WO2021210594A1 - Système de vérification d'authentification, dispositif à authentifier, dispositif d'authentification, procédé de vérification d'authentification, programme de vérification d'authentification et support d'informations lisible par ordinateur et dispositif enregistré - Google Patents

Système de vérification d'authentification, dispositif à authentifier, dispositif d'authentification, procédé de vérification d'authentification, programme de vérification d'authentification et support d'informations lisible par ordinateur et dispositif enregistré Download PDF

Info

Publication number
WO2021210594A1
WO2021210594A1 PCT/JP2021/015368 JP2021015368W WO2021210594A1 WO 2021210594 A1 WO2021210594 A1 WO 2021210594A1 JP 2021015368 W JP2021015368 W JP 2021015368W WO 2021210594 A1 WO2021210594 A1 WO 2021210594A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
information
verification
unit
authenticated
Prior art date
Application number
PCT/JP2021/015368
Other languages
English (en)
Japanese (ja)
Inventor
安比古 足立
孝典 五十部
Original Assignee
PaylessGate株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PaylessGate株式会社 filed Critical PaylessGate株式会社
Publication of WO2021210594A1 publication Critical patent/WO2021210594A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to an authentication verification system, a device to be authenticated, an authentication device, an authentication verification method, an authentication verification program, a computer-readable recording medium, and a recording device.
  • the present invention has been made to solve the above problems, and is an authentication verification system, an authenticated device, an authentication device, an authentication verification method, an authentication verification program, and an authentication verification system capable of realizing secure authentication by a simple process.
  • the purpose is to respond to vulnerabilities such as reverse compilation and attacks of smartphones in providing computer-readable recording media and recording devices.
  • the authentication verification system of the present invention is an authentication system including an authenticated device for receiving authentication and an authentication device for authenticating the authenticated device.
  • the authenticated device is a transmitter that repeatedly sends an authentication request including encrypted information to the authentication device within the authentication period, and an encryption unit that generates encrypted information by encrypting unique information and verification values with an encryption key. It also has an acquisition unit that generates unique information, a verification unit that generates verification values and verifies whether the authentication was valid after authentication of the authentication device, and a storage unit that stores the generated verification values.
  • the authentication device repeatedly receives an authentication request including encryption information encrypted by an encryption key sent from the authenticated device within the authentication period, and decrypts the encryption information to acquire the decryption information.
  • the decryption unit uses the decryption unit and multiple authentication requests received within the authentication period, including the decrypted encryption information to determine whether the authenticated device is valid, and after the authentication determination, the verification data including the verification value is authenticated. It includes an authentication unit that transmits to the device and an output unit that outputs a determination result by the authentication unit.
  • the verification value may include the time when the verification value is generated and either a random number value or a hash function value.
  • the encryption key may be a common key encryption key.
  • the verification unit may check whether the verification value stored in the storage unit and the verification value transmitted from the authentication device match to determine whether the verification value is valid.
  • the authentication verification system further After the authentication of the authentication device, the verification value from the authentication unit is received and transmitted to the verification unit of the authenticated device, and the authentication result and the verification result are communicated with the authenticated device and the authentication device in order to receive the verification result.
  • the authentication unit compares the verification values included in the plurality of decryption information acquired from the plurality of authentication requests received during the authentication period, and if no consistency is found. In addition, it may be determined that the authenticated device is not valid.
  • the transmission unit may transmit the unique information and the verification value by different means.
  • the amount of information to be transmitted can be reduced.
  • the transmission frequency of the verification value can be made smaller than the unique value to reduce the load on the system.
  • the receiving unit may intermittently receive the authentication request.
  • the load related to receiving the authentication request can be reduced, and the power consumption of the authentication device can be reduced.
  • the authentication verification method is an authentication verification method for verifying the authentication of the authenticated device in an authentication system including an authenticated device to be certified and an authentication device that authenticates the authenticated device. Then, the authenticated device repeatedly sends an authentication request including the encrypted information to the authenticated device within the authentication period, and the authenticated device encrypts the unique information and the verification value with the encryption key to obtain the encrypted information.
  • the authenticated device uses a step of decrypting the encrypted information to obtain the decrypted information and a plurality of authentication requests received within the authentication period including the encrypted information that the authenticated device can decrypt. It includes a step of determining whether or not it is valid and transmitting verification data including a verification value to the authenticated device after the authentication determination, and a step of the authentication device outputting a determination result by the authentication unit.
  • the smartphone has vulnerabilities such as reverse compilation by simple processing. It is possible to realize secure authentication corresponding to sex and attacks.
  • a block diagram showing a configuration of an authenticated device, an authenticated device, and a system server according to an embodiment of the present invention A flowchart showing the authentication operation of the authenticated device according to the same embodiment. A flowchart showing the authentication operation of the authentication device according to the same embodiment. A flowchart showing the operation of the system server according to the same embodiment. A flowchart showing the verification operation of the authenticated device according to the same embodiment. A flowchart showing the verification operation of the authentication device according to the same embodiment. The figure for demonstrating the transmission / reception of the authentication request in the same embodiment. The figure which shows an example of the configuration of the computer system in the same embodiment.
  • the authenticated device transmits a plurality of authentication requests including encrypted information obtained by encrypting a plurality of unique information to the authentication device. Further, the authentication device according to the present embodiment authenticates the authenticated device by using a plurality of authentication requests transmitted from the authenticated device. Further, the authenticated device according to the present embodiment transmits a verification value to the authentication device. The authentication device according to the present embodiment verifies the authentication by the authenticated device via the system server using the received verification value as verification data.
  • FIG. 1 is a block diagram showing the configurations of the authenticated device 1, the authenticated device 2, and the system server 3 according to the present embodiment.
  • the authenticated device 1 according to the present embodiment includes an acquisition unit 11, a storage unit 12, an encryption unit 13, a transmission unit 14, a verification unit 15, and a line communication unit 16.
  • the authentication device 2 according to the present embodiment includes a receiving unit 21, a storage unit 22, a decoding unit 23, an authentication unit 24, an output unit 25, and a line communication unit 26.
  • the system server 3 includes a server authentication unit 35 and a line communication unit 36.
  • the authenticated device 1 may be, for example, a mobile information terminal having a communication function such as a smartphone, a tablet terminal, a PDA (Personal Digital Assistant), a laptop computer, a transceiver, or any other device.
  • the authentication device 2 may be, for example, an automatic ticket gate, a gate for entering a venue such as an event, a vending machine, a control device for locking / unlocking the door of a hotel or a conference room for rent, a cash register, or the like.
  • a mobile information terminal having a communication function such as a smartphone.
  • the system server 3 may be, for example, a server system installed on the cloud or may be installed in the authentication device 2.
  • FIG. 1 shows a case where one authenticated device 1 and one authenticated device 2 communicate with each other, but this may not be the case. Communication may be performed between the plurality of authenticated devices 1 and one authentication device 2.
  • the communication is usually wireless communication.
  • the acquisition unit 11 acquires unique information.
  • Each unique information may be, for example, different information.
  • the acquisition unit 11 acquires a plurality of unique information, the plurality of unique information will be different from each other.
  • the unique information is encrypted, included in the authentication request, and transmitted, as described below. Therefore, when each unique information is different information, it can be said that the unique information is information unique to the authentication request.
  • information usually composed of unique information and non-unique information (for example, information in which the upper bit is unique and the lower bit is not unique) is, as a result, unique information. Become. Therefore, unique information may thus be composed of unique information and non-unique information.
  • the unique information included in the unique information may be referred to as a "unique part” below.
  • non-unique information included in unique information may be referred to as “non-unique part”.
  • the non-unique part is information that cannot always be said to be unique information, and may be information that can change for each authentication request, such as location information described later.
  • the unique information may include, for example, a random number value, a count value, a time, a one-time password, or other unique information.
  • the random number value may be generated by using, for example, a random number table or a function for generating a random number.
  • the count value may be, for example, a value obtained by incrementing or decrementing a numerical value at predetermined intervals.
  • the time may be, for example, hours, minutes, seconds, minutes, seconds, or the like acquired from a clock unit (not shown). Further, when different unique information is used for each authentication request, it is preferable that the accuracy of the time is shorter than the transmission interval of the authentication request described later.
  • the unique information can be the information unique to the authentication request.
  • the transmission interval of the authentication request is about 10 milliseconds
  • the accuracy of the time may be 1 millisecond.
