WO2015158228A1 - 一种服务器、用户设备以及用户设备与服务器的交互方法 - Google Patents

一种服务器、用户设备以及用户设备与服务器的交互方法 Download PDF

Info

Publication number
WO2015158228A1
WO2015158228A1 PCT/CN2015/076424 CN2015076424W WO2015158228A1 WO 2015158228 A1 WO2015158228 A1 WO 2015158228A1 CN 2015076424 W CN2015076424 W CN 2015076424W WO 2015158228 A1 WO2015158228 A1 WO 2015158228A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
user equipment
website
signature
information
Prior art date
Application number
PCT/CN2015/076424
Other languages
English (en)
French (fr)
Inventor
赵海
徐燕军
陈芳
周皓
章明
周明
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Publication of WO2015158228A1 publication Critical patent/WO2015158228A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to network security, and more particularly to a server, a user equipment, and a method of interacting a user equipment with a server.
  • This method includes static authentication and dynamic authentication.
  • Static authentication usually maintains a blacklist of malicious websites on the server side through user reports, network scans, etc. This method is widely used and has low implementation cost. However, due to the continual appearance of phishing websites, the coverage of blacklists is narrow and the update frequency is too slow, resulting in maliciousness.
  • the website has a high rate of underreporting.
  • the dynamic authentication method establishes a website behavior analysis model based on website domain name, picture, page script, etc., and authenticates the website authenticity in real time when the user browses the webpage.
  • the server is configured to perform the following process:
  • the website authentication information is encrypted using a dynamic password, and the encrypted website authentication information is signed by the server private key to obtain a server signature, and the server signature is used as an encrypted website authentication information of the server signature element.
  • Sending server information to the user equipment via the website enables the user equipment to obtain the server public key based on the server information to verify the server signature.
  • the user equipment is configured to perform the following process:
  • the encrypted password is used to decrypt the encrypted website authentication information.
  • Providing a method for interacting a user equipment with a server where the server stores at least one or more user equipment public keys and a server private key,
  • the method includes:
  • the server determines, according to the website information, whether the website is authenticated,
  • the server determines a user equipment public key according to the user equipment signature element, and verifies the user equipment signature by using the user equipment public key,
  • the server encrypts the website authentication information using a dynamic password, and signs the encrypted website authentication information using the server private key to obtain a server signature, and signs the server as an encrypted portion of the server signature element.
  • the website authentication information and the server information are sent to the user equipment via the website such that the user equipment can obtain the server public key based on the server information to verify the server signature.
  • the user equipment stores at least one or more server public keys and user equipment private keys.
  • the method includes:
  • the user equipment generates a user equipment signature based on the user equipment signature element using the user equipment private key, and sends the user equipment signature and the user equipment signature element to the server via a website.
  • the user equipment receives the server signature, encrypted website authentication information, and server information as a server signature element from the server via a website.
  • the user equipment obtains a server public key based on the server information to verify the server signature
  • the user equipment uses the dynamic password to decode the encrypted website authentication information.
  • the authenticity of the website is authenticated by a unified server, and the authentication result is authentic.
  • a two-way authentication security channel is established between the server and the user equipment, and the returned authentication result is displayed by the user equipment, and the authentication method is safe and reliable.
  • the user can determine the legitimacy of the website while not affecting the online payment experience of the user equipment, and the authentication process is convenient and fast.
  • only the website can communicate with the background server, and the verification information can pass through the security control and the website to reach the user equipment, and the intermediate link cannot be decrypted.
  • the decryption and display by the security chip of the user device is highly reliable.
  • FIG. 1 is a schematic diagram of an interaction architecture between a user equipment and a server, according to an embodiment.
  • FIG. 2 is a schematic diagram of interaction of a server with a user device, in accordance with one embodiment.
  • FIG. 3 is a schematic diagram of interaction of a server with a user device, in accordance with one embodiment.
  • FIG. 4 is a flow diagram of an authentication website in accordance with one embodiment.
  • FIG. 1 is a schematic diagram of an interaction structure between a user equipment and a server.
  • the interaction of the user device with the server takes place via a website.
  • the user device's interaction with the server can be based on two-way authentication to establish a secure channel.
  • the user equipment can be managed by the server, in which the server public key certificate, the user equipment public and private key pair are preset.
  • the user device can be a mobile communication device such as a cell phone, or a personal computer.
  • a security chip can be loaded in the user device, and a server public key certificate, a user device public-private key pair is set in the security chip.
  • the security chip can also be placed in a separate hardware device capable of communicating with the user device.
  • the interaction between the user device and the server can be performed on the basis of the server authenticating the website.
  • the server issues a site certificate to a certified website and maintains a whitelist of authenticated websites.
  • the website initiates a request for a "site certificate" to the server, the application request containing the website identity information;
