-way authentication between entity A and entity B is as follows:
1 ) 实体 A发送消息 1给实体 B , 消息 1 包括随机数 RA、 身份标识 IDA 及可选文本 Textl ; 1) Entity A sends message 1 to entity B, message 1 includes random number R A , identity ID A And optional text Textl;
2 ) 实体 B收到消息 1后, 向实体 A发送消息 2 , 消息 2包括权标 TokenBA、 身 份标识 IDB 、 请求 ReqB及可选文本 Text3 , 其 中 TokenBA = RA||RB||IDA||sSB(RA||RB||IDB||IDA||Text2) , 请求 ReqB表示实体 B请求对端实体即 实体 A的有效公钥或公钥证书的状态等信息; 2) After receiving the message 1, entity B sends a message 2 to entity A, which includes token TokenBA, identity ID B , request ReqB, and optional text Text3, where TokenBA = R A ||R B ||ID A ||SB (R A ||R B ||ID B ||ID A ||Text2) , request ReqB indicates that entity B requests the peer entity, that is, the status of the valid public key or public key certificate of entity A;
3 ) 实体 A收到消息 2后, 向可信第三方 TP发送消息 3 , 消息 3包括请 求 ReqAT和可选文本 Text4, 其中 ReqAT需包含 ReqB的内容, 请求 ReqAT 表示实体 B请求实体 A的有效公钥或公钥证书的状态等信息, 及实体 A请求 实体 B的有效公钥或公钥证书的状态等信息;  3) After receiving the message 2, the entity A sends a message 3 to the trusted third party TP. The message 3 includes the request ReqAT and the optional text Text4, wherein the ReqAT needs to contain the content of the ReqB, and the request ReqAT indicates that the entity B requests the effective public of the entity A. Information such as the status of the key or public key certificate, and information such as the status of the valid public key or public key certificate of entity B requesting entity B;
4 )可信第三方 TP收到消息 3后, 根据实体 A和实体 B的身份标识 IDA 和 IDB, 检查公钥证书 CertA和 CertB的有效性或通过实体区分符 A和 B搜索 实体 A和实体 B的有效公钥, 确定响应 RepTA, 其中 RepTA需包含 RepB的 内容,表示可信第三方 TP确定的实体 A的有效公钥或公钥证书的状态等信息, 及实体 B的有效公钥或公钥证书的状态等信息, 执行步骤 5 ); 4) After receiving the message 3, the trusted third party TP checks the validity of the public key certificates Cert A and Cert B according to the identity IDs A and ID B of the entity A and the entity B, or searches for entities through the entity identifiers A and B. The valid public key of A and entity B is determined to respond to RepTA, where RepTA needs to include the content of RepB, indicating the status of the valid public key or public key certificate of entity A determined by the trusted third party TP, and the effective public of entity B. Information such as the status of the key or public key certificate, perform step 5);
5 )可信第三方 TP向实体 A返回消息 4, 消息 4包括响应 RepTA和可选 文本 Text5;  5) Trusted third party TP returns message 4 to entity A, message 4 includes response RepTA and optional text Text5;
6 ) 实体 A收到到来自可信第三方 TP的消息 4后, 完成下列步骤: 6.1 )根据使用的公钥验证协议或分发协议来验证响应 RepTA, 若验证通 过则进至步骤 6.2 );  6) After entity A receives the message from the trusted third party TP 4, the following steps are completed: 6.1) verifying the response RepTA according to the public key authentication protocol or distribution protocol used, and if the verification is passed, proceeding to step 6.2);