  • duplicated unique information may be used for a plurality of authentication requests, duplicated random numbers and counts may be used, and the time accuracy is longer than the transmission interval. May be good. Even in this case, as will be described later, since it is necessary to send a plurality of authentication requests corresponding to different unique information within the authentication period, such a plurality of authentication requests can be transmitted. It is preferable that unique information is acquired.
  • the acquisition unit 11 may generate unique information or may receive it from other components or devices.
  • the acquisition unit 11 acquires a unique part such as a random number value, a count value, a time, and a one-time password, and the unique part and its own device Unique information may be generated by using a non-unique part such as the ID of the authenticated device 1 which is the ID, the ID of the authentication device 2 of the transmission destination, and the position information of the authenticated device 1 which is the own device.
  • the ID of the own device may be read from the storage unit 12 and used, for example.
  • the ID of the authentication device 2 at the transmission destination may be included in, for example, a transmission instruction described later, or may be read from the storage unit 12 and used.
  • the position information of the own device may be acquired by the position acquisition unit, as will be described later.
  • the acquisition unit 11 may receive unique information from, for example, the authentication device 2.
  • challenge-response authentication is performed by transmitting an authentication request including encrypted information obtained by encrypting the unique information from the authenticated device 1 to the authentication device 2.
  • the authentication device 2 may generate the above-mentioned unique information.
  • the acquisition unit 11 may receive, for example, a unique portion from the authentication device 2 and use the unique portion to generate unique information. In this case as well, challenge-response authentication can be performed using the unique portion included in the unique information.
  • the ID of the authenticated device 1 is stored.
  • This ID is an identifier of the authenticated device 1 and is information unique to the authenticated device 1.
  • the storage unit 12 may store, for example, a key for common key cryptography, which will be described later, an ID which is an identifier of the authentication device 2, and the like.
  • the unique information includes a random number value or a count value
  • the storage unit 12 stores a random number table or function for acquiring the random number value, the latest count value for generating the count value, and the like. May be good.
  • the process of storing information in the storage unit 12 does not matter.
  • the information may be stored in the storage unit 12 via the recording medium, the information transmitted via the communication line or the like may be stored in the storage unit 12, or
  • the information input via the input device may be stored in the storage unit 12.
  • the storage unit 12 is preferably realized by a non-volatile recording medium, but may be realized by a volatile recording medium.
  • the recording medium may be, for example, a semiconductor memory, a magnetic disk, an optical disk, or the like.
  • the encryption unit 13 encrypts the unique information and the verification value generated by the verification unit 15 described later with the encryption key to generate the encryption information.
  • the encryption key may be, for example, a common key cryptographic key, or a public key of public key cryptography corresponding to the authentication device 2 to which the authentication request is sent.
  • the common key cryptographic key may be a key unique to the authenticated device 1 or a common key unique to the authentication device 2.
  • the common key unique to the pair of the authenticated device 1 and the authentication device 2 may be used.
  • the key of the common key encryption is different for each authenticated device 1. Further, as will be described later, the authentication device 2 also holds the key of this common key cryptography.
  • the public key of the public key cryptography of the transmission destination authentication device 2 may be included in, for example, a transmission instruction described later.
  • the unique information may be encrypted with an encryption key common to the system, and this encryption key may be a common key, a public key, and a private key.
  • the transmission unit 14 repeatedly transmits an authentication request including the encryption information generated by the encryption unit 13 to the authentication device 2 within the authentication period. It is assumed that a plurality of authentication requests including each of the encrypted information in which the plurality of unique information is encrypted are transmitted within the authentication period. As described above, for example, when each unique information is different information, the encrypted information in which the different unique information is encrypted is included for each authentication request transmitted from the legitimate authenticated device 1. .. On the other hand, for example, when the unique information is duplicated, at least two authentication requests transmitted from the legitimate authenticated device 1 may include the encrypted information in which the same unique information is encrypted. .. Even in this case, a plurality of authentication requests corresponding to different unique information shall be transmitted within the authentication period.
  • a plurality of authentication requests sent during the authentication period include encrypted information in which the same unique information is encrypted, for example, the number of authentication requests including encrypted information in which the same unique information is encrypted is fixed. You may be.
  • a predetermined number of authentication requests include encrypted information in which the same unique information is encrypted, and the unique information corresponding to the encrypted information differs for each predetermined number of authentication requests. May be good.
  • the authentication request may include information other than the encrypted information.
  • the ID of the authenticated device 1 that is the source of the authentication request may be included in the authentication request.
  • each verification value corresponding to the encrypted information includes different verification data for each authentication request transmitted from the legitimate authenticated device 1.
  • the authentication request and the verification value corresponding to the encrypted information may have different transmission means.
  • the verification unit 15 generates a verification value for verification after authentication.
  • the verification value includes the time when the verification value is generated and a value such as a random number.
  • the generated verification value is encrypted by the encryption unit 13, transmitted from the transmission unit 14 to the authentication device 2, and decrypted. It is transmitted from the line communication unit 26 as verification data to be described later, and is received by the line communication unit 16 via the system server 3.
  • the verification unit 15 again verifies whether the verification value is transmitted by the authenticated device 1 itself. For example, the consistency is confirmed, such as whether the values such as the time when the verification value is generated and the random number transmitted from the authentication device 2 match the stored ones. It should be noted that it may be confirmed whether or not only the values such as random numbers stored in the period corresponding to the time when the verification value is generated match.
  • the verification value is sent each time it is authenticated. Further, it may be stored in a storage unit 12 or the like for a certain period of time, for example, one day, and the stored content may include a verification value.
  • the verification unit 15 transmits the verified verification result to the system server 3.
  • the value included in the verification value may be a random number or a cryptographic hash function value having some cryptographic property. Further, in order to save the amount of data stored in the authenticated device 1, only the generated time is transmitted so as to be different for each transmission, and the value such as the random number generated as the verification value does not differ for each transmission and is 1 second. It may be different by thinning out at regular intervals such as.
  • the verification value stored in the authenticated device 1 only the time when the verification value is generated, which is the update timing of the value such as the thinned out random number, may be stored. Note that there is information that overlaps with the unique information and the verification value, and when transmitting in the same packet, the overlapping data may be omitted.
  • the line communication unit 16 may be used for communicating with the system server 3 or may be used for other purposes. In communication with the system server 3, information necessary for maintaining the system, such as verification data including verification values, verification results, own ID, and encryption key, may be communicated. It is desirable that the line communication unit 16 and the line communication unit 36 of the system server 3 are constructed with a dedicated line, and the communication means may be, for example, a mobile line network or a wired line network.
  • the certification period is usually a predetermined time length.
  • the authentication period may start from the transmission of the first authentication request. Therefore, for example, the transmission unit 14 may start timing by the timer from the transmission of the first authentication request, and end the transmission of the authentication request when the predetermined authentication period elapses.
  • the authentication period is not particularly limited, but may be, for example, a time in the range of about 200 milliseconds to 10 seconds. As will be described later, since the authentication process in the authentication device 2 is not started until the authentication period ends, it is preferable that the authentication period is short. Therefore, the authentication time is preferably 3 seconds or less, and more preferably 1 second or less.
  • the transmission unit 14 may start transmitting the authentication request when, for example, the authenticated device 1 receives a predetermined transmission instruction.
  • the transmission instruction may be, for example, a beacon transmitted from a transmitter arranged near the authentication device 2.
  • the transmission unit 14 normally repeatedly transmits an authentication request at a predetermined time interval.
  • the time interval may be, for example, constant or indefinite. In the former case, the time interval may or may not be set. Further, even if the time interval is indefinite, the average time interval may be set. For example, when the authentication request is communicated by Bluetooth Low Energy (LE), the time interval is indefinite, but the average time interval is fixed. In any case, the time interval is equal to or greater than the minimum communication interval defined by the communication standard for transmitting the authentication request by the transmission unit 14. Further, for example, even when the authentication device 2 performs intermittent reception, it is preferable that at least one of the plurality of authentication requests is transmitted so as to be received by the authentication device 2. be.
  • LE Bluetooth Low Energy
  • the transmission cycle of the authentication request may be different from the reception cycle of the authentication device 2, and the authentication request may be transmitted at random transmission intervals.
  • the number of authentication requests transmitted by the transmission unit 14 during the authentication period may or may not be fixed. Even in the latter case, the authentication period is fixed, and the number of authentication requests sent within the authentication period, or the range of the number, is usually determined by sending the authentication requests at predetermined time intervals. It will be decided.
  • the wireless communication standard to which the transmission unit 14 transmits the authentication request does not matter.