  • the server After receiving the request, the server verifies the identity information of the website to determine whether it is a legitimate website;
  • the server If it is a legitimate website, the server issues a "site certificate", otherwise it refuses to apply.
  • an authenticated website may add an identification on its page that supports the authenticity of the website.
  • the server can set a security control on the website through which the user device interacts with the server.
  • FIG. 2 is a schematic diagram of interaction of a server with a user device, in accordance with one embodiment.
  • the server stores at least one or more user equipment public keys and server private keys.
  • the interaction between the server and the user equipment includes the server being configured to perform the following process:
  • the user equipment public key is determined according to the user equipment signature element, and the user equipment public key is used to verify the user equipment signature.
  • the website authentication information is encrypted using the dynamic password, and the encrypted website authentication information is signed by the server private key to obtain the server signature, and the server signature, the encrypted website authentication information as the server signature element, and the server information are
  • the website is sent to the user device such that the user device can obtain the server public key based on the server information to verify the server signature.
  • the user equipment signature element is based on the user equipment serial number, the user signature timestamp, and the server is configured to determine the user equipment public key based on the user equipment serial number.
  • the website information includes a site certificate for the server to determine whether the website is authenticated, and the server is configured to determine if the site certificate was issued by it.
  • the user equipment seed key may be separately set in the user equipment and the server for encrypting and decrypting the website authentication information.
  • the server also stores one or more user device seed keys, and the server is configured to generate a dynamic password based on the user device seed key.
  • the server is configured to receive an authentication request from one or more websites and, after the authentication is passed, send a site certificate to the one or more websites, the server configured to determine a site certificate from the website Whether it is true to determine whether the website is suitable for user equipment access.
  • the server is configured to refuse to communicate with the website when it is determined that the website is not authenticated.
  • the server is configured to alert the website of the verification result when the verification fails.
  • FIG. 3 is a schematic diagram of interaction of a server with a user device, in accordance with one embodiment.
  • the user equipment stores at least one or more server public keys and user equipment private keys, and the interaction of the server with the user equipment includes the user equipment being configured to perform the following process:
  • the server public key is used to verify the server signature based on the server information.
  • the dynamic password is used to decode the encrypted website authentication information.
  • the user equipment signature element is based on the user equipment serial number, the user signature timestamp, and the user equipment is configured to determine the server public key based on the server information.
  • the user equipment also stores a user equipment seed key, the user equipment being configured to generate a dynamic password based on the user equipment seed key.
  • the decrypted website authentication information is displayed on the user device.
  • Website authentication information can be used to alert users to the authenticity of the website.
  • FIG. 4 is a flow diagram of an authentication website in accordance with one embodiment.
  • the user equipment signs the device SN number, time and other information with the "device private key", and sends the digital signature and the elements participating in the signature to the website via the security control;
  • the website organizes the website authenticity authentication request message according to the agreed format and sends it to the server.
  • the message shall include at least the device signature information, the elements participating in the signature, and the “site certificate”;
  • the server After receiving the request packet, the server completes the packet parsing and determines whether the "site certificate" sent is valid.
  • the server obtains the corresponding "device public key” through the device SN number index, and determines whether the device signature information sent is valid; otherwise, the exception processing A is entered;
  • the server organizes and returns the website authenticity authentication response message:
  • the response message should at least include the server signature information, the elements participating in the signature, and the server information;
  • step 6 after receiving the response packet, the user equipment completes the packet parsing, and determines whether the server signature information is valid by using the preset “server public key”;
  • the exception handling can be, for example:
  • the above embodiment is based on an asymmetric cryptosystem and a dynamic password technique to effectively authenticate a website by designing a secure channel. It has the following advantages: “Website authenticity certificate” has high credibility and anti-counterfeiting. “Website authenticity certificate” is generated by the server, and the server and the user equipment are authenticated in both directions, and each other can identify the forged user equipment. Or a background server. “Website authenticity certificate” is anti-tampering and anti-replay attack. “Website authenticity certificate” is formed by dynamic password encryption, which can prevent an attacker from tampering with an open Internet environment or intercepting a replay attack.
  • the display of the identification result is intuitive and highly reliable, and the user equipment gives the identification result an intuitive display, which can effectively prompt the user to access the information of the website, and the decryption and display of the “authentication document of the website” can be completed in the security chip, Will be hijacked or tampered with by malware such as Trojans.
  • the user's use threshold is low, and the authentication process of the entire website is completed by the user equipment, security controls and servers.