6.2 )获得实体 B的公钥或公钥证书的状态, 验证包含在权标 TokenBA中 的实体 B的签名; 然后检查包含在权标 TokenBA的签名数据中的身份标识字 段 IDA是否与实体 A的身份标识一致,检查在步骤 1 )步中发送给实体 B的随 机数 RA是否与包含在权标 TokenBA中的随机数 RA相一致, 得到实体 B的鉴 别结果; 6.2) Obtaining the status of the public key or public key certificate of the entity B, verifying the signature of the entity B included in the token TokenBA; and then checking whether the identity field ID A included in the signature data of the token TokenBA is related to the entity A consistent identity check consistent whether the random number R a in step 1) to step the entity B transmits a random number R a contained in the token TokenBA, the results obtained authentication entity B;
7 )实体 A向实体 B返回消息 5 , 消息 5包括权标 TokenAB和响应 RepB , 其中 TokenAB = Text71 |sS A(RB | |IDB | |Text6) , RepB表示可信第三方 TP确定的实 体 A的有效公钥或公钥证书的状态等信息; 7) Entity A returns message 5 to entity B, message 5 includes token TokenAB and response RepB, where TokenAB = Text71 |sS A(R B | |ID B | |Text6) , RepB represents the entity determined by the trusted third party TP Information such as the status of A's valid public key or public key certificate;
8 ) 实体 B收到来自实体 A的消息 5后, 执行下列步骤:  8) After entity B receives the message 5 from entity A, perform the following steps:
8.1 )根据使用的公钥验证协议或分发协议来验证响应 RepB , 若验证通过 则进至步骤 8.2 ); 8.1) Verify the response RepB according to the public key authentication protocol or distribution protocol used, if the verification passes Then proceed to step 8.2);
8.2 ) 获得实体 A 的公钥或公钥证书的状态, 验证包含在权标 TokenAB 中的实体 A的签名。 然后检查包含在权标 TokenAB的签名数据中的身份标识 字段 IDB是否与实体 B的身份标识字段一致, 检查在步骤 2 )中发送给实体 A 的随机数 RB是否与包含在权标 TokenAB中的随机数 RB相一致, 得到实体 A 的鉴别结果; 至此, 实体 A和实体 B之间完成双向鉴别过程。 8.2) Obtain the status of entity A's public or public key certificate and verify the signature of entity A contained in token TokenAB. Then, it is checked whether the identity field ID B included in the signature data of the token TokenAB is consistent with the identity field of the entity B, and whether the random number R B sent to the entity A in step 2) is included in the token TokenAB The random number R B is consistent, and the identification result of the entity A is obtained; thus, the two-way authentication process is completed between the entity A and the entity B.
参见图 3 , 如果仅实现实体 A对实体 B的单向鉴别, 则在双向鉴别过程 的基础上步骤 7 )和 8 ) 可以省略, 且消息 1到消息 5中的某些字段也可以省 略。  Referring to FIG. 3, if only one-way authentication of entity B to entity B is implemented, steps 7) and 8) may be omitted on the basis of the two-way authentication process, and some fields in messages 1 through 5 may also be omitted.
参见图 4, 如果仅实现实体 B对实体 A的单向鉴别, 则在双向鉴别过程 的基础上步骤 1 )可以省略, 且消息 2到消息 5中的某些字段也可以省略, 其 具体工作过程如下:  Referring to FIG. 4, if only one-way authentication of entity B to entity A is implemented, step 1) may be omitted on the basis of the two-way authentication process, and some fields in message 2 to message 5 may also be omitted, and the specific working process thereof may be omitted. as follows:
2 ) 实体 B向实体 A发送消息 2 , 消息 2包括随机数 RB、 请求 ReqB及可选文 本 Text3 ,其中请求 ReqB表示实体 B请求对端实体即实体 A的有效公钥或公钥证 书的状态等信息; 2) The entity B sends a message 2 to the entity A, the message 2 includes a random number R B , a request ReqB and an optional text Text3, wherein the request ReqB indicates that the entity B requests the peer entity, that is, the state of the valid public key or the public key certificate of the entity A. Information
3 ) 实体 A收到消息 2后, 向可信第三方 TP发送消息 3 , 消息 3包括身 份标识 IDA、 请求 ReqAT和可选文本 Text4, 其中 ReqAT等于 ReqB , 表示实 体 B请求实体 A的有效公钥或公钥证书的状态等信息; 3) After receiving the message 2, the entity A sends a message 3 to the trusted third party TP, and the message 3 includes the identity ID A , the request ReqAT, and the optional text Text4, where ReqAT is equal to ReqB, indicating that the entity B requests the valid public entity A. Information such as the status of the key or public key certificate;
4 )可信第三方 TP收到消息 3后, 根据实体 A的身份标识 IDA, 检查公 钥证书 CertA的有效性或通过实体区分符 A搜索实体 A的有效公钥,确定响应4) The trusted third party TP after receiving the message 3, depending on the effectiveness identity ID A of the entity A, checking or public key certificate Cert Control A valid public key of the entity A symbol A search by distinguishing the entity, determine a response
RepTA, 其中 RepTA等于 RepB, RepB表示可信第三方 TP确定的实体 A的 有效公钥或公钥证书的状态等信息, 执行步骤 5 ); RepTA, where RepTA is equal to RepB, and RepB is information indicating the status of the valid public key or public key certificate of the entity A determined by the trusted third party TP, and performing step 5);
5 )可信第三方 TP向实体 A返回消息 4, 消息 4包括响应 RepTA和可选 文本 Text5;  5) Trusted third party TP returns message 4 to entity A, message 4 includes response RepTA and optional text Text5;
6 ) 实体 A收到到来自可信第三方 TP的消息 4后, 执行步骤 7 );  6) After entity A receives the message from the trusted third party TP 4, step 7);
7 )实体 A向实体 B返回消息 5 , 消息 5包括权标 TokenAB和响应 RepB , 其中 TokenAB = Text7||sSA(RB||Text6); 7) Entity A returns message 5 to entity B, message 5 includes token TokenAB and response RepB, where TokenAB = Text7||sSA(R B ||Text6);
8 ) 实体 B收到来自实体 A的消息 5后, 执行下列步骤:  8) After entity B receives the message 5 from entity A, perform the following steps:
8.1 )根据使用的公钥验证协议或分发协议来验证响应 RepB , 若验证通过 则进至步骤 8.2 ); 8.1) Verify the response RepB according to the public key authentication protocol or distribution protocol used, if the verification passes Then proceed to step 8.2);
8.2 )获得实体 A的公钥或公钥证书的状态, 验证包含在权标 TokenAB中的实 体 A的签名, 然后检查在步骤 2 ) 中发送给实体 A的随机数 RB是否与包含在 权标 TokenAB中的随机数 RB相一致, 得到实体 A的鉴别结果。 至此, 实体 B 完成对实体 A的单向鉴别过程。 8.2) Obtain the state of the public key or public key certificate of entity A, verify the signature of entity A contained in the token TokenAB, and then check whether the random number R B sent to entity A in step 2) is included in the token The random number R B in TokenAB is consistent, and the identification result of entity A is obtained. At this point, entity B completes the one-way authentication process for entity A.

