WO2016054990A1 - 安全校验方法、装置、终端及服务器 - Google Patents
安全校验方法、装置、终端及服务器 Download PDFInfo
- Publication number
- WO2016054990A1 WO2016054990A1 PCT/CN2015/091235 CN2015091235W WO2016054990A1 WO 2016054990 A1 WO2016054990 A1 WO 2016054990A1 CN 2015091235 W CN2015091235 W CN 2015091235W WO 2016054990 A1 WO2016054990 A1 WO 2016054990A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- verification
- information
- result
- terminal
- credential information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present application relates to the field of communications technologies, and in particular, to a security verification method, apparatus, terminal, and server.
- the traditional verification mode is the application server verification, that is, the user sends a preset verification password to the application server through the terminal, and the application server verifies that the verification password is consistent with the password when the user is registered, and then passes the verification.
- the check password in the above check mode is easily stolen by a malicious third party through a Trojan horse program.
- the terminal local check may be used instead of the application server check, that is, the terminal sends the school based on the application server.
- the prompt information is verified, and the user biometric-based fingerprint verification or the dynamic recognition-based gesture verification is performed locally, thereby completing the identity verification of the user, and transmitting the verification result to the server.
- the terminal local check is used instead of the application server check
- the malicious third party analog terminal interacts with the server and sends the forged terminal local check result to the server
- the server cannot determine the terminal as the substitute check mode.
- the credibility of the local check mode leads to poor reliability of the existing security check mode, and the access security of the network application is not high.
- the present application provides a security verification method, device, terminal, and server to solve the problem of poor reliability of the security verification method in the prior art.
- a security verification method comprising:
- the local check is performed by updating the check mode to obtain the local check result.
- another security verification method comprising:
- the replacement credential information is information generated when the terminal replaces the original check mode by using an update check mode, and when the local check result is a security check by the terminal user, the terminal passes the Update the verification result obtained by local verification;
- the cryptographic check result is verified by the replacement credential information corresponding to the user information, and when the verification is passed, it is determined that the local check result is credible.
- a security verification apparatus comprising:
- the verification unit is configured to perform local verification by updating the verification mode when the end user performs security verification, and obtain a local verification result;
- An encryption unit configured to encrypt the local verification result according to the saved replacement credential information, to obtain an encryption verification result, where the replacement credential information is information generated when the original verification mode is replaced by the update verification manner;
- a first sending unit configured to send the cryptographic check result, the local check result, and user information of the terminal user to a server, so that the server corresponds to the user information
- the server corresponds to the user information
- another security verification apparatus comprising:
- a first receiving unit configured to receive a cryptographic check result sent by the terminal, a local check result, and user information of the terminal user, where the cryptographic check result is that the terminal performs the local check result according to the saved replacement credential information. And performing the encryption verification result generated by the encryption, where the replacement credential information is information generated when the terminal replaces the original verification mode by using an update verification manner, where the local verification result is a security check performed by the terminal user. a verification result obtained by the terminal by performing local verification by the update verification manner;
- An obtaining unit configured to obtain replacement credential information corresponding to the user information
- a verification unit configured to verify the encrypted verification result by using the replacement credential information corresponding to the user information, and when the verification passes, determining that the local verification result is authentic.
- a terminal including:
- processor a memory for storing the processor executable instructions
- processor is configured to:
- the local check is performed by updating the check mode to obtain the local check result.
- a server including:
- processor a memory for storing the processor executable instructions
- processor is configured to:
- the replacement credential information is information generated when the terminal replaces the original check mode by using an update check mode, and when the local check result is a security check by the terminal user, the terminal passes the Update the verification result obtained by local verification;
- the cryptographic check result is verified by the replacement credential information corresponding to the user information, and when the verification is passed, it is determined that the local check result is credible.
- both the terminal and the server save the replacement credential information generated for the update verification mode, so when the verification is performed by using the update verification mode, the replacement may be performed.
- the credential information encrypts the local check result, and the corresponding server can verify the encrypted cryptographic check result transmitted by the terminal by replacing the credential information, and determine that the local check result is credible after the verification is passed.
- the malicious third party cannot obtain the replacement credential information, and the security check cannot be completed even if the local check result is obtained. Therefore, the embodiment of the present application can improve the reliability of the security check and ensure the access of the network application. safety.
- FIG. 1 is a schematic diagram of a security check scenario according to an embodiment of the present application
- 2A is a flowchart of an embodiment of a security verification method of the present application.
- 2B is a flowchart of an embodiment of a security verification method of the present application.
- FIG. 3 is a flow chart of another embodiment of a security verification method of the present application.
- FIG. 4 is a flow chart of another embodiment of a security verification method of the present application.
- FIG. 5 is a hardware structural diagram of a device where the security verification device of the present application is located
- FIG. 6 is a block diagram of an embodiment of a security verification apparatus of the present application.
- FIG. 7 is a block diagram of another embodiment of the security verification apparatus of the present application.
- FIG. 8 is a block diagram of another embodiment of the security verification apparatus of the present application.
- Figure 9 is a block diagram of another embodiment of the security verification device of the present application.
- first, second, third, etc. may be used to describe various information in this application, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
- first information may also be referred to as the second information without departing from the scope of the present application.
- second information may also be referred to as the first information.
- word "if” as used herein may be interpreted as "when” or “when” or “in response to a determination.”
- FIG. 1 is a schematic diagram of an application scenario for implementing security verification according to an embodiment of the present application, where all verification processes between the terminal and the server are completed based on the Internet, and an update check mode is adopted.
- the terminal and the server save the replacement credential information generated for the update verification mode. Therefore, when the verification is performed by the update verification method, the local verification result can be encrypted by replacing the credential information.
- the corresponding server can verify the encrypted cryptographic check result transmitted by the terminal by replacing the credential information, and determine that the local check result is trusted after the verification is passed, thereby improving the reliability of the security check and ensuring the access of the network application. Security, the embodiments of the present application are described in detail below.
- FIG. 2A is a flowchart of an embodiment of a security verification method according to the present application. The embodiment is described from a terminal side that implements security verification:
- Step 201 When the end user performs the security check, the local check is performed by updating the check mode, and the local check result is obtained.