Abstract

本发明公开能够向用户设备发送网站认证信息的服务器、能够从服务器接收网站认证信息的用户设备、用户设备与服务器的交互方法。用户设备至少存储一个或多个服务器公钥、用户设备私钥。

Description

一种服务器、用户设备以及用户设备与服务器的交互方法 技术领域
本发明涉及网络安全,并且尤其涉及服务器、用户设备以及用户设备与服务器的交互方法。
背景技术
可以通过在用户端安装防钓鱼的客户端软件或是浏览器插件来鉴别网站真伪。这种方法包括静态鉴别和动态鉴别。静态鉴别通常通过用户举报、网络扫描等在服务器端维护恶意网站黑名单,该方法应用广泛、实施成本低,但由于钓鱼网站不断出现,造成黑名单的覆盖面较窄、更新频率过慢,导致恶意网站漏报率较高。动态鉴别方法建立基于网站域名、图片、页面脚本等的网站行为分析模型,在用户浏览网页时实时地对网站真伪进行鉴别,其较静态的传统方法,鉴别效率有所提升,但由于不断发展的网站伪造技术,动态鉴别方法仍存在误报和漏报,而且由于动态鉴别方法通过软件实现,其容易受到木马等恶意程序的干扰和阻断,可靠性较低。
发明内容
提供一种能够向用户设备发送网站认证信息的服务器,该服务器至少存储一个或多个用户设备公钥、服务器私钥,
该服务器被配置成执行如下过程:
经由网站接收用户设备签名、用户设备签名要素,并从该网站接收网站信息,
根据所述网站信息判断该网站是否经过认证,当确定该网站经过认证时,
根据所述用户设备签名要素确定用户设备公钥,并利用所述用户设备公钥验证所述用户设备签名,
当所述验证成功时,使用动态口令加密该网站认证信息,并使用服务器私钥对经加密的网站认证信息签名得到服务器签名,以及将该服务器签名、作为服务器签名要素的经加密的网站认证信息、服务器信息经由该网站发送至该用户设备使得该用户设备能够基于所述服务器信息得到服务器公钥来验证所述服务器签名。
提供一种能够从服务器接收网站认证信息的用户设备,该用户设备至少存储一个或多个服务器公钥、用户设备私钥,
该用户设备被配置成执行如下过程:
使用所述用户设备私钥基于用户设备签名要素产生用户设备签名,并将该用户设备签名、该 用户设备签名要素经由网站发送至所述服务器,
经由网站从所述服务器接收该服务器签名、作为服务器签名要素的经加密的网站认证信息、服务器信息,
基于所述服务器信息得到服务器公钥来验证所述服务器签名,
当所述验证成功时,使用动态口令来解密所述经加密的网站认证信息。
提供一种用户设备与服务器的交互方法,该服务器至少存储一个或多个用户设备公钥、服务器私钥,
该方法包括:
所述服务器经由网站接收用户设备签名、用户设备签名要素,并从该网站接收网站信息,
所述服务器根据所述网站信息判断该网站是否经过认证,
当确定该网站经过认证时,所述服务器根据所述用户设备签名要素确定用户设备公钥,并利用所述用户设备公钥验证所述用户设备签名,
当所述验证成功时,所述服务器使用动态口令加密该网站认证信息,并使用服务器私钥对经加密的网站认证信息签名得到服务器签名,以及将该服务器签名、作为服务器签名要素的经加密的网站认证信息、服务器信息经由该网站发送至该用户设备使得该用户设备能够基于所述服务器信息得到服务器公钥来验证所述服务器签名。
提供一种用户设备与服务器的交互方法,
该用户设备至少存储一个或多个服务器公钥、用户设备私钥,
该方法包括:
该用户设备使用所述用户设备私钥基于用户设备签名要素产生用户设备签名,并将该用户设备签名、该用户设备签名要素经由网站发送至所述服务器,
该用户设备经由网站从所述服务器接收该服务器签名、作为服务器签名要素的经加密的网站认证信息、服务器信息,
该用户设备基于所述服务器信息得到服务器公钥来验证所述服务器签名,
当所述验证成功时,该用户设备使用动态口令来解码所述经加密的网站认证信息。
根据实施例的一个场景,网站真伪由统一的服务器进行鉴别,鉴别结果真实可信。
