CN110855444A - A pure software CAVA identity authentication method based on trusted third party - Google Patents
A pure software CAVA identity authentication method based on trusted third party Download PDFInfo
- Publication number
- CN110855444A CN110855444A CN201911061547.1A CN201911061547A CN110855444A CN 110855444 A CN110855444 A CN 110855444A CN 201911061547 A CN201911061547 A CN 201911061547A CN 110855444 A CN110855444 A CN 110855444A
- Authority
- CN
- China
- Prior art keywords
- consumer
- payment platform
- merchant system
- information
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
本发明公开了一种基于可信第三方的纯软件CAVA身份认证方法,将身份认证请求过程进行事先验证,未通过事先验证的请求将不会再服务器端进行处理,可有效抵抗拒绝服务攻击。另外,通过引入可信第三方,实现双向身份认证,可有效抵抗钓鱼攻击。本发明一方面能够降低服务器端和客户端双方的计算强度并简化了用户认证和授权的流程,有效地提高了认证效率。
The invention discloses a pure software CAVA identity authentication method based on a trusted third party, which pre-verifies the identity authentication request process, and requests that fail the pre-verification will not be processed on the server side, which can effectively resist denial of service attacks. In addition, by introducing a trusted third party to achieve two-way identity authentication, it can effectively resist phishing attacks. On the one hand, the present invention can reduce the computing intensity of both the server and the client, simplify the user authentication and authorization process, and effectively improve the authentication efficiency.
Description
技术领域technical field
本发明属于信息技术领域,应用于电子商务行业,具体涉及一种基于可信第三方的纯软件CAVA身份认证方法。The invention belongs to the field of information technology and is applied to the e-commerce industry, in particular to a pure software CAVA identity authentication method based on a trusted third party.
背景技术Background technique
现有的两方身份认证泛指仅仅通过交易双方的协商、信息交换和判断,来进行彼此之间的身份认证。这种认证方式无需第三方参与,过程简洁,但无法精确地互相确定双方的身份。常见的两方身份认证机制主要有以下几种类型。The existing two-party identity authentication generally refers to the mutual identity authentication only through the negotiation, information exchange and judgment of the two parties in the transaction. This authentication method does not require the participation of a third party, and the process is simple, but it cannot accurately determine the identities of the two parties. Common two-party authentication mechanisms mainly include the following types.
(1)单因子身份认证(1) Single-factor authentication
单因子认证一般基于口令,这种认证方式是一种被验证者输入账号和口令信息,验证者通过被验证这输入的信息和验证者存储的被验证者信息进行比对而进行身份认证的过程。账号和口令一般是被验证者注册时预留的,这些信息被加密后存储在验证者的数据库中。Single-factor authentication is generally based on passwords. This authentication method is a process in which the verifier enters account and password information, and the verifier performs identity authentication by comparing the input information and the verifier's stored information. . Accounts and passwords are generally reserved when the verifier registers, and these information are encrypted and stored in the verifier's database.
Lamport在1981年提出了基于一次性口令的身份认证方案。在此认证方案中,验证者通过将被验证者输入的口令与事先存储在验证者服务器中的密码表进行比对的方法来实现身份认证的目的。随后,Shimizu、Hailer和Sandirigama等人在Lamport的方案基础上进行安全、性能和效率等方面的改进。这类方案的有点在于实现起来比较容易,但是验证者端需要存放用户口令或口令表,一旦验证者端数据库漏洞造成口令遗失或口令表规则被破解,则会威胁认证系统的安全。同时,这类方案主要面向单向认证,无法实现双向认证,容易造成仿冒和钓鱼攻击。Lamport proposed a one-time password-based authentication scheme in 1981. In this authentication scheme, the verifier realizes the purpose of identity authentication by comparing the password input by the verifier with the password table stored in the verifier server in advance. Subsequently, Shimizu, Hailer, and Sandirigama et al. made improvements in safety, performance, and efficiency based on Lamport's scheme. The advantage of this type of scheme is that it is easier to implement, but the verifier needs to store the user password or password table. Once the database vulnerability on the verifier causes the password to be lost or the rules of the password table to be cracked, the security of the authentication system will be threatened. At the same time, this type of solution is mainly oriented towards one-way authentication and cannot achieve two-way authentication, which is easy to cause counterfeiting and phishing attacks.