- the method of performing security check on the server side may be referred to as an original check mode, and the original check mode is usually verified by the server through the check password saved when the terminal user registers;
- the method of the security check is called the update check mode, and the update check mode may include the fingerprint check mode, the gesture check mode, and the face gesture check mode.
- the terminal when the original verification mode is replaced by the update verification mode, the terminal may obtain the first original verification credential information in the original verification mode, where the first original verification voucher information may be when the terminal user is registering. Setting a verification password; the terminal generates replacement voucher information for the update verification mode, and transmits the first original verification voucher information, the replacement voucher information, and the user information of the end user to the server, where the replacement voucher information may be a key Or the random string, the user information may be the user name of the terminal user, and further may include the terminal identifier of the terminal, and the terminal user may be uniquely identified by the user information; at the same time, the terminal may locally save the generated replacement credential information, for example, the replacement credential
- the information is saved to the TEE (Trusted Execution Environment) module or the SE (Security Environment) module.
- the server may search for the second original verification credential information corresponding to the user information, where the second original verification credential information may be a terminal.
- the server may save the replacement Change the correspondence between the voucher information and the user information.
- the terminal can perform local check by updating the check mode to obtain the local check result.
- the verification prompt information is usually sent by the server to the terminal, and the terminal obtains the local check result in real time according to the check prompt information.
- Step 202 Encrypt the local check result according to the saved replacement credential information, and obtain a cryptographic check result, where the replacement credential information is information generated when the original check mode is replaced by an update check mode.
- the terminal may obtain the saved replacement credential information generated for the update check mode, and encrypt the local check result by using the replacement credential information to obtain the encryption check result.
- a different encryption method may be used. The following is a detailed description of the key and the random string in the embodiment shown in FIG. 3 and FIG. 4, and details are not described herein again.
- Step 203 Send the cryptographic check result, the local check result, and the user information of the terminal user to the server, so that the server determines the local check result when the cryptographic check result is verified by the replacement credential information corresponding to the user information. Trustworthy.
- both the terminal and the server save the replacement credential information generated for the update verification mode, so when the update verification mode is used for verification,
- the local verification result is encrypted by replacing the credential information
- the corresponding server can verify the encrypted encryption verification result transmitted by the terminal by replacing the credential information, and determine that the local verification result is credible after the verification is passed.
- the embodiment of the present application since the malicious third party cannot obtain the replacement credential information, even if the local verification result is obtained, the security check cannot be completed. Therefore, the embodiment can improve the reliability of the security check and ensure the access security of the network application. Sex.
- 2B is a flowchart of another embodiment of the security verification method of the present application, which is described from the server side that implements security verification:
- Step 211 Receive the cryptographic check result sent by the terminal, the local check result, and the end user's User Info.
- the terminal may obtain the first original verification credential information of the original verification mode, generate replacement credential information for the update verification manner, and The first original verification credential information, the replacement credential information, and the end user's user information are transmitted to the server; after receiving the first original verification credential information, the replacement credential information, and the end user's user information, the server may search for the user information.
- the server may search for the user information.
- the server may compare the second original verification voucher information with the first original verification voucher information, the correspondence between the replacement voucher information and the user information may be saved.
- the terminal When the terminal user performs security check, the terminal will use the local check result obtained by the update check mode, the encrypted check result generated by encrypting the local check result according to the saved replacement credential information, and the user information of the terminal user. To the server.
- Step 212 Obtain replacement credential information corresponding to the user information.
- the server may search for the correspondence between the saved replacement credential information and the user information, and obtain the corresponding corresponding to the received user information. Replacement credential information.
- Step 213 Verify the cryptographic verification result by using the replacement credential information corresponding to the user information, and when the verification passes, determine that the local verification result is credible.
- the server when the server verifies the confidentiality verification result by replacing the credential information, different verification manners may be adopted according to different types of the replacement credential information, and the embodiments shown in FIG. 3 and FIG.
- the key and the random string are taken as an example for detailed description, and details are not described herein again.
- the server verifies the cryptographic check result, it can determine that the local check result sent by the terminal is a trusted check result.
- both the terminal and the server save the replacement credential information generated for the update verification mode, so when the update verification mode is used for verification,
- the local verification result is encrypted by replacing the credential information
- the corresponding server can verify the encrypted encryption verification result transmitted by the terminal by replacing the credential information, and determine that the local verification result is credible after the verification is passed.
- FIG. 3 it is a flowchart of another embodiment of the security verification method of the present application.
- the embodiment describes the security check by using the interaction between the terminal and the server as an example, the replacement credential information is a public key and a private key. the process of:
- Step 301 When the original verification mode is replaced by the update verification mode, the terminal obtains the first original verification credential information of the original verification mode.
- the method of performing security check on the server side may be referred to as an original check mode, and the original check mode is usually verified by the server through the check password saved when the terminal user registers;
- the method of the security check is called the update check mode, and the update check mode may include the fingerprint check mode, the gesture check mode, and the face gesture check mode.
- the terminal may obtain the first original verification credential information in the original verification mode, where the first original verification voucher information may be when the terminal user is registering.
- Set the verification password When the original verification mode is used for security verification, the terminal user inputs the user name and the verification password set in the registration on the security verification interface of the terminal, and the terminal can carry the user name and the verification password in the security verification request, and The security verification request is sent to the server, and the server searches for the verification password corresponding to the user name in the saved user registration information. If the verification password is the same as the verification password sent by the terminal, the terminal user can be confirmed to pass. Security check so that the business operations performed by the end user can be released.
- Step 302 The terminal generates a public key and a private key for updating the verification mode.
- the terminal may generate a key as the replacement credential information for the update verification mode, including the public key and the private key, and the generated key may be a prior art.
- a key as the replacement credential information for the update verification mode, including the public key and the private key, and the generated key may be a prior art.
- Various key generation algorithms in the description are not described herein.
- Step 303 The terminal saves the private key to a trusted storage area associated with the terminal user.
- the trusted storage area may include a TEE module or an SE module. After the terminal generates the public key and the private key, the private key may be saved to the trusted storage area.
- Step 304 The terminal transmits the first original verification credential information, the public key, and the user information of the end user to the server.
- the user information may be the user name of the terminal user, for example, the user name set when the terminal user is registered, and the user information may further include the terminal identifier of the terminal, for example, the terminal MAC (Media Access Control, media access control layer) An address or the like by which the end user can be uniquely identified.