根据实施例的一个场景,服务器与用户设备间建立双向认证安全信道,并且返回的鉴别结果通过用户设备显示,鉴别方法安全可靠。
根据实施例的一个场景,在不影响用户设备的在线支付体验的同时,能帮助用户判断网站的合法性,而且鉴别过程方便快捷。
根据一个或多个实施例,在物理链路上,仅网站可以与后台服务器通信,验证信息通过透传经过安全控件、网站到达用户设备,中间环节无法解密。
根据一个或多个实施例,通过用户设备的安全芯片进行解密和显示,可靠性高。
附图说明
在参照附图阅读了本发明的具体实施方式以后,本领域技术人员将会更清楚地了解本发明的各个方面。本领域技术人员应当理解的是,这些附图仅仅用于配合具体实施方式说明本发明的技术方案,而并非意在对本发明的保护范围构成限制。
图1是根据一个实施例的用户设备与服务器的交互架构示意图。
图2是根据一个实施例的服务器与用户设备的交互示意图。
图3是根据一个实施例的服务器与用户设备的交互示意图。
图4是根据一个实施例的鉴别网站的流程图。
具体实施方式
下面参照附图,对本发明的具体实施方式作进一步的详细描述。在下面的描述中,为了解释的目的,陈述许多具体细节以便提供对实施例的一个或多个方面的透彻理解。然而,对于本领域技术人员可以显而易见的是,可以这些具体细节的较少程度来实践实施例的一个或多个方面。另外,尽管可以仅关于实施例的一个公开了该实施例的特定特征或方面,但可针对任何给定的或特定的应用所期望和有利的那样,该特征或方面可与其它实施例的一个或多个特征或方面相组合。因此下面的描述不被视为局限性的,而是通过所附权利要求来限定保护范围。
图1是用户设备与服务器的交互架构示意图。用户设备与服务器的交互经由网站进行。用户设备与服务器的交互可以基于双向验证,从而建立安全通道。可以在用户设备中配置服务器公钥证书、用户设备公私钥对,在服务器中配置用户设备公钥证书、服务器公私钥对用于双向验证。
在一个实例中,可以由服务器对用户设备进行管理,在其中预置服务器公钥证书、用户设备公私钥对。
在一个实例中,用户设备可以是移动通信装置例如手机,或者个人计算机。
在一个实例中,可以在用户设备中装载安全芯片,在安全芯片中设置服务器公钥证书、用户设备公私钥对。安全芯片也可以被设置在能够与用户设备通信的独立硬件设备。
用户设备与服务器的交互可以在服务器对网站进行认证的基础上进行。在一个实例中,服务器对通过认证的网站签发站点证书,并维护经认证网站的白名单。
以下是服务器认证网站的一个示例性实例:
网站向服务器发起“站点证书”的申请请求,该申请请求包含网站身份信息;
服务器收到请求后,对网站身份信息进行核实,判断是否为合法网站;
若为合法网站,则服务器签发“站点证书”,否则拒绝申请。
在一个实例中,经认证的网站可以在其页面上添加该网站支持真伪鉴别的标识。
在一个实例中,服务器可以在网站上设置安全控件,用户设备经由该安全控件与服务器交互。
图2是根据一个实施例的服务器与用户设备的交互示意图。在图2中,服务器至少存储一个或多个用户设备公钥、服务器私钥。其中,服务器与用户设备的交互包括服务器被配置成执行如下过程:
经由网站接收用户设备签名、用户设备签名要素,并从网站接收网站信息,
根据网站信息判断网站是否经过认证,
当确定网站经过认证时,根据用户设备签名要素确定用户设备公钥,并利用用户设备公钥验证用户设备签名,
当验证成功时,使用动态口令加密网站认证信息,并使用服务器私钥对经加密的网站认证信息签名得到服务器签名,以及将服务器签名、作为服务器签名要素的经加密的网站认证信息、服务器信息经由网站发送至用户设备使得用户设备能够基于服务器信息得到服务器公钥来验证服务器签名。
在一个实例中,用户设备签名要素基于用户设备序列号、用户签名时间戳,服务器被配置成根据用户设备序列号确定用户设备公钥。
在一个实例中,网站信息包括用于让服务器判断网站是否经过认证的站点证书,服务器被配置成判断站点证书是否由其签发。