Harn等人在Diffie-Hellman公钥加密技术的基础上,提出了一种基于非对称密钥体制的口令认证方案。此方案在验证者端无需对与用户口令有关的信息进行特别保护,在更新相关验证信息的时候也不需要被验证者的参与。Harn et al. proposed a password authentication scheme based on asymmetric key system based on Diffie-Hellman public key encryption technology. This scheme does not require special protection of the information related to the user password on the verifier side, and does not require the participation of the verifier when updating the relevant verification information.
Peyravian和Zunic提出了一种基于摘要算法的、轻量化的单向身份认证协议,但此协议存在易遭受钓鱼攻击等安全问题。为了解决此协议中存在的问题,Hwang等在文献、Lee等分别针对Peyravian-Zunic协议提出了改进方案,Peyravian也对自己的协议提出了优化方案。之后,Zhu等人在Hwang-Yeh协议的基础上提出了一种改进协议,但这个改进协议在抵御冒充攻击和密钥协商等方面有所欠缺。Islam等人针对上述问题在Hwang-Yeh协议的基础上提出了一种改进协议,用于解决上述问题。Peyravian and Zunic proposed a lightweight one-way authentication protocol based on digest algorithm, but this protocol is vulnerable to phishing attacks and other security problems. In order to solve the problems in this protocol, Hwang et al. proposed improvement schemes for the Peyravian-Zunic protocol in the literature and Lee et al. Peyravian also proposed an optimization scheme for his own protocol. After that, Zhu et al. proposed an improved protocol based on the Hwang-Yeh protocol, but this improved protocol is lacking in resisting impersonation attacks and key agreement. Islam et al. proposed an improved protocol based on the Hwang-Yeh protocol to solve the above problems.
(2)多因子身份认证(2) Multi-factor authentication
基于口令的单因子身份认证存在很多问题,例如用户口令存储于认证者服务器,认证者技术水平和意识良莠不齐,导致数据安全隐患、用户信息容易泄露。攻击者可以利用盗取、分析、解密甚至“撞库”等手段进行攻击。另外,基于口令的单因子身份认证是单向的,服务器可以对用户身份进行认证,但用户不能对服务器身份进行认证,这就使钓鱼和仿冒成为可能。There are many problems in password-based single-factor authentication. For example, user passwords are stored in the authenticator server, and the technical level and awareness of authenticators vary, resulting in data security risks and user information leakage. Attackers can use stealing, analysis, decryption and even "credential stuffing" to attack. In addition, password-based single-factor authentication is one-way, the server can authenticate the user's identity, but the user cannot authenticate the server's identity, which makes phishing and counterfeiting possible.