- the terminal transmits the obtained first original verification credential information, the generated public key, and the user information of the end user to the server, so that the server verifies the first original verification credential information.
- Step 305 The server searches for second original verification credential information corresponding to the user information.
- the server For all end users registered at the server, the server stores the correspondence between the user information of the terminal users and the verification password, and the verification password is the verification voucher information.
- the server may search for the correspondence between the user information and the verification password, and obtain the corresponding information corresponding to the received user information.
- the check password which is referred to as the second original check credential information in this embodiment.
- Step 306 The server compares whether the first original verification credential information and the second original verification credential information are consistent.
- the server compares whether the received first original verification credential information and the found second original verification credential information are consistent, that is, whether the verification password of the terminal user saved by the server and the verification password transmitted by the terminal are compared. The same is to determine whether the object currently being replaced by the security check mode is the end user himself.
- Step 307 When the first original verification credential information is consistent with the second original verification credential information, the server saves the correspondence between the public key and the user information.
- the server determines that the first original verification credential information is consistent with the second original verification credential information according to the comparison result, it may be determined that the object currently replaced by the security verification mode is the end user himself, and the server may save the received public key. Correspondence with user information.
- Step 308 When the terminal user performs security verification, the terminal performs local verification by updating the verification mode to obtain a local verification result.
- the terminal can perform local check by updating the check mode to obtain the local check result.
- the server may send the check prompt information to the terminal, and the terminal obtains the local check result in real time according to the check prompt information.
- the update check mode is the gesture check mode. If the server returns a gesture verification prompt message to the terminal as “2”, the terminal user presents two fingers according to the gesture verification prompt information, and after the terminal recognizes the two fingers by using image recognition processing technology, the recognition result “2” "as a result of local verification.
- Step 309 The terminal digitally signs the local verification result according to the private key saved in the trusted storage area to obtain signature information.
- the terminal may obtain the saved private key from the trusted storage area, and use the private key to digitally sign the local verification result.
- the digital signature technology is an encryption technology that encrypts the digest information with the sender's private key and transmits it to the recipient along with the original text.
- the receiver can decrypt the encrypted digest information with the sender's public key, and then use HASH (
- the hash function generates a summary information for the received original text, which is compared with the decrypted summary information. If they are the same, the received information is not modified, so the digital signature can verify the integrity of the information.
- For the specific process of digitally signing the local verification result in this embodiment refer to the implementation process of the existing digital signature technology, and details are not described herein again.
- Step 310 The terminal sends the signature information, the local verification result, and the user information of the terminal user to the server.
- Step 311 The server obtains a public key corresponding to the received user information by searching for the saved correspondence.
- the server when the local verification mode is replaced by the update verification mode, the server saves the correspondence between the public key and the user information.
- the server may search for the foregoing correspondence and obtain a public key corresponding to the received user information.
- Step 312 The server verifies the received signature information by using the found public key. When the verification is passed, it is determined that the received local verification result is trusted.
- verifying the signature information is a process of decryption.
- the server can verify the signature information by using the found public key.
- the specific verification process is consistent with the existing digital signature technology, and will not be described here.
- the server can determine the received local school.
- the test result is a credible verification result.
- the server may determine the accuracy of the verification result.
- the verification result is accurate, the current user operation of the terminal user may be released.
- the verification result is inaccurate, the terminal user is prohibited from performing the current business operation.
- the terminal when the original verification mode is replaced by the update verification mode, the terminal saves the private key generated for the update verification mode, and the server saves the public key generated for the update verification mode, so When the verification mode is updated for verification, the terminal can digitally sign the local verification result through the private key, and the corresponding server can verify the signature information transmitted by the terminal through the public key, and determine the local verification result after the verification is passed. Trustworthy. Applying the embodiment of the present application, since the malicious third party cannot obtain the private key and the public key, even if the local verification result is obtained, the security check cannot be completed. Therefore, the embodiment can improve the reliability of the security check and ensure the network application. Access security.
- FIG. 4 it is a flowchart of another embodiment of the security verification method of the present application.
- the embodiment describes the security verification process in detail by the interaction between the terminal and the server, taking the replacement credential information as a random string as an example:
- Step 401 When the original verification mode is replaced by the update verification mode, the terminal obtains the first original verification credential information of the original verification mode.
- step 401 The description of the step 401 is the same as the foregoing step 301, and details are not described herein again.
- Step 402 The terminal generates a random string for updating the verification mode.
- the terminal may generate a random string as the replacement credential information for the update check mode, which is implemented by the present application.
- the specific algorithm for generating a random string is not limited.
- Step 403 The terminal saves the random string to a trusted storage area associated with the terminal user.
- the trusted storage area may include a TEE module or an SE module, which is generated in the terminal. After the machine string, the random string can be saved to the trusted storage area.
- Step 404 The terminal transmits the first original verification credential information, the random string, and the user information of the end user to the server.
- the user information in this embodiment is information that uniquely identifies the terminal user, and may be the user name of the terminal user.
- Step 405 The server searches for second original verification credential information corresponding to the user information.
- Step 406 The server compares whether the first original verification credential information and the second original verification credential information are consistent.
- Step 407 When the first original verification credential information is consistent with the second original verification credential information, the server saves the correspondence between the random string and the user information.
- the server determines that the first original verification credential information is consistent with the second original verification credential information according to the comparison result, it may be determined that the object currently performing the security verification mode replacement is the end user himself, and the server may save the received random string. Correspondence with user information.
- Step 408 When the terminal user performs security verification, the terminal performs local verification by updating the verification mode to obtain a local verification result.
- Step 409 The terminal encrypts the random string and the local check result stored in the trusted storage area by using a message digest algorithm pre-negotiated with the server to obtain a first encrypted data result.
- the terminal and the server may pre-negotiate a message digest algorithm, which may be specifically a HMAC (Hash-based Message Authentication Code), and the HMAC may use a hash algorithm to use a key sum.
- a message digest algorithm which may be specifically a HMAC (Hash-based Message Authentication Code)
- HMAC Hash-based Message Authentication Code
- a message is input and a message digest is generated as output.