可以在用户设备与服务器中分别设置用户设备种子密钥,用于对网站认证信息加解密。由此,在一个实例中,服务器还存储一个或多个用户设备种子密钥,服务器被配置成基于用户设备种子密钥产生动态口令。
在一个实例中,该服务器被配置成接收来自一个或多个网站的认证请求,并且在认证通过后向该一个或多个网站发送站点证书,该服务器被配置成通过判断来自该网站的站点证书是否真实来判断该网站是否适于用户设备访问。
在一个实例中,服务器被配置成当确定该网站未经过认证时,拒绝与该网站通信。
在一个实例中,服务器被配置成当所述验证失败时,提醒网站验证结果。
图3是根据一个实施例的服务器与用户设备的交互示意图。在图3中,用户设备至少存储一个或多个服务器公钥、用户设备私钥,服务器与用户设备的交互包括用户设备被配置成执行如下过程:
使用用户设备私钥基于用户设备签名要素产生用户设备签名,并将用户设备签名、用户设备签名要素经由网站发送至服务器,
经由网站从服务器接收服务器签名、作为服务器签名要素的经加密的网站认证信息、服务器信息,
基于服务器信息得到服务器公钥来验证服务器签名,
当验证成功时,使用动态口令来解码经加密的网站认证信息。
在一个实例中,用户设备签名要素基于用户设备序列号、用户签名时间戳,用户设备被配置成根据服务器信息确定服务器公钥。
在一个实例中,用户设备还存储用户设备种子密钥,用户设备被配置成基于用户设备种子密钥产生动态口令。
在一个实例中,解密的网站认证信息被显示在用户设备上。网站认证信息能够用于提醒用户网站真伪。
图4是根据一个实施例的鉴别网站的流程图。
在1中,用户设备用“设备私钥”对设备SN号、时间等信息进行签名,并将该数字签名及参与签名的要素经安全控件上送至网站;
在2中,网站按照约定的格式要求,组织网站真伪鉴别请求报文,并上送至服务器。该报文中至少应包含设备签名信息、参与签名的要素、“站点证书”;
在3中,服务器收到请求报文后,完成报文解析,判断上送的“站点证书”是否有效;
在4中,若为有效的“站点证书”,则服务器通过设备SN号索引得到对应的“设备公钥”,判断上送的设备签名信息是否有效;否则进入异常处理A;
在5中,若为有效的设备签名信息,则服务器组织并回传网站真伪鉴别应答报文:
(1)通过SN号索引得到对应的“设备种子密钥”,计算得到当前的动态口令,并用该动态口令对网站认证信息进行加密,形成“网站真伪凭证”;
(2)用“服务器私钥”对“网站真伪凭证”进行签名;
(3)组成报文并经网站和安全控件回传至用户设备中,应答报文中至少应包含服务器签名信息、参与签名的要素及服务器信息;
否则进入异常处理B;
在6中,用户设备收到应答报文后,完成报文解析,并通过预置的“服务器公钥”判断服务器签名信息是否有效;
在7中,若为有效的服务器签名信息,则由预置的“设备种子密钥”计算得到当前的动态口令,对“网站真伪凭证”进行解密,在用户设备上显示网站认证信息;否则进入异常处理C。
异常处理可以例如为:
A-拒绝网站请求;
B-回复网站“非合法的用户设备”;
C-在用户设备上显示”非合法的网站真伪凭证”。
上述实施例基于非对称密码体系和动态口令技术,通过设计安全通道而有效地鉴别网站真伪。其有以下这些优势:“网站真伪凭证”可信度高,抗伪造,“网站真伪凭证“由服务器产生,且服务器与用户设备间进行了双向认证,互相之间能识别伪造的用户设备或是后台服务器。“网站真伪凭证”抗篡改,抗重放攻击,“网站真伪凭证”被由动态口令加密形成,能防止攻击者通过开放的互联网环境对其进行篡改,或是截取后的重放攻击。鉴别结果的显示直观且可靠性高,用户设备将鉴别结果给予直观的显示,能有效提示用户当前访问网站的信息,且“网站真伪凭证”的解密与显示均可以在安全芯片中完成,不会被木马等恶意软件劫持或篡改。用户使用门槛低,整个网站真伪的鉴别流程由用户设备、安全控件和服务器配合完成。