Claims

权 利 要 求 Rights request
1、 一种实现实体的公钥获取、 证书验证及鉴别的方法, 其特征在于, 包 括:  A method for realizing public key acquisition, certificate verification and authentication of an entity, characterized in that it comprises:
实体 B向实体 A发送消息 2 , 消息 2包括随机数 RB、 请求 ReqB及可选文本 Text3; Entity B sends message 2 to entity A, message 2 includes random number R B , request ReqB and optional text Text3;
实体 A收到消息 2后, 向可信第三方 TP发送消息 3 , 消息 3包括身份标 识 IDA、 请求 ReqAT和可选文本 Text4; After receiving the message 2, the entity A sends a message 3 to the trusted third party TP, and the message 3 includes the identity ID A , the request ReqAT, and the optional text Text4;
可信第三方 TP收到消息 3后,确定响应 RepTA,并向实体 A返回消息 4, 消息 4包括响应 RepTA和可选文本 Text5;  After receiving the message 3, the trusted third party determines to respond to RepTA and returns a message 4 to entity A, which includes a response RepTA and an optional text Text5;
实体 A收到到来自可信第三方 TP的消息 4后, 向实体 B返回消息 5 , 消 息 5包括权标 TokenAB和响应 RepB;  After receiving the message 4 from the trusted third party TP, the entity A returns a message 5 to the entity B, and the message 5 includes the token TokenAB and the response RepB;
实体 B收到来自实体 A的消息 5后,进行处理,得到实体 A的鉴别结果。 After receiving the message 5 from entity A, entity B performs processing to obtain the authentication result of entity A.
2、根据权利要求 1所述的实现实体的公钥获取、证书验证及鉴别的方法, 其特征在于,所述可信第三方 TP收到消息 3后,确定响应 RepTA的方法包括: 根据实体 A的身份标识 IDA, 检查公钥证书 CertA的有效性或通过实体区 分符 A搜索实体 A的有效公钥。 The method for realizing public key acquisition, certificate verification and authentication of an entity according to claim 1, wherein after the trusted third party TP receives the message 3, the method for determining the response to the RepTA comprises: Identity ID A , check the validity of the public key certificate Cert A or search for the valid public key of entity A through the entity specifier A.
3、 根据权利要求 1所述的实现实体的公钥获取、 证书验证及鉴别的方法, 其特征在于, 所述实体 B对消息 5的处理包括:  The method for implementing the public key acquisition, the certificate verification and the authentication of the entity according to claim 1, wherein the processing of the message 5 by the entity B comprises:
根据使用的公钥验证协议或分发协议来验证响应 RepB, 若验证通过则获 得实体 A的公钥或公钥证书的状态,验证包含在权标 TokenAB中的实体 A的 签名,检查所述消息 2中的随机数 RB是否与包含在权标 TokenAB中的随机数 RB相一致, 得到实体 A的鉴别结果。 Verifying the response RepB according to the public key authentication protocol or distribution protocol used, and obtaining the state of the public key or public key certificate of the entity A if the verification is passed, verifying the signature of the entity A included in the token TokenAB, and checking the message 2 whether the random number R B contained in the token TokenAB in the random number R B are consistent, the entity a to obtain the results of discrimination.
4、根据权利要求 1所述的实现实体的公钥获取、证书验证及鉴别的方法, 其特征在于, 在所述实体 B向实体 A发送消息 2之前还包括:  The method for realizing public key acquisition, certificate verification and authentication of an entity according to claim 1, wherein before the entity B sends the message 2 to the entity A, the method further includes:
实体 A发送消息 1给实体 B , 消息 1包括随机数 RA、 身份标识 IDA及可 选文本 Text 1; 实体 B接收消息 1。 Entity A sends message 1 to entity B, message 1 includes random number R A , identity ID A and optional text Text 1; entity B receives message 1.
5、根据权利要求 4所述的实现实体的公钥获取、证书验证及鉴别的方法, 其特征在于: 所述消息 2包括权标 TokenBA、 身份标识 IDB、 请求 ReqB及可 选文本 Text3。 The method for implementing public key acquisition, certificate verification and authentication of an entity according to claim 4, wherein: the message 2 comprises a token TokenBA, an identity ID B , a request ReqB, and an optional text Text3.
6、根据权利要求 1所述的实现实体的公钥获取、证书验证及鉴别的方法, 其特征在于:所述可信第三方 TP收到消息 3后,确定响应 RepTA的方法包括: 根据实体 A和实体 B的身份标识 IDA和 IDB,检查公钥证书 CertA和 CertB 的有效性; The method for realizing public key acquisition, certificate verification and authentication of an entity according to claim 1, wherein after the trusted third party TP receives the message 3, the method for determining the response to the RepTA comprises: And the identity IDs A and ID B of the entity B, checking the validity of the public key certificates Cert A and Cert B ;
或者, 通过实体区分符 A和 B搜索实体 A和实体 B的有效公钥。  Or, search for valid public keys of entity A and entity B through entity specifiers A and B.
7、根据权利要求 1所述的实现实体的公钥获取、证书验证及鉴别的方法, 其特征在于, 所述实体 A对消息 4的处理步骤包括:  The method for implementing the public key acquisition, the certificate verification and the authentication of the entity according to claim 1, wherein the processing step of the entity A to the message 4 comprises:
根据使用的公钥验证协议或分发协议来验证响应 RepTA,若验证通过则获 得实体 B的公钥或公钥证书的状态, 验证包含在权标 TokenBA中的实体 B的 签名; 然后检查包含在权标 TokenBA的签名数据中的身份标识字段 IDA是否 与实体 A的身份标识一致, 检查在步骤 0 )步中发送给实体 B的随机数 RA是 否与包含在权标 TokenBA中的随机数 RA相一致, 得到实体 B的鉴别结果。 Verify the response RepTA according to the public key authentication protocol or distribution protocol used. If the verification succeeds, obtain the status of the entity B public key or public key certificate, verify the signature of the entity B included in the token TokenBA; and then check the inclusion rights. signature data marked TokenBA in the identity field ID a is consistent with the identity of the entity a, checking the random number R a if step 0) step is sent to the entity B the random number R a contained in the token TokenBA in Consistently, the identification result of entity B is obtained.
8、根据权利要求 1所述的实现实体的公钥获取、证书验证及鉴别的方法, 其特征在于, 所述实体 B对消息 5的处理步骤包括:  The method for implementing the public key acquisition, the certificate verification and the authentication of the entity according to claim 1, wherein the processing step of the entity B to the message 5 comprises:
根据使用的公钥验证协议或分发协议来验证响应 RepB, 若验证通过则获 得实体 A的公钥或公钥证书的状态,验证包含在权标 TokenAB中的实体 A的 签名。 然后检查包含在权标 TokenAB的签名数据中的身份标识字段 IDB是否 与实体 B的身份标识字段一致, 检查在步骤 1 ) 中发送给实体 A的随机数 RB 是否与包含在权标 TokenAB中的随机数 RB相一致, 得到实体 A的鉴别结果。 The response RepB is verified according to the public key authentication protocol or the distribution protocol used, and the state of the public key or the public key certificate of the entity A is obtained if the verification is passed, and the signature of the entity A included in the token TokenAB is verified. Then, it is checked whether the identity field ID B included in the signature data of the token TokenAB is consistent with the identity field of the entity B, and whether the random number R B sent to the entity A in step 1) is included in the token TokenAB The random numbers R B are identical, and the identification result of the entity A is obtained.
9、 才艮据权利要求 1或 2或 3或 4或 5或 6或 7或 8所述的实现实体的公 钥获取、证书验证及鉴别的方法, 其特征在于, 所述 ReqB和 ReqAT分别为实 体 B和实体 A产生的请求, 请求对端实体的有效公钥或公钥证书的原状态信 息; 所述 RepTA和 RepB分别为针对请求 ReqAT和 ReqB而产生的响应。  9. The method for realizing public key acquisition, certificate verification and authentication of an entity according to claim 1 or 2 or 3 or 4 or 5 or 6 or 7 or 8, wherein said ReqB and ReqAT are respectively The request generated by the entity B and the entity A requests the original public information of the valid public key or the public key certificate of the opposite entity; the RepTA and RepB are responses generated for requesting ReqAT and ReqB, respectively.
10、根据权利要求 1〜8任意一项所述的实现实体的公钥获取、证书验证及 鉴别的方法, 其特征在于, 所述 ReqB、 ReqAT、 RepTA和 RepB的形式和定 义根据具体使用的公钥验证协议或分发协议确定,所述公钥验证协议或分发协 议是证书状态协议或基于服务器的证书验证协议。  The method for realizing public key acquisition, certificate verification and authentication of an entity according to any one of claims 1 to 8, characterized in that the forms and definitions of the ReqB, ReqAT, RepTA and RepB are based on specific use. The key authentication protocol or distribution protocol determines that the public key authentication protocol or distribution protocol is a certificate status protocol or a server-based certificate verification protocol.
11、根据权利要求 1或 2或 3所述的实现实体的公钥获取、证书验证及鉴 别的方法, 其特征在于, 所述 ReqTA等于 ReqB, RepTA等于 RepB。 The method for realizing public key acquisition, certificate verification and authentication of an entity according to claim 1 or 2 or 3, wherein the ReqTA is equal to ReqB and RepTA is equal to RepB.
12、根据权利要求 4或 5或 6或 7或 8所述的实现实体的公钥获取、证书 验证及鉴别的方法, 其特征在于: 所述 ReqTA包含 ReqB的内容, RepTA包 含 RepB的内容。 The method for realizing public key acquisition, certificate verification and authentication of an entity according to claim 4 or 5 or 6 or 7 or 8, wherein: said ReqTA includes content of ReqB, and RepTA contains content of RepB.
PCT/CN2009/076044 2009-12-25 2009-12-25 Method for achieving public key acquisition, certificate validation and authentication of entity WO2011075906A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/076044 WO2011075906A1 (en) 2009-12-25 2009-12-25 Method for achieving public key acquisition, certificate validation and authentication of entity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/076044 WO2011075906A1 (en) 2009-12-25 2009-12-25 Method for achieving public key acquisition, certificate validation and authentication of entity