- the terminal may obtain the saved random string from the trusted storage area, use the random string as a key, and use the local check result as a message, and use the HMAC algorithm to The random string and the local check result are encrypted to generate a first encrypted data knot. fruit.
- Step 410 The terminal sends the first encrypted data result, the local check result, and the user information of the terminal user to the server.
- Step 411 The server obtains a random string corresponding to the received user information by searching for the saved correspondence.
- the server when the local verification mode is replaced by the update verification mode, the server saves the correspondence between the random string and the user information.
- the server may search for the foregoing correspondence and obtain a random string corresponding to the received user information.
- Step 412 The server encrypts the found random string and the local check result by using an encryption digest algorithm pre-negotiated with the terminal to obtain a second encrypted data result.
- the terminal locally encrypts the local check result and the random string by using a message digest algorithm.
- the server may obtain a message digest algorithm that is pre-negotiated with the terminal, and then receives the received message through the message digest algorithm.
- the local verification result and the found random string are encrypted to obtain a second encrypted data result.
- Step 413 The server determines whether the result of the second encrypted data is consistent with the result of the first encrypted data. If they are consistent, the local verification result is determined to be authentic.
- the server when the server determines that the second encrypted data result is consistent with the first encrypted data result, it may be determined that the local check result is trusted. Further, the server may determine the accuracy of the verification result. When the verification result is accurate, the current user operation of the terminal user may be released. When the verification result is inaccurate, the terminal user is prohibited from performing the current business operation.
- the terminal and the server save the random string generated for the update verification mode. Therefore, when the verification is performed by using the update verification mode, the terminal can pass the verification.
- the pre-negotiated message digest algorithm encrypts the random string and the local check result, and the corresponding server can encrypt the local check result transmitted by the random string and the terminal through the same message digest algorithm, and in the two encrypted data.
- the results are consistent, it is determined that the local verification result is authentic.
- the present application also provides an embodiment of a security verification device, a terminal, and a server.
- Embodiments of the security verification apparatus of the present application can be applied to terminals and servers, respectively.
- the device embodiment may be implemented by software, or may be implemented by hardware or a combination of hardware and software. Taking the software implementation as an example, as a logical means, the processor of the device in which it is located reads the corresponding computer program instructions in the non-volatile memory into the memory. From the hardware level, as shown in FIG. 5, a hardware structure diagram of the device where the security verification device is located, except for the processor, the memory, the network interface, and the non-volatile memory shown in FIG.
- the device in which the device is located in the embodiment may also include other hardware according to the actual function of the device.
- the terminal may include a camera, a touch screen, a communication component, etc.
- the server may include processing the packet. Forwarding chips and so on.
- FIG. 6 it is a block diagram of an embodiment of a security verification apparatus of the present application.
- the security verification apparatus may be applied to a terminal, and the apparatus includes: a verification unit 610, an encryption unit 620, and a first sending unit 630.
- the verification unit 610 is configured to perform local verification by updating the verification mode when the terminal user performs security verification, and obtain a local verification result.
- the encryption unit 620 is configured to encrypt the local verification result according to the saved replacement credential information, and obtain an encryption verification result, where the replacement credential information is information generated when the original verification mode is replaced by the update verification manner. ;
- the first sending unit 630 is configured to send the cryptographic check result, the local check result, and user information of the terminal user to a server, so that the server passes the replacement credential information corresponding to the user information.
- the server passes the replacement credential information corresponding to the user information.
- FIG. 7 a block diagram of an embodiment of a security verification apparatus of the present application, the security verification apparatus It can be applied to a terminal, and the device includes: an obtaining unit 710, a generating unit 720, a second transmitting unit 730, a saving unit 740, a checking unit 750, an encrypting unit 760, and a first transmitting unit 770.
- the obtaining unit 710 is configured to obtain first original verification credential information of the original verification mode when the original verification mode is replaced by using the update verification manner;
- a generating unit 720 configured to generate the replacement credential information for the update verification manner
- a second sending unit 730 configured to transmit the first original verification credential information, the replacement credential information, and the user information to the server, so that the server finds a second original corresponding to the user information. And verifying the voucher information, and when the second original verification voucher information is consistent with the first original verification voucher information, storing a correspondence between the replacement voucher information and the user information;
- the saving unit 740 is configured to save the replacement credential information to a trusted storage area associated with the terminal user, where the trusted storage area includes: a TEE module or an SE module;
- the verification unit 750 is configured to perform local verification by updating the verification mode when the terminal user performs security verification, and obtain a local verification result.
- the encryption unit 760 is configured to encrypt the local check result according to the saved replacement credential information to obtain a cryptographic check result, where the replacement credential information is information generated when the original check mode is replaced by using the update check mode. ;
- the first sending unit 770 is configured to send the cryptographic check result, the local check result, and user information of the terminal user to a server, so that the server passes the replacement credential information corresponding to the user information.
- the server passes the replacement credential information corresponding to the user information.
- the replacement credential information may include: a public key and a private key;
- the second sending unit 730 may be specifically configured to transmit the public key to the server;
- the encryption unit 760 may be specifically configured to digitally sign the local verification result according to the saved private key to obtain signature information.
- the first sending unit 770 may be specifically configured to send the signature information to a server, so that the server verifies the signature information according to a public key corresponding to the user information, Determining that the local verification result is authentic.
- the replacement credential information may include: a random string
- the second sending unit 730 may be specifically configured to transmit the random string to the server;
- the encryption unit 760 may be specifically configured to encrypt the random string and the local check result by using a message digest algorithm pre-negotiated with the server to obtain a first encrypted data result.
- the first sending unit 770 may be specifically configured to send the first encrypted data result to a server, so that the server obtains a random string corresponding to the user information, and uses the message digest algorithm to Determining the random string corresponding to the user information and the local check result to obtain a second encrypted data result, and determining the local check result when the second encrypted data result is consistent with the first encrypted data result Trustworthy.
- FIG. 8 it is a block diagram of another embodiment of the security verification apparatus of the present application.
- the security verification apparatus may be applied to a server, and the apparatus includes: a first receiving unit 810, an obtaining unit 820, and a checking unit 830.
- the first receiving unit 810 is configured to receive a cryptographic check result sent by the terminal, a local check result, and user information of the terminal user, where the cryptographic check result is that the terminal accesses the local device according to the saved replacement credential information.