Claims (14)

  1. 一种能够向用户设备发送网站认证信息的服务器,其特征在于,
    该服务器至少存储一个或多个用户设备公钥、服务器私钥,
    该服务器被配置成执行如下过程:
    经由网站接收用户设备签名、用户设备签名要素,并从该网站接收网站信息,
    根据所述网站信息判断该网站是否经过认证,
    当确定该网站经过认证时,根据所述用户设备签名要素确定用户设备公钥,并利用所述用户设备公钥验证所述用户设备签名,
    当所述验证成功时,使用动态口令加密该网站认证信息,并使用服务器私钥对经加密的网站认证信息签名得到服务器签名,以及将该服务器签名、作为服务器签名要素的经加密的网站认证信息、服务器信息经由该网站发送至该用户设备使得该用户设备能够基于所述服务器信息得到服务器公钥来验证所述服务器签名。
  2. 如权利要求1所述的服务器,其特征在于,
    所述用户设备签名要素基于用户设备序列号、用户签名时间戳,
    所述服务器被配置成根据所述用户设备序列号确定用户设备公钥。
  3. 如权利要求1所述的服务器,其特征在于,
    所述网站信息包括用于让服务器判断该网站是否经过认证的站点证书,
    所述服务器被配置成判断该站点证书是否由其签发。
  4. 如权利要求1所述的服务器,其特征在于,
    所述服务器还存储所述一个或多个用户设备种子密钥,
    所述服务器被配置成基于所述用户设备种子密钥产生所述动态口令。
  5. 一种能够从服务器接收网站认证信息的用户设备,其特征在于,
    该用户设备至少存储一个或多个服务器公钥、用户设备私钥,
    该用户设备被配置成执行如下过程:
    使用所述用户设备私钥基于用户设备签名要素产生用户设备签名,并将该用户设备签名、该用户设备签名要素经由网站发送至所述服务器,
    经由网站从所述服务器接收该服务器签名、作为服务器签名要素的经加密的网站认证信息、服务器信息,
    基于所述服务器信息得到服务器公钥来验证所述服务器签名,
    当所述验证成功时,使用动态口令来解码所述经加密的网站认证信息。
  6. 如权利要求5所述的用户设备,其特征在于,
    所述用户设备签名要素基于用户设备序列号、用户签名时间戳,
    所述用户设备被配置成根据所述服务器信息确定服务器公钥。
  7. 如权利要求5所述的服务器,其特征在于,
    所述用户设备还存储用户设备种子密钥,
    所述用户设备被配置成基于所述用户设备种子密钥产生所述动态口令。
  8. 一种用户设备与服务器的交互方法,其特征在于,
    该服务器至少存储一个或多个用户设备公钥、服务器私钥,
    该方法包括:
    所述服务器经由网站接收用户设备签名、用户设备签名要素,并从该网站接收网站信息,
    所述服务器根据所述网站信息判断该网站是否经过认证,