  • the authentication request may be communicated by, for example, low power consumption of Bluetooth (hereinafter, also referred to as "BLE"), or may be communicated by BR (Basic Rate) / EDR (Enhanced Data Rate) of Bluetooth.
  • BLE Bluetooth Low Power consumption
  • BR Base Rate
  • EDR Enhanced Data Rate
  • wireless LAN IEEE802.11
  • IEEE802.5.4 such as ZigBee®
  • the authentication request is transmitted and received by short-range wireless communication such as BLE, Bluetooth BR / EDR, and wireless LAN.
  • short-range wireless communication such as BLE, Bluetooth BR / EDR, and wireless LAN.
  • the transmission unit 14 may, for example, transmit an authentication request by broadcasting or may communicate by unicast. Since the authentication request can be transmitted without specifying the communication partner, it is preferable to transmit the authentication request by broadcasting. In the present embodiment, the case where the transmission unit 14 transmits the authentication request by broadcasting will be mainly described.
  • the transmission unit 14 may or may not include a wireless transmission device (for example, an antenna) for performing transmission. Further, the transmission unit 14 may be realized by hardware, or may be realized by software such as a driver for driving a transmission device.
  • a wireless transmission device for example, an antenna
  • the transmission unit 14 may be realized by hardware, or may be realized by software such as a driver for driving a transmission device.
  • the receiving unit 21 repeatedly receives the authentication request including the encrypted information encrypted by the encryption key transmitted from the authenticated device 1 within the authentication period.
  • the source of the authentication request is usually the authenticated device 1 described above.
  • the attacker's device receives the authentication request transmitted from the authenticated device 1 and transmits the received authentication request again, or obtains unique information independently and encrypts the information. It is also possible to generate an authentication request containing the encrypted information. In that case, the receiving unit 21 cannot determine whether the authentication request is transmitted from the legitimate authenticated device 1 or the attacker's device at the time of receiving the authentication request. Therefore, the device that has transmitted the authentication request will be referred to as the authenticated device 1.
  • the authentication unit 24 uses the authentication requests to determine whether the source is the original authenticated device 1, that is, the legitimate authenticated device 1. , The attacker's device, that is, the unjustified authenticated device 1.
  • the receiving unit 21 may intermittently receive the authentication request. Intermittent reception may mean that the period for receiving information and the period for not receiving information are alternately repeated. For example, when the authentication request is transmitted by broadcast by BLE communication, such intermittent reception will be performed. Power consumption can be reduced by performing intermittent reception. When intermittent reception is performed, for example, the length of the period for receiving information and the length of the period for not receiving information may be constant or indefinite. In the present embodiment, a case where the receiving unit 21 performs intermittent reception will be mainly described.
  • the receiving unit 21 may or may not include a wireless receiving device (for example, an antenna) for performing reception. Further, the receiving unit 21 may be realized by hardware, or may be realized by software such as a driver that drives the receiving device.
  • a wireless receiving device for example, an antenna
  • the receiving unit 21 may be realized by hardware, or may be realized by software such as a driver that drives the receiving device.
  • the storage unit 22 stores the decryption key.
  • the decryption key is the key of the common key cryptography.
  • the decryption key (common key encryption key) may be stored in the storage unit 22 for each authenticated device 1.
  • the storage unit 22 may store a plurality of key correspondence information including, for example, the ID of the authenticated device 1 and the key of the common key encryption of the authenticated device 1 identified by the ID.
  • the decryption key is a private key paired with the public key of the public key cryptography.
  • the storage unit 22 stores a random number table or function for acquiring the random number value, the latest count value for generating the count value, and the like. May be good. Further, the storage unit 22 may store information such as a threshold value of the number of receptions and a reception interval in which the probability of reception is lower than the threshold value, which is used in the processing described later.
  • the process of storing information in the storage unit 22 does not matter.
  • the information may be stored in the storage unit 22 via the recording medium, the information transmitted via the communication line or the like may be stored in the storage unit 22, or
  • the information input via the input device may be stored in the storage unit 22.
  • the storage unit 22 is preferably realized by a non-volatile recording medium, but may be realized by a volatile recording medium.
  • the recording medium may be, for example, a semiconductor memory, a magnetic disk, an optical disk, or the like.
  • the decryption unit 23 decrypts the encryption information using the decryption key and acquires the decryption information. For example, when the decryption key is a common key encryption key and the authentication request includes the ID of the authenticated device 1 that is the source of the authentication request, the decryption unit 23 is associated with the ID.
  • the key of the common key encryption may be read from the storage unit 22, and the encrypted information may be decrypted by using the read common key encryption key. Further, for example, when the decryption key is a secret key, the decryption unit 23 may read the secret key from the storage unit 22 and decrypt the encrypted information using the read secret key.
  • the decrypted information in which the encrypted information included in the authentication request transmitted from the legitimate authenticated device 1 is decrypted becomes the unique information and the verification value. Therefore, if the encrypted information cannot be decrypted, or if the decrypted decryption information does not match the predetermined unique information and verification value format, the device that sent the authentication request including the encrypted information , It can be determined that the device is not a legitimate authenticated device 1.
  • the authentication unit 24 determines whether the authenticated device 1 is valid or not by using a plurality of authentication requests received within the authentication period, including the encrypted information that can be decrypted by the decryption key.
  • the decryption key is a common key encryption key, among a plurality of authentication requests received during the authentication period, a plurality of authentication requests including encryption information that can be decrypted using one common key encryption key. Will be used to authenticate the device to be authenticated 1.
  • the key of the common key encryption is different for each authenticated device 1, a plurality of authentication requests including the encryption information that can be decrypted by using the key of one common key encryption can be obtained by one authenticated device.
  • the decryption key is a private key
  • a plurality of authentication requests including the encryption information that can be decrypted using the private key of the authentication device 2 are used.
  • the authenticated device 1 is authenticated.
  • the decryption key is a private key
  • the plurality of authentication requests including the encryption information that can be decrypted using the private key include the authentication requests transmitted from the plurality of authenticated devices 1. There can be.
  • the authentication unit 24 makes a plurality of authentication requests including the same ID received within the authentication period. It may be used to determine whether the authenticated device 1 is legitimate. It should be noted that determining whether or not the authenticated device 1 is valid by using a plurality of authentication requests may mean using a plurality of authentication requests themselves, or using information related to the plurality of authentication requests. You may.
  • the information related to the plurality of authentication requests may be, for example, a plurality of decryption information acquired from each of the plurality of authentication requests, a reception interval of the plurality of authentication requests, and the number of the plurality of authentication requests. It may be other information related to a plurality of authentication requests.
  • the authentication request when the authentication request includes the ID of the authenticated device 1 that is the source of the authentication request, the authentication request that has the encryption information that can be decrypted by one common key cryptographic key is usually included in the authentication request. The same ID will be included. Therefore, when the encryption key is a symmetric key cryptographic key, the authentication unit 24 uses a plurality of authentication requests including the same ID received within the authentication period to determine whether the authenticated device 1 is valid or not. You may judge. After receiving the first authentication request from a certain authenticated device 1, the authentication unit 24 uses a plurality of authentication requests received from the authenticated device 1 within a predetermined authentication period to receive the authentication. The authentication device 1 may be authenticated.
  • the authentication unit 24 determines that the authenticated device 1 is not valid when, for example, all of the plurality of authentication requests received during a certain authentication period are transmitted from the invalid authenticated device 1. .. Further, for example, even if a plurality of authentication requests received during a certain authentication period include an authentication request transmitted from an invalid device, the authentication unit 24 transmits the plurality of authentication requests to the authenticated device. Judge that 1 is not valid. That is, even when a plurality of authentication requests are transmitted from a legitimate authenticated device 1 and an unauthorized authenticated device 1, the authenticated device 1 that is the source of the plurality of authentication requests is not valid. Will be judged. In this case, the source of the authentication request includes at least the attacker's device, and even if the legitimate authenticated device 1 is included in the source, it is not possible to distinguish between the two. Both will be judged to be unjustified.
  • the authentication unit 24 transmits the verification data including the authentication content and the verification value after the authentication through the line communication unit 26 via the system server 3. It should be noted that instead of after the certification, it may be after the certification period has expired. In addition, the verification value may be used without including the authentication content in the verification data.
  • the line communication unit 26 may be used for communicating with the system server 3 or may be used for other purposes. In the communication with the system server 3, information necessary for maintaining the system such as transmission of verification data described later and ID of the authenticated device 1 and an encryption key may be communicated. It is desirable that the line communication unit 26 and the line communication unit 36 of the system server 3 are constructed with a dedicated line, and the communication means may be, for example, a mobile line network or a wired line network.
  • the system server 3 verifies that the authenticated device 1 has been authenticated by the authentication device 2, and is for maintaining and maintaining the system. It may be used for other purposes.