- the result of the verification is a cryptographic check result generated by the encryption, where the replacement credential information is information generated when the terminal replaces the original check mode by using an update check mode, and the local check result is a security check for the end user.
- the obtaining unit 820 is configured to obtain replacement credential information corresponding to the user information
- the verification unit 830 is configured to verify the encrypted verification result by using the replacement credential information corresponding to the user information, and when the verification passes, determine that the local verification result is authentic.
- FIG. 9 it is a block diagram of another embodiment of the security verification apparatus of the present application.
- the security verification apparatus may be applied to a server, where the apparatus includes: a second receiving unit 910, a searching unit 920, a comparing unit 930, and a saving unit 940.
- the first receiving unit 950, the obtaining unit 960, and the checking unit 970 may be applied to a server, where the apparatus includes: a second receiving unit 910, a searching unit 920, a comparing unit 930, and a saving unit 940.
- the first receiving unit 950, the obtaining unit 960, and the checking unit 970 may be applied to a server, where the apparatus includes: a second receiving unit 910, a searching unit 920, a comparing unit 930, and a saving unit 940.
- the first receiving unit 950, the obtaining unit 960, and the checking unit 970 may be applied to a server, where the apparatus includes: a second receiving unit 910, a searching unit 920,
- the second receiving unit 910 is configured to replace, by using, the update verification mode by the terminal. Receiving the first original verification credential information, the replacement credential information, and the user information sent by the terminal, where the first original verification credential information is the verification credential information of the original verification mode.
- the replacement credential information is replacement credential information generated by the terminal for the update verification manner;
- the searching unit 920 is configured to search for second original verification credential information corresponding to the user information.
- the comparing unit 930 is configured to compare whether the first original verification credential information and the second original verification credential information are consistent;
- the saving unit 940 is configured to save a correspondence between the replacement credential information and the user information when the first original verification credential information is consistent with the second original verification credential information;
- the first receiving unit 950 is configured to receive a cryptographic check result sent by the terminal, a local check result, and user information of the terminal user, where the cryptographic check result is that the terminal performs the local check according to the saved replacement credential information.
- the cryptographic check result generated by the encryption is performed, and the replacement credential information is information generated when the terminal replaces the original check mode by using an update check mode, where the local check result is used by the terminal user for security check.
- the obtaining unit 960 is configured to obtain replacement credential information corresponding to the user information
- the verification unit 970 is configured to verify the encrypted verification result by using the replacement credential information corresponding to the user information, and when the verification passes, determine that the local verification result is authentic.
- the replacement credential information may include: a public key and a private key;
- the second receiving unit 910 may be specifically configured to receive the public key sent by the terminal;
- the first receiving unit 950 may be specifically configured to receive signature information sent by the terminal, where the signature information is signature information obtained by the terminal digitally signing the local verification result according to the saved private key. ;
- the obtaining unit 960 may be specifically configured to obtain a public key corresponding to the user information by searching for the correspondence relationship;
- the verification unit 970 may be specifically configured to use a public key pair corresponding to the user information. The signature information is verified.
- the replacement credential information includes: a random string