智能卡是一种不易仿冒的信息设备,它一般由认证方发放并支持高强度加密,利用智能卡和口令共同实现身份认证,可以在一定程度上解决上述问题。1991年,Chang和Wu提出了一种基于智能卡和口令的双因子身份认证协议。Lee和Chang首次提出基于用户身份和分布式密钥的认证体系,但该协议对于仿冒攻击防范能力较弱。Tsuar和Wu等人提出了一种基于非对称加密算法RSA的身份认证协议,Li和Lin等人提出了基于神经网络的身份认证协议,但该协议对硬件负荷较大。对此问题,Lin和Hwang等人进行了改进。Chang和Lee等人提出了一种无预置表的密钥生成算法,但该算法生成的密钥不具动态性,容易遭受仿冒攻击。2009年,Liao和Wang提出一种基于动态身份识别码的认证协议,Hsiang和Shih在此基础上提出了利用动态识别码替代静态识别码的改进方案。此后,Shao和Chin等人和Wang和Ma等人分别针对安全性和轻量化等问题做了进一步完善。2011年,Wen和Li指出Wang-Ma协议存在仿冒和口令推测攻击的可能性,并在Wang-Ma协议的基础上提出了一种改进的动态密钥协商身份认证协议,这种协议基于哈希函数进行计算,效率很高,但同时存在内部安全隐患、可能遭受仿冒或钓鱼攻击。A smart card is an information device that is not easy to counterfeit. It is generally issued by an authenticator and supports high-strength encryption. Using smart cards and passwords to jointly implement identity authentication can solve the above problems to a certain extent. In 1991, Chang and Wu proposed a two-factor authentication protocol based on smart cards and passwords. Lee and Chang proposed an authentication system based on user identity and distributed key for the first time, but this protocol is weak against counterfeiting attacks. Tsuar and Wu et al. proposed an identity authentication protocol based on asymmetric encryption algorithm RSA. Li and Lin et al. proposed an identity authentication protocol based on neural network, but this protocol has a large load on hardware. Lin and Hwang et al. improved this problem. Chang and Lee et al. proposed a key generation algorithm without a preset table, but the key generated by this algorithm is not dynamic and vulnerable to counterfeiting attacks. In 2009, Liao and Wang proposed an authentication protocol based on dynamic identification codes. On this basis, Hsiang and Shih proposed an improved scheme using dynamic identification codes instead of static identification codes. Since then, Shao and Chin et al. and Wang and Ma et al. have made further improvements on security and lightweight issues, respectively. In 2011, Wen and Li pointed out the possibility of impersonation and password guessing attacks in the Wang-Ma protocol, and proposed an improved dynamic key agreement authentication protocol based on the Wang-Ma protocol. It is very efficient to perform calculations using functions, but at the same time there are internal security risks and may be subject to counterfeiting or phishing attacks.
(3)挑战应答认证(3) Challenge response authentication
挑战应答(Challenge-Response)认证是一种典型的零知识证明认证方式。在当前的移动商务中,口令认证和挑战应答认证相结合的身份认证机制被较为广泛的应用。Challenge-Response authentication is a typical zero-knowledge proof authentication method. In current mobile commerce, the identity authentication mechanism combining password authentication and challenge-response authentication is widely used.
挑战应答认证的原理是每次认证时验证者服务器都会给被验证者发送一个随机的“挑战”信息,这个信息一般是一个字符串,被验证者收到这个信息后向验证者进行应答,验证者根据应答结果来验证被验证者的身份是否合法。其认证过程如图2所示。The principle of challenge-response authentication is that the verifier server will send a random "challenge" message to the verifier each time it is authenticated. According to the response result, the person verifies whether the identity of the verified person is legal. The authentication process is shown in Figure 2.
挑战应答认证方案由于是由被验证者无规律发起,所以如果被验证者频繁地请求认证,就会给认证服务器、网络服务商和客户带来较大的资源消耗。同时由于该认证方案人工参与过程较多、信息发送收移动通信网络和供应商影响较大,所以可能造成延迟。挑战应答认证方案更适用于只有双方参与的身份认证过程。Since the challenge-response authentication scheme is initiated irregularly by the verifier, if the verifier frequently requests authentication, it will bring great resource consumption to the authentication server, network service provider and client. At the same time, due to the fact that the authentication scheme has many manual participation processes, and the information transmission and reception have a great influence on the mobile communication network and the supplier, delays may be caused. The challenge-response authentication scheme is more suitable for the identity authentication process in which only two parties participate.
发明内容SUMMARY OF THE INVENTION
针对现有技术的不足,本发明旨在提供一种基于可信第三方的纯软件CAVA身份认证方法。In view of the deficiencies of the prior art, the present invention aims to provide a pure software CAVA identity authentication method based on a trusted third party.