  • the server authentication unit 35 transmits the verification data transmitted from the authentication device 2 via the general circuit communication unit 36 to the authenticated device 1, and uses the verification result verified by the authenticated device 1 to maintain the entire system. To determine. For example, when the possibility of unauthorized use or unauthorized use is received from the authenticated device 1 as a verification result, the encryption key of the authenticated device 1 may be deleted and stopped, or updated and a new one may be issued. can. In addition, verification of unauthorized use can be urged to the system administrator, the user of the authenticated device 1, and the administrator of the authentication device 2. It is desirable that the system server 3 is independent of the authenticated device 1 and the authentication device 2, but it may be installed in the authentication device 2, and the authentication device 2 is the server authentication unit of the system server 3. It may have a function.
  • the authentication unit 24 may determine that the authenticated device 1 is not valid when, for example, a predetermined number or more of duplicates exist in a plurality of decrypted information, and for example, an authentication request is predetermined in a predetermined period. If it is received more than the number of times, it may be determined that the authenticated device 1 is not valid. Further, for example, when the reception interval of the authentication request in the authentication period includes a reception interval whose probability is lower than the threshold value, it may be determined that the authenticated device 1 is not valid, and for example, it is received during the authentication period.
  • the authentication unit 24 may determine whether or not the plurality of decrypted information is consistent with the unique information, for example, with respect to a set of the plurality of decrypted information. For example, when the unique information is a count value, the authentication unit 24 determines that the plurality of decrypted information matches the unique information when the plurality of decrypted information according to the received order meets the count value rule. It may be determined that the plurality of decrypted information is inconsistent with the unique information when it is not determined.
  • a plurality of decryption information is “2”, “4", “6”, “8” ...
  • the unique information generation rule is an increment of two
  • a plurality of decryption information is provided. Since the decrypted information of the above conforms to the unique information generation rule, the authentication unit 24 determines that the plurality of decrypted information is consistent with the unique information.
  • the unique information generation rule is incremented by two.
  • the authentication unit 24 determines that the plurality of decrypted information does not match the unique information. Further, for example, when the unique information is a time, the authentication unit 24 has a time difference which is a difference between the time which is the decryption information and the reception time of the authentication request corresponding to the decryption information for a plurality of decryption information. When the acquired multiple time differences are constant, it is determined that the plurality of decoded information is consistent with the unique information, and when the acquired multiple time differences are not constant, the plurality of decoded information is the unique information. It may be determined that it is inconsistent with.
  • the authenticated device 1 and the authentication device 2 usually perform wireless communication over a short distance, and the delay caused by the wireless communication is considered to be substantially constant for a plurality of authentication requests.
  • the fact that the plurality of time differences are constant may mean that, for example, the difference between the maximum value and the minimum value of the plurality of time differences is smaller than a predetermined threshold value, and the variation of the plurality of time differences.
  • the variance eg, variance, standard deviation, etc.
  • the authentication unit 24 determines that the decryption information corresponding to the authentication request received at the time point A, for example, when the time of the decryption information does not increase according to the order of reception.
  • the time of time indicates a time point after the time point A, which is the decryption information corresponding to the authentication request received at the time point B
  • the plurality of decryption information must be consistent with the unique information. You may judge. In that case, it is considered that the authentication request received at time B is a copy and transmission of the authentication request sent before the authentication request received at time A by the attacker's device. be.
  • the authentication unit 24 transmits the verification data including the authentication content and the verification value to the authenticated device 1 via the line communication unit 26 via the system server 3.
  • the verification value included in the authentication request may be selected, one may be randomly selected from the verification values included in the plurality of authentication requests during the authentication period, or a plurality of verification values during the authentication period may be selected. You may choose the verification value included in the first received authentication request. Further, the verification data may be sent a plurality of times after the authentication period or the end of the authentication period, or may be sent only once. The verification data may be transmitted even if the authentication is not performed by the authentication unit 24. The authentication unit 24 may directly transmit to the authenticated device 1 without going through the system server 3.
  • the authentication unit 24 may determine whether or not the plurality of decryption information matches the verification value, for example, for a set of a plurality of decryption information. For example, the authentication unit 24 determines the time difference, which is the difference between the time when the verification value included in the verification value is generated and the time when the verification value is received, with respect to the time when the verification value included in the plurality of decryption information is generated.
  • the time difference which is the difference between the time when the verification value included in the verification value is generated and the time when the verification value is received, with respect to the time when the verification value included in the plurality of decryption information is generated.
  • the plurality of decoded information matches the verification value, and when the acquired multiple time differences are not constant, the plurality of decoded information is the verification value. It may be determined that they are inconsistent.
  • the decrypted information is matched with the time when the verification value included in the verification value is generated. You can properly judge whether or not you are doing it.
  • the authenticated device 1 and the authentication device 2 usually perform wireless communication over a short distance, and the delay caused by the wireless communication is considered to be substantially constant for a plurality of authentication requests.
  • the fact that the plurality of time differences are constant may mean that, for example, the difference between the maximum value and the minimum value of the plurality of time differences is smaller than a predetermined threshold value, and the variation of the plurality of time differences.
  • the variance may be less than a predetermined threshold.
  • the authentication unit 24 when the time at which the verification value included in the verification value is generated does not increase according to the order of reception, for example, the authentication unit 24 generates the verification value included in the verification value received at time point A. Determines that the plurality of decoded information does not match the verification value when indicating a time point after the time point A and the time point after the time point in which the verification value included in the verification value received at the time point B is generated is indicated. You may. In that case, it is considered that the verification value received at time B is a verification value transmitted before the verification value received at time A, which is copied and transmitted by the attacker's device. be.
  • the output unit 25 outputs the determination result by the authentication unit 24.
  • This determination result is information indicating whether the authenticated device 1 is legitimate or not, that is, whether the authenticated device 1 is authenticated or not. It is preferable that the output unit 25 outputs the determination result by the authentication unit 24 to a configuration or device that performs processing according to the authentication result.
  • the system server 3 transmits the verification data received from the authentication device 2 to the target authenticated device 1 via the line communication unit 26, the line communication unit 36, and the line communication unit 16 in, for example, about 5 minutes. If transmission is not possible, for example, transmission is repeated with a threshold value of about 3 days. If the transmission cannot be performed by the threshold value, it is determined that the authenticated device 1 is not used, and the system server 3 is notified of the possibility of unauthorized use as a verification result. For example, for safety, a temporary suspension process may be performed.
  • the authenticated device 1 When the authenticated device 1 receives the verification data, it collates with the data holding the verification value. If they do not match as a result of collation, the system server 3 is notified of unauthorized use as a verification result. For example, for safety reasons, the process of suspension of use may be performed. If they match, you may confirm the user's use. If it is found that the system server is not being used, the system server 3 may be notified of the possibility of unauthorized use as a verification result. When the use is confirmed, the system server 3 may be notified of the legitimate use as a verification result. Since it is necessary to log in to the authenticated device 1 and the target application in order to confirm the judgment result, it is possible to restrict the use when the authenticated device 1 is not in the user's hand. It becomes.
  • the output of the confirmation of the user's use may be, for example, a display on a display device (for example, a liquid crystal display, an organic EL display, etc.), a transmission to a predetermined device via a communication line, or a printer. It may be printed by the printer, it may be output by a speaker, it may be notified by vibration, it may be stored in a recording medium, or it may be delivered to another component.
  • the output unit 25 may or may not include a device that outputs (for example, a display device, a communication device, a printer, etc.). Further, the output unit 25 may be realized by hardware, or may be realized by software such as a driver that drives those devices.
  • FIG. 2 is a flowchart showing an authentication request transmission method, which is a process after the authenticated device 1 determines to start transmitting the authentication request.
  • the authenticated device 1 may determine that the transmission of the authentication request is started when, for example, a predetermined transmission instruction is received.
  • Step S101 The transmission unit 14 starts the authentication period.
  • the transmission unit 14 may start timing by a timer, for example, in order to detect the end of the authentication period.
  • Step S102 The transmission unit 14 determines whether to transmit the authentication request. Then, if the authentication request is transmitted, the process proceeds to step S103, and if not, the process proceeds to step S107. For example, when the authentication request is transmitted at a predetermined time interval, the transmission unit 14 may determine that the authentication request is transmitted at the predetermined time interval.