- the second receiving unit 910 may be specifically configured to receive the random string sent by the terminal;
- the first receiving unit 950 may be specifically configured to receive a first encrypted data result sent by the terminal, where the first encrypted data result is that the terminal compares the random string with a message digest algorithm previously negotiated with a server. Encrypted data result obtained by encrypting the local verification result;
- the obtaining unit 960 may be specifically configured to obtain a random string corresponding to the user information by searching for the correspondence relationship;
- the verification unit 970 can include (not shown in FIG. 9):
- a result encryption subunit configured to encrypt a random string corresponding to the user information and the local check result by using the encryption digest algorithm to obtain a second encrypted data result
- the result judging subunit is configured to determine whether the second encrypted data result is consistent with the first encrypted data result, and if they are consistent, the verification succeeds.
- the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
- the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present application. Those of ordinary skill in the art can understand and implement without any creative effort.
- both the terminal and the server save the replacement credential information generated for the update verification mode, so when the update verification mode is used for verification,
- the local verification result is encrypted by replacing the credential information, and the corresponding server can enter the encrypted encryption verification result transmitted by the terminal by replacing the credential information. Verify the line and confirm that the local check result is trusted after the verification is passed.
- the malicious third party cannot obtain the replacement credential information, and the security check cannot be completed even if the local check result is obtained. Therefore, the embodiment of the present application can improve the reliability of the security check and ensure the access of the network application. safety.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (16)
- 一种安全校验方法,其特征在于,所述方法包括:在终端用户进行安全校验时,通过更新校验方式进行本地校验,获得本地校验结果;根据保存的替换凭证信息对所述本地校验结果进行加密,获得加密校验结果,所述替换凭证信息为采用所述更新校验方式替换原始校验方式时生成的信息;将所述加密校验结果、所述本地校验结果和所述终端用户的用户信息发送至服务器,以使所述服务器通过与所述用户信息对应的替换凭证信息对所述加密校验结果验证通过时,确定所述本地校验结果可信。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:在采用所述更新校验方式替换原始校验方式时,获得所述原始校验方式的第一原始校验凭证信息;为所述更新校验方式生成所述替换凭证信息;将所述第一原始校验凭证信息、替换凭证信息和所述用户信息传输至所述服务器,以使所述服务器查找到与所述用户信息对应的第二原始校验凭证信息,且所述第二原始校验凭证信息与所述第一原始校验凭证信息一致时,保存所述替换凭证信息与所述用户信息的对应关系。
- 根据权利要求2所述的方法,其特征在于,所述方法还包括:将所述替换凭证信息保存到与所述终端用户关联的可信存储区域;其中,所述可信存储区域包括:可信运行环境TEE模块或安全环境SE模块。
- 根据权利要求2或3所述的方法,其特征在于,所述替换凭证信息包括:公钥和私钥;所述将替换凭证信息传输至所述服务器,具体为:将所述公钥传输至所述服务器;所述根据保存的替换凭证信息对所述本地校验结果进行加密,获得加密 校验结果,具体为:根据保存的所述私钥对所述本地校验结果进行数字签名,获得签名信息;所述将所述加密校验结果发送至服务器,具体为:将所述签名信息发送至服务器,以使所述服务器根据与所述用户信息对应的公钥对所述签名信息验证通过后,确定所述本地校验结果可信。
- 根据权利要求2或3所述的方法,其特征在于,所述替换凭证信息包括:随机串;所述将所述替换凭证信息传输至所述服务器,具体为:将所述随机串传输至所述服务器;所述根据保存的替换凭证信息对所述本地校验结果进行加密,获得加密校验结果,具体为:通过与所述服务器预先协商的消息摘要算法对所述随机串和所述本地校验结果进行加密,获得第一加密数据结果;所述将所述加密校验结果发送至服务器,具体为:将所述第一加密数据结果发送至服务器,以使所述服务器获得与所述用户信息对应的随机串,并通过所述消息摘要算法对与所述用户信息对应的随机串和所述本地校验结果进行加密,获得第二加密数据结果,且所述第二加密数据结果与所述第一加密数据结果一致时,确定所述本地校验结果可信。
- 一种安全校验方法,其特征在于,所述方法包括:接收终端发送的加密校验结果、本地校验结果和终端用户的用户信息,所述加密校验结果为所述终端根据保存的替换凭证信息对所述本地校验结果进行加密生成的加密校验结果,所述替换凭证信息为所述终端采用更新校验方式替换原始校验方式时生成的信息,所述本地校验结果为所述终端用户进行安全校验时,由所述终端通过所述更新校验方式进行本地校验获得的校验结果;获得与所述用户信息对应的替换凭证信息;通过与所述用户信息对应的替换凭证信息对所述加密校验结果进行验证,当验证通过时,确定所述本地校验结果可信。
- 根据权利要求6所述的方法,其特征在于,所述方法还包括:在所述终端采用所述更新校验方式替换原始校验方式时,接收所述终端发送的第一原始校验凭证信息、替换凭证信息和所述用户信息,所述第一原始校验凭证信息为所述原始校验方式的校验凭证信息,所述替换凭证信息为所述终端为所述更新校验方式生成的替换凭证信息;查找与所述用户信息对应的第二原始校验凭证信息;比较所述第一原始校验凭证信息和所述第二原始校验凭证信息是否一致;当所述第一原始校验凭证信息与所述第二原始校验凭证信息一致时,保存所述替换凭证信息与所述用户信息之间的对应关系。
- 根据权利要求7所述的方法,其特征在于,所述替换凭证信息包括:公钥和私钥;所述接收所述终端发送的替换凭证信息,具体为:接收所述终端发送的所述公钥;所述接收终端发送的加密校验结果,具体为:接收所述终端发送的签名信息,所述签名信息为所述终端根据保存的所述私钥对所述本地校验结果进行数字签名获得的签名信息;所述获得与所述用户信息对应的替换凭证信息,具体为:通过查找所述对应关系获得与所述用户信息对应的公钥;所述通过与所述用户信息对应的替换凭证信息对所述加密校验结果进行验证,具体为:通过与所述用户信息对应的公钥对所述签名信息进行验证。
- 根据权利要求7所述的方法,其特征在于,所述替换凭证信息包括:随机串;所述接收所述终端发送的替换凭证信息,具体为:接收所述终端发送的所述随机串;所述接收终端发送的加密校验结果,具体为:接收所述终端发送的第一加密数据结果,所述第一加密数据结果为所述终端通过与服务器预先协商的消息摘要算法对所述随机串和所述本地校验结果进行加密获得的加密数据结 果;所述获得与所述用户信息对应的替换凭证信息,具体为:通过查找所述对应关系获得与所述用户信息对应的随机串;所述通过与所述用户信息对应的替换凭证信息对所述加密校验结果进行验证,包括:通过所述加密摘要算法对与所述用户信息对应的随机串和所述本地校验结果进行加密,获得第二加密数据结果;判断所述第二加密数据结果与所述第一加密数据结果是否一致,如果一致,则验证通过。
- 一种安全校验装置,其特征在于,所述装置包括:校验单元,用于在终端用户进行安全校验时,通过更新校验方式进行本地校验,获得本地校验结果;加密单元,用于根据保存的替换凭证信息对所述本地校验结果进行加密,获得加密校验结果,所述替换凭证信息为采用所述更新校验方式替换原始校验方式时生成的信息;第一发送单元,用于将所述加密校验结果、所述本地校验结果和所述终端用户的用户信息发送至服务器,以使所述服务器通过与所述用户信息对应的第二替换凭证信息对所述加密校验结果验证通过时,确定所述本地校验结果可信。