    当确定该网站经过认证时,所述服务器根据所述用户设备签名要素确定用户设备公钥,并利用所述用户设备公钥验证所述用户设备签名,
    当所述验证成功时,所述服务器使用动态口令加密该网站认证信息,并使用服务器私钥对经加密的网站认证信息签名得到服务器签名,以及将该服务器签名、作为服务器签名要素的经加密的网站认证信息、服务器信息经由该网站发送至该用户设备使得该用户设备能够基于所述服务器信息得到服务器公钥来验证所述服务器签名。
  9. 如权利要求8所述的方法,其特征在于,
    所述用户设备签名要素基于用户设备序列号、用户签名时间戳,
    该方法包括:
    所述服务器根据所述用户设备序列号确定用户设备公钥。
  10. 如权利要求8所述的方法,其特征在于,
    所述网站信息包括用于让服务器判断该网站是否经过认证的站点证书,
    该方法包括:
    所述服务器判断该站点证书是否由其签发。
  11. 如权利要求8所述的方法,其特征在于,
    所述服务器还存储所述一个或多个用户设备种子密钥,
    该方法包括:
    所述服务器基于所述用户设备种子密钥产生所述动态口令。
  12. 一种用户设备与服务器的交互方法,其特征在于,
    该用户设备至少存储一个或多个服务器公钥、用户设备私钥,
    该方法包括:
    该用户设备使用所述用户设备私钥基于用户设备签名要素产生用户设备签名,并将该用户设备签名、该用户设备签名要素经由网站发送至所述服务器,
    该用户设备经由网站从所述服务器接收该服务器签名、作为服务器签名要素的经加密的网站认证信息、服务器信息,
    该用户设备基于所述服务器信息得到服务器公钥来验证所述服务器签名,
    当所述验证成功时,该用户设备使用动态口令来解码所述经加密的网站认证信息。
  13. 如权利要求12所述的方法,其特征在于,
    所述用户设备签名要素基于用户设备序列号、用户签名时间戳,
    该方法包括:
    所述用户设备根据所述服务器信息确定服务器公钥。
  14. 如权利要求12所述的方法,其特征在于,
    所述用户设备还存储用户设备种子密钥,
    该方法包括:
    所述用户设备基于所述用户设备种子密钥产生所述动态口令。
PCT/CN2015/076424 2014-04-15 2015-04-13 一种服务器、用户设备以及用户设备与服务器的交互方法 WO2015158228A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410149579.8 2014-04-15
CN201410149579.8A CN105024813B (zh) 2014-04-15 2014-04-15 一种服务器、用户设备以及用户设备与服务器的交互方法