  • the acquisition unit 11 acquires unique information.
  • the acquisition of the unique information may be performed, for example, by acquiring the unique portion and combining the acquired unique portion and the non-unique portion.
  • the verification unit 15 generates a verification value for verification after authentication.
  • the verification value consists of the time when the verification value is generated and a value such as a random number. Further, the generated verification value may be different for each transmission, or may be different for each fixed period such as 1 second.
  • Step S105 The encryption unit 13 uses the encryption key to encrypt the unique information acquired in step S103 and the verification value to generate the encrypted information.
  • Step S106 The transmission unit 14 transmits an authentication request including the encryption information generated in step S105.
  • the authentication request may include information other than the encrypted information. Then, the process returns to step S102.
  • Step S107 The transmission unit 14 determines whether to end the transmission of the authentication request. Then, when it ends, a series of processes for transmitting the authentication request ends, and if not, the process returns to step S102.
  • the transmission unit 14 may determine that the transmission of the authentication request ends, for example, when the authentication period started in step S101 ends. Specifically, the transmission unit 14 determines that the transmission of the authentication request is terminated when the value of the timer that started timing in step S101 exceeds the time length of the authentication period, and if not, the transmission unit 14 determines that the transmission of the authentication request is terminated. , You may decide that it will not end.
  • the flowchart of FIG. 2 shows a case where acquisition of unique information, generation of encrypted information, and transmission of an authentication request are repeated, but this may not be the case. For example, after a plurality of unique information is acquired and a plurality of encrypted information in which the plurality of unique information is encrypted is generated, transmission of an authentication request including each encrypted information may be repeated. In addition, when the encrypted information in which the same unique information is encrypted is included in a plurality of authentication requests, the unique information is not acquired or the encrypted information is not generated, and the same unique information or the same unique information is used. , The same encrypted information may be used repeatedly. Further, the management of the authentication period in steps S101 and S107 may be performed by a component other than the transmission unit 14, for example, the acquisition unit 11. Further, the order of processing in the flowchart of FIG. 2 is an example, and the order of each step may be changed as long as the same result can be obtained.
  • FIG. 3 is a flowchart showing an authentication method which is a process related to authentication of the authenticated device 1 using a plurality of authentication requests by the authentication device 2.
  • Step S201 The receiving unit 21 determines whether or not the authentication request has been received. Then, if the authentication request is received, the process proceeds to step S202, and if not, the process proceeds to step S203.
  • the receiving unit 21 may receive the authentication request only during the receiving period and may not receive the authentication request during the period other than the receiving period. ..
  • Step S202 The decryption unit 23 decrypts the encryption information included in the authentication request received in step S201 using the decryption key, and acquires the decryption information. Then, the process returns to step S201.
  • the decoding unit 23 may store the decrypted information in the storage unit 22 in association with the ID of the authenticated device 1 that is the source of the authentication request. Further, the decoding unit 23 may store the decoding information in the storage unit 22 in association with the reception time of the authentication request corresponding to the decoding information. If the encryption information included in the authentication request received in step S201 cannot be decrypted using the decryption key, the decryption unit 23 may return to step S201 without decrypting. Further, in this case, the authentication unit 24 may determine that the authenticated device 1 that is the source of the authentication request containing the encryption information that cannot be decrypted is not valid.
  • Step S203 The authentication unit 24 determines whether or not to perform the authentication process. Then, if the authentication process is performed, the process proceeds to step S204, and if not, the process returns to step S201.
  • the authentication unit 24 could decrypt with the common key encryption key when the authentication period elapses after receiving the first authentication request including the encryption information that could be decrypted with the common key encryption key. It may be determined that the authentication process using a plurality of authentication requests including the encrypted information is performed. Further, the authentication unit 24, for example, receives a plurality of authentications transmitted from the authenticated device 1 of the ID when the authentication period elapses after receiving the first authentication request from the authenticated device 1 of the ID. It may be determined that the authentication process using the request is performed.
  • Step S204 The authentication unit 24 determines whether or not a predetermined number or more of duplicates exist in the plurality of decryption information acquired from each of the plurality of authentication requests. Then, if there are a predetermined number or more of duplicates in the plurality of decoded information, the process proceeds to step S209, and if not, the process proceeds to step S205.
  • Step S205 The authentication unit 24 determines whether or not the number of times the authentication request is received in a predetermined period exceeds the number of times of the predetermined threshold value. Then, if the number of times the authentication request is received exceeds the number of times of the predetermined threshold value, the process proceeds to step S209, and if not, the process proceeds to step S206.
  • Step S206 The authentication unit 24 determines whether or not the reception interval of the authentication request in the authentication period includes a reception interval whose probability is lower than the threshold value. Then, if the reception interval of the authentication request includes a reception interval whose probability is lower than the threshold value, the process proceeds to step S209, and if not, the process proceeds to step S207.
  • Step S207 The authentication unit 24 determines whether or not the plurality of decryption information corresponding to each of the plurality of authentication requests received during the authentication period is consistent with the unique information. Then, if the plurality of decoded information matches the unique information, the process proceeds to step S208, and if they do not match, the process proceeds to step S209.
  • step S204 to step S207 are performed for a plurality of authentication requests received within the authentication period, including, for example, the encrypted information decrypted by the decryption key. That is, the processes from step S204 to step S207 may be performed on, for example, a plurality of authentication requests received from the authenticated device 1 of a certain ID within the authentication period.
  • Step S208 The authentication unit 24 determines that the authenticated device 1 that has transmitted a plurality of authentication requests is valid. That is, the authenticated device 1 has been authenticated.
  • Step S209 The authentication unit 24 determines that the authenticated device 1 that has transmitted a plurality of authentication requests is not valid. That is, the authenticated device 1 has not been authenticated.
  • Step S210 The output unit 25 outputs the determination results of steps S208 and S209.
  • the authentication unit 24 selects one verification value included in the decryption information.
  • Step S212 The authentication unit 24 transmits the verification value together with the authentication content as verification data to the system server 3. Then, the process returns to step S201. It should be noted that it may be transmitted directly to the authenticated device 1.
  • the flowchart of FIG. 3 shows a case where each process from step S204 to step S207 is performed in the authentication process, but it is not necessary. Of those processes, one or more processes need not be performed. However, even in that case, it is preferable that the authentication process using a plurality of authentication requests, for example, at least one of the processes from step S204 to step S206 is performed. Further, the order of processing in the flowchart of FIG. 3 is an example, and the order of each step may be changed as long as the same result can be obtained. For example, each process from step S204 to step S207 may be in a different order. Further, steps S211 and S212 may be executed a plurality of times after the authentication period or the end of the authentication period, or may be executed only once. Further, in the flowchart of FIG. 3, the process ends when the power is turned off or an interrupt for the end of the process occurs.
  • FIG. 4 is a flowchart showing a method of receiving the verification data transmitted to the authentication device 2 and transmitting the verification data to the authenticated device 1.
  • Step S301 The server authentication unit 35 determines whether or not the verification data transmitted from the authentication device 2 has been received. Then, when the verification data is received, the process proceeds to step S302, and if not, the process returns to step S301.
  • Step S302 The line communication unit 36 transmits the verification data to the corresponding authenticated device 1.
  • Step S303 The server authentication unit 35 confirms whether the verification data can be transmitted to the corresponding authenticated device 1. Then, if it is possible, the process returns to step S301, and if not, the process proceeds to step S304.
  • Step S304 The server authentication unit 35 determines whether or not the time elapsed from the time when the verification data is transmitted to the corresponding authenticated device 1 is within the threshold value. Then, if it is within the threshold time, the process proceeds to step S302, and if not, the process proceeds to step S305.
  • Step S305 The server authentication unit 35 outputs the possibility of unauthorized use as a verification result because the verification data could not be transmitted to the corresponding authenticated device 1. Further, the verification data may be resent to the corresponding authenticated device 1, or the encryption key may be deleted to stop the use in order to prevent unauthorized use.
  • S301 in the flowchart of FIG. 4 may be executed a plurality of times or may be executed only once when a plurality of verification data are received for the same verification content. Further, the flow of the system server 3 may be executed by the authentication device 2, and the authentication device 2 may directly communicate with the authenticated device 1.
  • FIG. 5 is a flowchart showing a processing method related to verification of the authenticated device 1 using verification data by the system server 3.
  • Step S111 The line communication unit 16 determines whether or not the verification data has been received. Then, when the verification data is received, the process proceeds to step S112, and if not, the process returns to step S111.
  • Step S112 The verification unit 15 collates the verification value in the verification data with the retained data.
  • Step S113 The verification unit 15 determines whether or not the verification value in the verification data matches the retained data. Then, if they match, the process proceeds to step S114, and if not, the process proceeds to step S116.