- 根据权利要求10所述的装置,其特征在于,所述装置还包括:获得单元,用于在采用所述更新校验方式替换原始校验方式时,获得所述原始校验方式的第一原始校验凭证信息;生成单元,用于为所述更新校验方式生成所述替换凭证信息;第二发送单元,用于将所述第一原始校验凭证信息、替换凭证信息和所述用户信息传输至所述服务器,以使所述服务器查找到与所述用户信息对应的第二原始校验凭证信息,且所述第二原始校验凭证信息与所述第一原始校验凭证信息一致时,保存所述替换凭证信息与所述用户信息的对应关系。
- 根据权利要求11所述的装置,其特征在于,所述装置还包括:保存单元,用于将所述替换凭证信息保存到与所述终端用户关联的可信存储区域;其中,所述可信存储区域包括:TEE模块或SE模块。
- 一种安全校验装置,其特征在于,所述装置包括:第一接收单元,用于接收终端发送的加密校验结果、本地校验结果和终端用户的用户信息,所述加密校验结果为所述终端根据保存的替换凭证信息对所述本地校验结果进行加密生成的加密校验结果,所述替换凭证信息为所述终端采用更新校验方式替换原始校验方式时生成的信息,所述本地校验结果为所述终端用户进行安全校验时,由所述终端通过所述更新校验方式进行本地校验获得的校验结果;获得单元,用于获得与所述用户信息对应的替换凭证信息;校验单元,用于通过与所述用户信息对应的替换凭证信息对所述加密校验结果进行验证,当验证通过时,确定所述本地校验结果可信。
- 根据权利要求13所述的装置,其特征在于,所述装置还包括:第二接收单元,用于在所述终端采用所述更新校验方式替换原始校验方式时,接收所述终端发送的第一原始校验凭证信息、替换凭证信息和所述用户信息,所述第一原始校验凭证信息为所述原始校验方式的校验凭证信息,所述替换凭证信息为所述终端为所述更新校验方式生成的替换凭证信息;查找单元,用于查找与所述用户信息对应的第二原始校验凭证信息;比较单元,用于比较所述第一原始校验凭证信息和所述第二原始校验凭证信息是否一致;保存单元,用于当所述第一原始校验凭证信息与所述第二原始校验凭证信息一致时,保存所述替换凭证信息与所述用户信息之间的对应关系。
- 一种终端,其特征在于,包括:处理器;用于存储所述处理器可执行指令的存储器;其中,所述处理器被配置为:在终端用户进行安全校验时,通过更新校验方式进行本地校验,获得本 地校验结果;根据保存的替换凭证信息对所述本地校验结果进行加密,获得加密校验结果,所述替换凭证信息为采用所述更新校验方式替换原始校验方式时生成的信息;将所述加密校验结果、所述本地校验结果和所述终端用户的用户信息发送至服务器,以使所述服务器通过与所述用户信息对应的替换凭证信息对所述加密校验结果验证通过时,确定所述本地校验结果可信。
- 一种服务器,其特征在于,包括:处理器;用于存储所述处理器可执行指令的存储器;其中,所述处理器被配置为:接收终端发送的加密校验结果、本地校验结果和终端用户的用户信息,所述加密校验结果为所述终端根据保存的替换凭证信息对所述本地校验结果进行加密生成的加密校验结果,所述替换凭证信息为所述终端采用更新校验方式替换原始校验方式时生成的信息,所述本地校验结果为所述终端用户进行安全校验时,由所述终端通过所述更新校验方式进行本地校验获得的校验结果;获得与所述用户信息对应的替换凭证信息;通过与所述用户信息对应的替换凭证信息对所述加密校验结果进行验证,当验证通过时,确定所述本地校验结果可信。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP15848953.4A EP3206329B1 (en) | 2014-10-10 | 2015-09-30 | Security check method, device, terminal and server |
SG11201702933QA SG11201702933QA (en) | 2014-10-10 | 2015-09-30 | Security check method, device, terminal and server |
JP2017518082A JP6967449B2 (ja) | 2014-10-10 | 2015-09-30 | セキュリティチェックのための方法、デバイス、端末およびサーバ |
KR1020177012520A KR102137122B1 (ko) | 2014-10-10 | 2015-09-30 | 보안 체크 방법, 장치, 단말기 및 서버 |
US15/484,061 US10721076B2 (en) | 2014-10-10 | 2017-04-10 | Method, device, terminal, and server for a security check |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410532781.9A CN105490997B (zh) | 2014-10-10 | 2014-10-10 | 安全校验方法、装置、终端及服务器 |
CN201410532781.9 | 2014-10-10 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/484,061 Continuation US10721076B2 (en) | 2014-10-10 | 2017-04-10 | Method, device, terminal, and server for a security check |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016054990A1 true WO2016054990A1 (zh) | 2016-04-14 |
Family
ID=55652586
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/091235 WO2016054990A1 (zh) | 2014-10-10 | 2015-09-30 | 安全校验方法、装置、终端及服务器 |
Country Status (7)
Country | Link |
---|---|
US (1) | US10721076B2 (zh) |
EP (1) | EP3206329B1 (zh) |
JP (1) | JP6967449B2 (zh) |
KR (1) | KR102137122B1 (zh) |
CN (1) | CN105490997B (zh) |
SG (1) | SG11201702933QA (zh) |
WO (1) | WO2016054990A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107204855A (zh) * | 2017-07-14 | 2017-09-26 | 济南浪潮高新科技投资发展有限公司 | 一种盖章方法、服务端、客户端以及盖章系统 |
US10721076B2 (en) | 2014-10-10 | 2020-07-21 | Alibaba Group Holding Limited | Method, device, terminal, and server for a security check |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108268303A (zh) * | 2017-01-03 | 2018-07-10 | 北京润信恒达科技有限公司 | 一种操作请求方法、装置及系统 |
US11343237B1 (en) * | 2017-05-12 | 2022-05-24 | F5, Inc. | Methods for managing a federated identity environment using security and access control data and devices thereof |
CN113139009B (zh) * | 2017-10-23 | 2024-09-10 | 创新先进技术有限公司 | 一种数据审计的方法及装置 |
CN108055132B (zh) * | 2017-11-16 | 2020-04-28 | 阿里巴巴集团控股有限公司 | 一种业务授权的方法、装置及设备 |
EP3664362B1 (en) * | 2018-10-12 | 2021-06-09 | Shenzhen Goodix Technology Co., Ltd. | Key generation method, acquisition method, private key update method, chip and server |
CN109246156B (zh) * | 2018-10-30 | 2021-03-02 | 佛山中科芯蔚科技有限公司 | 登录认证方法及装置、登录方法及装置以及登录认证系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6920561B1 (en) * | 2000-03-31 | 2005-07-19 | International Business Machines Corporation | Method and system for enabling free seating using biometrics through a centralized authentication |
CN104008351A (zh) * | 2014-05-06 | 2014-08-27 | 武汉天喻信息产业股份有限公司 | Windows应用程序完整性校验系统、方法及装置 |
CN104022879A (zh) * | 2014-05-29 | 2014-09-03 | 金蝶软件(中国)有限公司 | 语音安全校验的方法及装置 |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6760119B1 (en) * | 1999-05-25 | 2004-07-06 | Silverbrook Research Pty Ltd | Relay device |
US7502754B2 (en) * | 2002-01-08 | 2009-03-10 | Bottomline Technologies (De), Inc. | Secure web server system for unattended remote file and message transfer |
JP4554902B2 (ja) * | 2003-09-02 | 2010-09-29 | 株式会社日立製作所 | サービス提供システム |
JP4704045B2 (ja) | 2005-01-12 | 2011-06-15 | 株式会社エヌ・ティ・ティ・ドコモ | 通信装置、デジタル署名検証方法およびデジタル署名生成方法 |