Publications (1)

Publication Number Publication Date
WO2015158228A1 true WO2015158228A1 (zh) 2015-10-22

Family

ID=54323479

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/076424 WO2015158228A1 (zh) 2014-04-15 2015-04-13 一种服务器、用户设备以及用户设备与服务器的交互方法

Country Status (4)

Country Link
CN (1) CN105024813B (zh)
HK (1) HK1217065A1 (zh)
TW (1) TWI526871B (zh)
WO (1) WO2015158228A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107368737A (zh) * 2016-05-13 2017-11-21 阿里巴巴集团控股有限公司 一种防止拷贝攻击的处理方法、服务器及客户端
TWI608361B (zh) * 2016-09-23 2017-12-11 群暉科技股份有限公司 電子裝置、伺服器、通訊系統及通訊方法
CN106533665B (zh) * 2016-10-31 2018-08-07 北京百度网讯科技有限公司 用于存储网站私钥明文的方法、系统和装置
CN109872140A (zh) * 2019-01-31 2019-06-11 篱笆墙网络科技有限公司 支付结算的方法、装置、设备及存储介质
CN109981591B (zh) * 2019-02-28 2021-09-21 矩阵元技术(深圳)有限公司 单一客户端生成私钥的密钥管理方法、电子设备
CN110276206B (zh) * 2019-06-10 2021-03-23 Oppo广东移动通信有限公司 已加密内容的查看方法及查看系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143134A (zh) * 2010-08-05 2011-08-03 华为技术有限公司 分布式身份认证方法、装置与系统
US8332627B1 (en) * 2006-02-08 2012-12-11 Cisco Technology, Inc. Mutual authentication
CN103634307A (zh) * 2013-11-19 2014-03-12 北京奇虎科技有限公司 一种对网页内容进行认证的方法和浏览器

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100558035C (zh) * 2006-08-03 2009-11-04 西安电子科技大学 一种双向认证方法及系统
CN102281137A (zh) * 2010-06-12 2011-12-14 杭州驭强科技有限公司 一种双向认证式挑战应答机制的动态密码认证方法
CN102761529A (zh) * 2011-04-29 2012-10-31 上海格尔软件股份有限公司 一种基于图片标识数字签名的网站认证方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8332627B1 (en) * 2006-02-08 2012-12-11 Cisco Technology, Inc. Mutual authentication
CN102143134A (zh) * 2010-08-05 2011-08-03 华为技术有限公司 分布式身份认证方法、装置与系统
CN103634307A (zh) * 2013-11-19 2014-03-12 北京奇虎科技有限公司 一种对网页内容进行认证的方法和浏览器

Also Published As

Publication number Publication date
TWI526871B (zh) 2016-03-21
HK1217065A1 (zh) 2016-12-16
TW201539239A (zh) 2015-10-16
CN105024813B (zh) 2018-06-22
CN105024813A (zh) 2015-11-04

Similar Documents

Publication Publication Date Title
CN109309565B (zh) 一种安全认证的方法及装置
US9838205B2 (en) Network authentication method for secure electronic transactions
US9231925B1 (en) Network authentication method for secure electronic transactions
US9887989B2 (en) Protecting passwords and biometrics against back-end security breaches
US8209744B2 (en) Mobile device assisted secure computer network communication
US8112787B2 (en) System and method for securing a credential via user and server verification
CN108418691B (zh) 基于sgx的动态网络身份认证方法
KR101563828B1 (ko) 신뢰성있는 인증 및 로그온을 위한 방법 및 장치
CN101860540B (zh) 一种识别网站服务合法性的方法及装置
US9225702B2 (en) Transparent client authentication
CA3035817A1 (en) System and method for decentralized authentication using a distributed transaction-based state machine
JP2019502286A (ja) 部分的に信頼できる第三者機関を通しての鍵交換
TWI526871B (zh) Server, user device, and user device and server interaction method
JP2011515961A (ja) クライアント側証明書認証情報の認証保存方法と認証保存システム
MXPA03003710A (es) Metodos para cambiar a distancia una contrasena de comunicaciones.
US9332011B2 (en) Secure authentication system with automatic cancellation of fraudulent operations
CN109040079A (zh) 直播链接地址的组建和验证方法及相应装置
WO2018030289A1 (ja) Ssl通信システム、クライアント、サーバ、ssl通信方法、コンピュータプログラム
Alzuwaini et al. An Efficient Mechanism to Prevent the Phishing Attacks.
Mumtaz et al. An RSA based authentication system for smart IoT environment
WO2008053279A1 (en) Logging on a user device to a server
Alzomai et al. The mobile phone as a multi OTP device using trusted computing
CN104767740A (zh) 用于来自用户平台的可信认证和接入的方法
Balisane et al. Trusted execution environment-based authentication gauge (TEEBAG)
KR20130100032A (ko) 코드 서명 기법을 이용한 스마트폰 어플리케이션 배포 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15779858

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 01.03.2017)

122 Ep: pct application non-entry in european phase

Ref document number: 15779858

Country of ref document: EP

Kind code of ref document: A1