  • Step S114 The verification unit 15 causes the user of the authenticated device 1 to confirm the validity of the authentication content in the verification data. If the validity is confirmed, the process proceeds to step S115, and if not, the process proceeds to step S117.
  • Step S115 The line communication unit 16 transmits to the line communication unit 36 that the validity of the use is confirmed as a verification result, and returns to step S111.
  • Step S116 The line communication unit 16 transmits to the line communication unit 36 that it is an unauthorized use as a verification result, and returns to step S111.
  • Step S117 The line communication unit 16 transmits the possibility of unauthorized use to the line communication unit 36 as a verification result, and returns to step S111.
  • FIG. Figure 6 Is a flowchart showing the operation of the system server 3 based on the verification result from the authenticated device 1.
  • Step S311 The line communication unit 36 determines whether or not the verification result has been received. Then, when the verification result is received, the process proceeds to step S312, and if not, the process returns to step S311.
  • Step S312 The server authentication unit 35 determines whether the verification result is unauthorized use. Then, if it is an unauthorized use, the process proceeds to step S314, and if not, the process proceeds to step S313.
  • Step S313 The server authentication unit 35 determines whether the verification result may be used illegally. Then, if there is a possibility of unauthorized use, the process proceeds to step S314, and if not, the process returns to step S311.
  • Step S314 The server authentication unit 35 takes measures to prevent unauthorized use. For example, the encryption key of the authenticated device 1 can be deleted and stopped, or updated and a new one can be issued. In addition, verification of unauthorized use can be urged to the system administrator, the user of the authenticated device 1, and the administrator of the authentication device 2. After that, the process returns to step S311.
  • Step S315) The server authentication unit 35 takes measures to prevent unauthorized use, such as suspending a part of the use, in consideration of the possibility of unauthorized use. After that, the process returns to step S311.
  • step S312 and step S315 are performed in the verification process, but it is not necessary. Of those processes, one or more processes need not be performed. However, even in that case, it is preferable that at least one of the verification processes, for example, step S312 and step S314, or step S313 and step S315, is performed. Further, the order of processing in the flowchart of FIG. 6 is an example, and the order of each step may be changed as long as the same result can be obtained. For example, the processes of step S312 and step S313 may be performed in different orders. Further, steps S314 and S315 may be executed each time, or may be executed for one group of target authenticated devices as a batch process after a certain period of time has elapsed.
  • the receiving unit 21 of the authentication device 2 is assumed to receive the authentication request intermittently. That is, the receiving unit 21 receives the authentication request only during the receiving period, and does not receive the authentication request transmitted from the authenticated device 1 during the other period.
  • the legitimate authenticated device 1 shall transmit 10 authentication requests during the authentication period.
  • the authentication unit 24 since the receiving unit 21 performs intermittent reception, the authentication unit 24 receives when the number of authentication requests received from a certain authenticated device 1 during the authentication period exceeds the threshold value “7”. It shall be determined that the authenticated device 1 is not valid.
  • the unique information is the time. Then, when the difference between the time of the decryption information and the time when the authentication request corresponding to the decryption information is received exceeds a predetermined threshold value, the authentication unit 24 transmits the authentication request. It shall be determined that the authentication device 1 is not valid.
  • the unique information shall be encrypted by the key of common key cryptography.
  • the transmission unit 14 of the authenticated device 1 receives the transmission instruction including the ID of the authentication device 2 transmitted from the authentication device 2, the timer starts timing (step S101). It is assumed that the time at that time was t1. Further, the authenticated device 1 determines that the transmission instruction has been transmitted from the authentication device 2 by, for example, matching the ID of the authentication device 2 stored in the storage unit 12 with the ID included in the transmission instruction. You may. Further, since it is the transmission of the first authentication request, the transmission unit 14 determines that the authentication request is immediately transmitted without waiting for a time, and acquires the unique information to the acquisition unit 11 by a route (not shown). The instruction is passed (step S102).
  • the acquisition unit 11 Upon receiving the instruction, the acquisition unit 11 acquires the unique information at the time t1 at that time and passes it to the encryption unit 13 (step S103).
  • the encryption unit 13 Upon receiving the time t1 which is unique information, the encryption unit 13 acquires the ID of the authenticated device 1 stored in the storage unit 12, and also acquires the transmission instruction or the ID of the authentication device 2 from the storage unit 12. , Time t1, the ID of the authenticated device 1 and the ID of the authenticated device 2 are encrypted using the common key encryption key stored in the storage unit 12 to generate encrypted information, which is then sent to the transmission unit 14. Pass (step S105).
  • the transmitting unit 14 Upon receiving the encrypted information, the transmitting unit 14 transmits the authentication request including the encrypted information and the ID of the authenticated device 1 acquired from the storage unit 12 by broadcasting the BLE communication (step S106). By repeating the transmission of such an authentication request, 10 authentication requests are transmitted from the authenticated device 1 to the authentication device 2 by the time t10 (steps S102 to S106). If the value of the timer started at time t1 immediately after the tenth authentication request is transmitted at time t10 exceeds the time length of the authentication period, the process of transmitting the authentication request ends. (Step S107).
  • the decryption unit 23 acquires the ID of the authenticated device 1 included in the authentication request, and obtains the key of the common key encryption associated with the ID. Obtained from the storage unit 22. Using the key of the common key encryption thus acquired, the decryption unit 23 decrypts the encryption information included in the received authentication request and acquires the decryption information (step S202).
  • the decoding unit 23 determines whether or not the ID of the authenticated device 1 included in the decrypted information matches the ID of the authenticated device 1 included in the authentication request in plain text, and whether the ID of the authenticated device 2 included in the decrypted information is matched. It is determined whether or not the ID matches the ID of the own device. In this case, it is assumed that the IDs match in each case. Then, the decoding unit 23 stores the decryption information in the storage unit 22 in association with the ID of the authenticated device 1 included in the authentication request and the reception time of the authentication request. If any one of the IDs does not match, the decoding unit 23 does not have to store the decoding information in the storage unit 22. Such processing is repeated every time an authentication request is received.
  • the authentication unit 24 has checked whether the period from the oldest reception time to the current time exceeds the time length of the authentication period for each ID of the authenticated device 1. Please judge. Then, when there is an ID in which the period from the oldest reception time to the current time exceeds the time length of the authentication period, the authentication unit 24 authenticates the authenticated device 1 of the ID. It is determined that the process is to be performed, and the authentication process is performed using the plurality of decryption information and the reception time stored in association with the ID (step S203).
  • the authentication unit 24 determines whether or not there is duplication in the decrypted information (step S204). In this case, since each decrypted information includes a different time, the decrypted information will not be duplicated. Therefore, the authentication unit 24 determines whether or not the number of receptions exceeds the threshold value (step S205). In this specific example, it is assumed that the threshold value is set to "7" as described above. Then, as shown in FIG. 7, it is determined that the number of receptions "6" does not exceed the threshold value "7".
  • the authentication unit 24 uses the reception time stored in the storage unit 22 to acquire reception intervals, which are time intervals from the reception of a certain authentication request to the reception of the next authentication request. .. Then, it is determined whether or not the reception interval includes the reception interval stored in the storage unit 22 whose probability is lower than the threshold value (step S206). In this case, it is assumed that the reception interval whose probability is lower than the threshold value is not included. Therefore, the authentication unit 24 determines whether or not the decrypted information matches the unique information (step S207). Here, it is assumed that it is determined whether or not the time, which is a unique part of the decrypted information, matches the reception time.
  • the authentication unit 24 determines the difference. It shall be determined that the decrypted information is consistent with the unique information. Then, the authentication unit 24 makes such a determination for each decryption information. In this specific example, it is assumed that all the decrypted information is determined to be consistent with the unique information. Then, the authentication unit 24 determines that the authenticated device 1 that has transmitted the plurality of authentication requests is valid (step S208). Then, the output unit 25 outputs the determination result (step S209).
  • the decryption information or the like corresponding to the ID of the authenticated device 1 to be determined, which is stored in the storage unit 22, may be deleted, or the decryption information or the like has been processed.
  • a flag or the like to that effect may be set. In the latter case, the decryption information or the like for which the flag or the like indicating that the processing has been completed shall not be used in the subsequent authentication processing.
  • a plurality of authentication requests including encrypted information in which unique information is encrypted can be transmitted to the authentication device 2.
  • the encryption can be performed using the key of the common key encryption, the encryption can be performed at a higher speed.
  • the unique information includes a random number value, a counter value, a time, etc.
  • the amount of information of the unique information can be reduced, and as a result, the amount of information included in the authentication request can be reduced. Therefore, even a communication standard having a limited payload length, such as BLE communication, can transmit an authentication request. Further, as described above, authentication can be performed without intervention by the user, and the convenience of the user can be improved.
  • secure authentication can be realized by a simple process by using a plurality of authentication requests transmitted from the authenticated device 1.