JP2007220075A (ja) * | 2006-01-19 | 2007-08-30 | Toshiba Corp | 個人認証装置、位置情報送信装置、個人認証システム、個人認証方法、及び個人認証プログラム |
WO2008099756A1 (ja) * | 2007-02-07 | 2008-08-21 | Nippon Telegraph And Telephone Corporation | クライアント装置、鍵装置、サービス提供装置、ユーザ認証システム、ユーザ認証方法、プログラム、記録媒体 |
JP4820342B2 (ja) * | 2007-08-09 | 2011-11-24 | 日本電信電話株式会社 | ユーザ認証方法、ユーザ認証装置、プログラム及び記録媒体 |
CN101183932B (zh) * | 2007-12-03 | 2011-02-16 | 宇龙计算机通信科技(深圳)有限公司 | 一种无线应用服务的安全认证系统及其注册和登录方法 |
MY175440A (en) * | 2009-05-18 | 2020-06-26 | Mikoh Corp | Biometric identification method |
JP5303407B2 (ja) * | 2009-09-07 | 2013-10-02 | 株式会社日立製作所 | 生体認証システム、携帯端末、半導体素子、および情報処理サーバ |
CN101674304B (zh) * | 2009-10-15 | 2013-07-10 | 浙江师范大学 | 一种网络身份认证系统及方法 |
JP5489775B2 (ja) * | 2010-02-23 | 2014-05-14 | 株式会社インテック | 秘密鍵共有システム、方法、データ処理装置、管理サーバ、及びプログラム |
CN102771078B (zh) | 2010-02-24 | 2015-05-20 | 瑞萨电子株式会社 | 无线通信装置及认证处理方法 |
TW201345217A (zh) * | 2012-01-20 | 2013-11-01 | Interdigital Patent Holdings | 具區域功能性身份管理 |
KR20140138271A (ko) * | 2012-03-15 | 2014-12-03 | 미코 코포레이션 | 생체 측정 인증 시스템 |
CN105490997B (zh) | 2014-10-10 | 2019-05-14 | 阿里巴巴集团控股有限公司 | 安全校验方法、装置、终端及服务器 |
-
2014
- 2014-10-10 CN CN201410532781.9A patent/CN105490997B/zh active Active
-
2015
- 2015-09-30 WO PCT/CN2015/091235 patent/WO2016054990A1/zh active Application Filing
- 2015-09-30 EP EP15848953.4A patent/EP3206329B1/en active Active
- 2015-09-30 SG SG11201702933QA patent/SG11201702933QA/en unknown
- 2015-09-30 KR KR1020177012520A patent/KR102137122B1/ko active IP Right Grant
- 2015-09-30 JP JP2017518082A patent/JP6967449B2/ja active Active
-
2017
- 2017-04-10 US US15/484,061 patent/US10721076B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6920561B1 (en) * | 2000-03-31 | 2005-07-19 | International Business Machines Corporation | Method and system for enabling free seating using biometrics through a centralized authentication |
CN104008351A (zh) * | 2014-05-06 | 2014-08-27 | 武汉天喻信息产业股份有限公司 | Windows应用程序完整性校验系统、方法及装置 |
CN104022879A (zh) * | 2014-05-29 | 2014-09-03 | 金蝶软件(中国)有限公司 | 语音安全校验的方法及装置 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10721076B2 (en) | 2014-10-10 | 2020-07-21 | Alibaba Group Holding Limited | Method, device, terminal, and server for a security check |
CN107204855A (zh) * | 2017-07-14 | 2017-09-26 | 济南浪潮高新科技投资发展有限公司 | 一种盖章方法、服务端、客户端以及盖章系统 |
Also Published As
Publication number | Publication date |
---|---|
EP3206329A4 (en) | 2017-09-27 |
JP2017531951A (ja) | 2017-10-26 |
EP3206329A1 (en) | 2017-08-16 |
KR102137122B1 (ko) | 2020-07-27 |
CN105490997B (zh) | 2019-05-14 |
KR20170066607A (ko) | 2017-06-14 |
CN105490997A (zh) | 2016-04-13 |
EP3206329B1 (en) | 2019-03-20 |
US20170222813A1 (en) | 2017-08-03 |
SG11201702933QA (en) | 2017-06-29 |
JP6967449B2 (ja) | 2021-11-17 |
US10721076B2 (en) | 2020-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016054990A1 (zh) | 安全校验方法、装置、终端及服务器 | |
US11336641B2 (en) | Security enhanced technique of authentication protocol based on trusted execution environment | |
US10630488B2 (en) | Method and apparatus for managing application identifier | |
US20190363886A1 (en) | Mechanism For Achieving Mutual Identity Verification Via One-Way Application-Device Channels | |
US9197420B2 (en) | Using information in a digital certificate to authenticate a network of a wireless access point | |
US11544365B2 (en) | Authentication system using a visual representation of an authentication challenge | |
KR20180053701A (ko) | 로컬 디바이스 인증 | |
US11556617B2 (en) | Authentication translation | |
JPWO2019239591A1 (ja) | 認証システム、認証方法、アプリケーション提供装置、認証装置、及び認証用プログラム | |
US9942042B1 (en) | Key containers for securely asserting user authentication | |
US10764294B1 (en) | Data exfiltration control | |
US11223489B1 (en) | Advanced security control implementation of proxied cryptographic keys | |
US11218317B1 (en) | Secure enclave implementation of proxied cryptographic keys | |
WO2016173211A1 (zh) | 一种管理应用标识的方法及装置 | |
KR20210003066A (ko) | 생체 정보 기반의 pki 키 생성 방법 및 이를 이용한 키 생성 장치 | |
US11418329B1 (en) | Shared secret implementation of proxied cryptographic keys | |
US11804957B2 (en) | Exporting remote cryptographic keys | |
WO2023124958A1 (zh) | 密钥更新方法、服务器、客户端及存储介质 | |
WO2023236720A1 (zh) | 设备认证和校验的方法、装置、设备和存储介质 | |
WO2016165662A1 (zh) | 一种手机准数字证书子系统及其系统及其方法 | |
CN114065170A (zh) | 平台身份证书的获取方法、装置和服务器 | |
EP4047871A1 (en) | Advanced security control implementation of proxied cryptographic keys |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15848953 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2017518082 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20177012520 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11201702933Q Country of ref document: SG |
|
REEP | Request for entry into the european phase |
Ref document number: 2015848953 Country of ref document: EP |