Publications (1)

Publication Number Publication Date
WO2011075906A1 true WO2011075906A1 (en) 2011-06-30

Family

ID=44194922

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/076044 WO2011075906A1 (en) 2009-12-25 2009-12-25 Method for achieving public key acquisition, certificate validation and authentication of entity

Country Status (1)

Country Link
WO (1) WO2011075906A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145910A (en) * 2007-10-23 2008-03-19 西安西电捷通无线网络通信有限公司 An entity bidirectional authentication method and its system based on trustable third party
CN101364875A (en) * 2008-09-12 2009-02-11 西安西电捷通无线网络通信有限公司 Method realizing public key acquiring, certificater verification and bidirectional identification of entity
CN101364876A (en) * 2008-09-12 2009-02-11 西安西电捷通无线网络通信有限公司 Method realizing public key acquiring, certificater verification and bidirectional identification of entity

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145910A (en) * 2007-10-23 2008-03-19 西安西电捷通无线网络通信有限公司 An entity bidirectional authentication method and its system based on trustable third party
CN101364875A (en) * 2008-09-12 2009-02-11 西安西电捷通无线网络通信有限公司 Method realizing public key acquiring, certificater verification and bidirectional identification of entity
CN101364876A (en) * 2008-09-12 2009-02-11 西安西电捷通无线网络通信有限公司 Method realizing public key acquiring, certificater verification and bidirectional identification of entity

Similar Documents

Publication Publication Date Title
US8510565B2 (en) Bidirectional entity authentication method based on the credible third party
US8340283B2 (en) Method and system for a PKI-based delegation process
WO2011038559A1 (en) Method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party
US7496755B2 (en) Method and system for a single-sign-on operation providing grid access and network access
JP5599910B2 (en) Authentication delegation based on re-verification of cryptographic evidence
US11095635B2 (en) Server authentication using multiple authentication chains
KR100953095B1 (en) Super peer based peer-to-peer network system and peer authentication method therefor
CN101364876B (en) Method realizing public key acquiring, certificater verification and bidirectional identification of entity
JP2001229078A (en) Authorization infrastructure based on public key cryptography
WO2009076879A1 (en) An entity bidirectional authentication method and system
US8966263B2 (en) System and method of network equipment remote access authentication in a communications network
WO2009143778A1 (en) Entity bidirectional-identification method for supporting fast handoff
WO2011026296A1 (en) Method for authenticating entities by introducing an on-line trusted third party
WO2011022918A1 (en) Entity bidirectional authentication method by introducing an online third party
WO2011022919A1 (en) Entity authentication method by introducing online third party
JP2024506915A (en) Zero trust authentication
Aiash et al. A formally verified access control mechanism for information centric networks
Aiash et al. An integrated authentication and authorization approach for the network of information architecture
CN116506118A (en) Identity privacy protection method in PKI certificate transparentization service
WO2011075906A1 (en) Method for achieving public key acquisition, certificate validation and authentication of entity
WO2011075907A1 (en) Method for implementing public key acquirement, certificate validation and bi-directional authentication of entities
Chen et al. Overview of security protocol analysis
Mahdi et al. A formally verified access control mechanism for information centric networks
Chun-Kan A Client Puzzle Based Public-key Authentication and Key Establishment Protocol
Hovlandsvåg Authenticating HTTPS servers through the use of DNS in an Offline Personal Authentication Device (OffPAD)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09852456

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09852456

Country of ref document: EP

Kind code of ref document: A1