  • the process of decrypting the encrypted information can be performed at high speed. If the key of the common key cryptography is not leaked or the type of unique information is not known, the attacker's device sends the authentication request received from the legitimate authenticated device 1 to the authentication device 2. You can only attack by sending.
  • the authenticated device 1 since it is determined whether or not the authenticated device 1 is valid by using a plurality of authentication requests, it is possible to detect fraud that cannot be detected by only one authentication request, which is safe. It is possible to improve the sex. Further, even when the authentication device 2 receives the authentication request intermittently as in BLE communication, the above authentication can be appropriately performed. Further, by receiving such an intermittent authentication request, the power consumption in the authentication device 2 can be reduced.
  • the authentication unit 24 is authenticated by a determination regarding duplication of decrypted information, a determination regarding the number of times the authentication request is received, a determination regarding the reception interval of the authentication request, and a determination regarding the consistency between the decrypted information and the unique information.
  • the authentication unit 24 may determine whether or not the authenticated device 1 is legitimate by at least one of those determinations. ..
  • the authenticated device 1 and the authenticated device 2 according to the above embodiment may be used to complement other authentication methods.
  • face authentication may be used in combination with the authentication in the above embodiment.
  • authentication using an IC card or the like has been separately used in combination, but authentication according to the above embodiment and face recognition are used in combination.
  • biometric authentication other than face authentication or authentication other than biometric authentication, for example.
  • the authenticated device 1 may be, for example, held by a user or mounted on a mobile body. In the latter case, for example, it becomes possible to authenticate the mobile body.
  • the moving body may be, for example, a traveling body or a flying body.
  • each process or each function may be realized by centralized processing by a single device or a single system, or distributed processing by a plurality of devices or a plurality of systems. It may be realized by.
  • the transfer of information performed between the respective components depends on, for example, one of the components when the two components that transfer the information are physically different. It may be performed by outputting information and accepting information by the other component, or if the two components that pass the information are physically the same, one component. It may be performed by moving from the processing phase corresponding to the above to the processing phase corresponding to the other component.
  • each component information related to the processing executed by each component, for example, information received, acquired, selected, generated, transmitted, or received by each component.
  • information such as threshold values, mathematical formulas, and addresses used by each component in processing may be temporarily or for a long period of time in a recording medium (not shown) even if it is not specified in the above description.
  • each component or a storage unit may store information on a recording medium (not shown). Further, the information may be read from the recording medium (not shown) by each component or a reading unit (not shown).
  • the information used in each component or the like for example, the information such as the threshold value and the address used in the processing by each component and various setting values may be changed by the user, the above Although not specified in the description, the user may or may not be able to change the information as appropriate.
  • the change is realized by, for example, a reception unit (not shown) that receives a change instruction from the user and a change unit (not shown) that changes the information in response to the change instruction. You may.
  • the reception unit may accept the change instruction from, for example, an input device, information transmitted via a communication line, or information read from a predetermined recording medium. ..
  • the authenticated device 1 when two or more components included in the authenticated device 1 have a communication device, an input device, or the like, even if the two or more components physically have a single device. Well, or may have separate devices. The same applies to the authentication device 2.
  • each component may be configured by dedicated hardware, or a component that can be realized by software may be realized by executing a program.
  • each component can be realized by a program execution unit such as a CPU reading and executing a software program recorded on a recording medium such as a hard disk or a semiconductor memory.
  • the program execution unit may execute the program while accessing the storage unit or the recording medium.
  • the software that realizes the authenticated device 1 in the above embodiment is the following program. In other words, this program has a step of acquiring unique information on the computer, a step of generating a verification value and verifying whether the authentication was valid after the authentication of the authentication device, and a step of encrypting the unique information and the verification value with an encryption key.
  • the step of generating the encrypted information, the step of repeatedly sending the authentication request including the encrypted information to the authentication device within the authentication period, and the step of saving the generated verification value are executed, and a plurality of unique information is generated.
  • the software that realizes the authentication device 2 in the above embodiment is the following program. That is, this program sends an authentication request to the computer, including the encryption information encrypted by the encryption key, sent from the authenticated device, and the encryption information encrypted by the encryption key sent from the authenticated device. Using multiple authentication requests received within the authentication period, including the step of repeatedly receiving the including authentication request within the authentication period, the step of decrypting the encryption information and acquiring the decryption information, and the step of decrypting the decrypted encryption information. The step of determining whether the authenticated device is legitimate and the step of outputting the determination result in the step of determining whether the authenticated device is legitimate are executed, and the legitimate authenticated device has a plurality of unique information. It is a program that sends a plurality of authentication requests including encrypted information each encrypted within the authentication period.
  • processing that is performed only by hardware for example, a modem or interface card in the transmitting step or receiving step. At least the processing performed by such as is not included.
  • this program may be executed by being downloaded from a server or the like, and the program recorded on a predetermined recording medium (for example, an optical disk such as a CD-ROM, a magnetic disk, a semiconductor memory, etc.) is read out. May be performed by. Further, this program may be used as a program constituting a program product.
  • a predetermined recording medium for example, an optical disk such as a CD-ROM, a magnetic disk, a semiconductor memory, etc.
  • the number of computers that execute this program may be singular or plural. That is, centralized processing may be performed, or distributed processing may be performed.
  • FIG. 8 is a diagram showing an example of a computer system 900 that executes the above program and realizes the authenticated device 1 and the authentication device 2 according to the above embodiment.
  • the above embodiment can be realized by computer hardware and a computer program executed on the computer hardware.
  • the computer system 900 is connected to the MPU (Micro Processing Unit) 911, a program such as a bootup program, a ROM 912 such as an application program, a system program, and a flash memory for storing data, and the MPU 911.
  • MPU Micro Processing Unit
  • a wired communication module may be provided instead of the wireless communication module 915.
  • a display and an input device such as a mouse or a keyboard may be provided.
  • the program for causing the computer system 900 to execute the functions of the authenticated device 1 and the authentication device 2 according to the above embodiment may be stored in the ROM 912 via the wireless communication module 915.
  • the program is loaded into RAM 913 at run time.
  • the program may be loaded directly from the network.
  • the program does not necessarily have to include the computer system 900, an operating system (OS) that executes the functions of the authenticated device 1 and the authentication device 2 according to the above embodiment, a third-party program, and the like.
  • the program may contain only parts of instructions that call the appropriate functions or modules in a controlled manner to achieve the desired result. It is well known how the computer system 900 works, and detailed description thereof will be omitted.
  • the authentication verification system, the authenticated device, the authentication device, the authentication verification method, the authentication verification program, the computer-readable recording medium, and the recording device according to the present invention are, for example, in a cash register, an automatic ticket gate, or the like. It can be used for authentication in payment and presentation of tickets.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Le problème décrit par la présente invention est de permettre d'obtenir, par un traitement simple, une authentification sécurisée adaptée aux vulnérabilités et aux attaques. La solution selon l'invention porte sur un dispositif 1 à authentifier qui comporte : une unité de transmission 14 permettant de transmettre une demande d'authentification comprenant des informations chiffrées à un dispositif d'authentification 2 de façon répétée dans une période d'authentification ; une unité de chiffrement 13 permettant de générer des informations chiffrées par chiffrement d'informations uniques et une valeur de vérification à l'aide d'une clé de chiffrement ; une unité d'acquisition 11 permettant de générer des informations uniques ; une unité de vérification 15 permettant de générer une valeur de vérification et de déterminer la validité d'authentification suite à l'authentification par le dispositif d'authentification ; et une unité de mémorisation 12 permettant de mémoriser la valeur de vérification générée. Le dispositif d'authentification 2 est pourvu : d'une unité de réception 21 permettant de recevoir, de façon répétée dans une période d'authentification, la demande d'authentification transmise à partir du dispositif 1 à authentifier comprenant les informations chiffrées chiffrées à l'aide de la clé de chiffrement ; d'une unité de déchiffrement 23 permettant d'acquérir des informations déchiffrées par déchiffrement des informations chiffrées ; d'une unité d'authentification 24 permettant de déterminer si le dispositif 1 à authentifier est valide à l'aide d'une pluralité de demandes d'authentification reçues dans la période d'authentification comprenant les informations chiffrées qui ont été déchiffrées avec succès, et de transmettre au dispositif 1 des données de vérification authentifiées comprenant une valeur de vérification après la détermination d'authentification ; et d'une unité de sortie 25 permettant de délivrer un résultat de la détermination effectuée par l'unité d'authentification.
PCT/JP2021/015368 2020-04-14 2021-04-13 Système de vérification d'authentification, dispositif à authentifier, dispositif d'authentification, procédé de vérification d'authentification, programme de vérification d'authentification et support d'informations lisible par ordinateur et dispositif enregistré WO2021210594A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2020-087024 2020-04-14
JP2020087024A JP2021170757A (ja) 2020-04-14 2020-04-14 認証検証システム、被認証装置、認証装置、認証検証方法、認証検証プログラム及びコンピュータで読み取り可能な記録媒体並びに記録した機器

Publications (1)

Publication Number Publication Date
WO2021210594A1 true WO2021210594A1 (fr) 2021-10-21

Family

ID=78084557

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2021/015368 WO2021210594A1 (fr) 2020-04-14 2021-04-13 Système de vérification d'authentification, dispositif à authentifier, dispositif d'authentification, procédé de vérification d'authentification, programme de vérification d'authentification et support d'informations lisible par ordinateur et dispositif enregistré

Country Status (2)

Country Link
JP (1) JP2021170757A (fr)
WO (1) WO2021210594A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114900337A (zh) * 2022-04-19 2022-08-12 贵州电网有限责任公司 一种适用于电力芯片的认证加密方法及系统

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7496177B1 (ja) 2024-01-17 2024-06-06 Sinumy株式会社 被認証装置、認証装置、認証要求出力方法、認証方法、及びプログラム

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002279373A (ja) * 2001-03-15 2002-09-27 Nippon Telegr & Teleph Corp <Ntt> 複数icカード間及び同一icカード内のアプリケーション連携方法
WO2007026745A1 (fr) * 2005-08-30 2007-03-08 Matsushita Electric Industrial Co., Ltd. Systeme de surveillance de dispositif sans fil
WO2020080301A1 (fr) * 2018-10-15 2020-04-23 PaylessGate株式会社 Dispositif authentifié, dispositif d'authentification, procédé de transmission de demande d'authentification, procédé d'authentification et programme associé

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002279373A (ja) * 2001-03-15 2002-09-27 Nippon Telegr & Teleph Corp <Ntt> 複数icカード間及び同一icカード内のアプリケーション連携方法
WO2007026745A1 (fr) * 2005-08-30 2007-03-08 Matsushita Electric Industrial Co., Ltd. Systeme de surveillance de dispositif sans fil
WO2020080301A1 (fr) * 2018-10-15 2020-04-23 PaylessGate株式会社 Dispositif authentifié, dispositif d'authentification, procédé de transmission de demande d'authentification, procédé d'authentification et programme associé

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114900337A (zh) * 2022-04-19 2022-08-12 贵州电网有限责任公司 一种适用于电力芯片的认证加密方法及系统
CN114900337B (zh) * 2022-04-19 2024-04-05 贵州电网有限责任公司 一种适用于电力芯片的认证加密方法及系统

Also Published As

Publication number Publication date
JP2021170757A (ja) 2021-10-28

Similar Documents

Publication Publication Date Title
US8112787B2 (en) System and method for securing a credential via user and server verification
CN102215221B (zh) 从移动设备对计算机的安全远程唤醒、引导及登录的方法和系统
JP4599852B2 (ja) データ通信装置および方法、並びにプログラム
EP2937805B1 (fr) Système d&#39;authentification de proximité
CN104798083B (zh) 用于验证访问请求的方法和系统
CN102510333B (zh) 一种授权认证方法及系统
US20050221853A1 (en) User authentication using a mobile phone SIM card
KR102604688B1 (ko) 피인증장치, 인증장치, 인증 요청 송신방법, 인증방법, 및 프로그램
WO2014142857A1 (fr) Communication sans fil d&#39;un identificateur d&#39;utilisateur et données sensibles au temps cryptées
US20050250472A1 (en) User authentication using a wireless device
WO2021210594A1 (fr) Système de vérification d&#39;authentification, dispositif à authentifier, dispositif d&#39;authentification, procédé de vérification d&#39;authentification, programme de vérification d&#39;authentification et support d&#39;informations lisible par ordinateur et dispositif enregistré
JP2009212731A (ja) カード発行システム、カード発行サーバ、カード発行方法およびプログラム
JP7368890B2 (ja) 被認証装置、認証装置、認証要求送信方法、認証方法、及びプログラム
JP2007335962A (ja) センサノードのデータ保護方法、センサノードを配布するための計算機システム及びセンサノード
KR20120072032A (ko) 모바일 단말의 상호인증 시스템 및 상호인증 방법
WO2019129351A1 (fr) Systèmes et procédés permettant de fournir une authentification et/ou une autorisation
WO2014187208A1 (fr) Procédé et système de sauvegarde de clé privée d&#39;un jeton de signature électronique
WO2014187209A1 (fr) Procede et systeme de sauvegarde d&#39;informations dans un jeton de signature electronique
CN111246480A (zh) 基于sim卡的应用通信方法、系统、设备及存储介质
RU2791273C2 (ru) Устройство для получения-аутентификации, устройство для аутентификации, способ для передачи запроса аутентификации, способ для аутентификации и программа
US20240223370A1 (en) Method for authentication of a service provider device to a user device
JP2004247815A (ja) Icチップ制御システム、通信端末及びコンピュータプログラム
KR101737925B1 (ko) 도전-응답 기반의 사용자 인증 방법 및 시스템
JPH07250061A (ja) 送受信電文セキュリティ方式
JP2023175156A (ja) 無人配達認証システムおよび無人配達認証方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21787808

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21787808

Country of ref document: EP

Kind code of ref document: A1