为了实现上述目的,本发明采用如下技术方案:In order to achieve the above object, the present invention adopts the following technical solutions:
一种基于可信第三方的纯软件CAVA身份认证方法,包括如下步骤:A pure software CAVA identity authentication method based on a trusted third party, comprising the following steps:
(1)数字证书申请阶段:(1) Digital certificate application stage:
S1.1、消费者Ru和支付平台Rp分别向认证中心CA发送申请数字证书请求;S1.1, the consumer Ru and the payment platform Rp respectively send a request for applying for a digital certificate to the certification center CA;
S1.2、认证中心CA审核申请数字证书请求后,分别为消费者Ru和支付平台Rp发放数字证书CERu和CERp,所述数字证书中包含身份认证参与者各自的基本信息INFO、公钥PUK和认证中心CA的数字签名DS;S1.2. After the certification center CA examines the request for a digital certificate, it issues digital certificates CER u and CER p for the consumer Ru and the payment platform Rp respectively. The digital certificates contain the basic information INFO and the public key of the identity authentication participants. Digital Signature DS of PUK and Certification Authority CA;
(2)契约初始化阶段:(2) Contract initialization phase:
S2.1、消费者Ru向支付平台Rp发送建立契约请求,并向支付平台Rp发送包括IDup和INFOu在内的基础信息;其中IDup表示消费者Ru在支付平台Rp中的身份标识符IDup;INFOu表示消费者Ru的非安全性信息;S2.1, the consumer Ru sends a contract establishment request to the payment platform Rp, and sends basic information including ID up and INFO u to the payment platform Rp; where ID up represents the identity identifier of the consumer Ru in the payment platform Rp ID up ; INFO u represents the non-security information of consumer Ru;
S2.2、支付平台Rp在收到建立契约请求后,先进行审核;S2.2. After the payment platform Rp receives the request to establish a contract, it will first review it;
S2.3、通过审核后,支付平台Rp向消费者Ru发送审核成功消息;S2.3. After passing the review, the payment platform Rp sends a review success message to the consumer Ru;
S2.4、收到成功消息后,消费者Ru和支付平台Rp分别向认证中心CA请求对方的数字证书CERp和CERu,CERp表示支付平台Rp的数字证书,CERu表示消费者Ru的数字证书;由于数字证书中包含了消费者Ru和支付平台Rp的真实身份信息,并由可信第三方即认证中心CA通过数字签名提供保障,因此消费者Ru和支付平台Rp可通过数字证书双向确认对方的身份;S2.4. After receiving the success message, the consumer Ru and the payment platform Rp request the certification center CA for the digital certificates CER p and CER u of the other party respectively, CER p represents the digital certificate of the payment platform Rp, and CER u represents the digital certificate of the consumer Ru Digital certificate; since the digital certificate contains the real identity information of the consumer Ru and the payment platform Rp, and is guaranteed by a trusted third party, namely the certification center CA, through digital signatures, the consumer Ru and the payment platform Rp can pass the digital certificate to the two-way confirm the identity of the other party;
S2.5、认证中心接收到消费者Ru和支付平台Rp的数字证书请求后,提取数字证书CERp和CERu;S2.5. After receiving the digital certificate request from the consumer Ru and the payment platform Rp, the certification center extracts the digital certificates CER p and CER u ;
S2.6、认证中心CA向消费者Ru和支付平台Rp分别发送数字证书CERp和CERu;S2.6, the certification center CA sends the digital certificates CER p and CER u to the consumer Ru and the payment platform Rp respectively;
S2.7、消费者Ru和支付平台Rp收到对方的数字证书后,验证认证中心CA的数字签名DS并确认对方真实身份,契约达成,支付平台Rp存储INFOu;S2.7, after the consumer Ru and the payment platform Rp receive the digital certificate of the other party, verify the digital signature DS of the certification center CA and confirm the true identity of the other party, the contract is reached, and the payment platform Rp stores INFO u ;
(3)商务流程的注册阶段:(3) The registration stage of the business process:
S3.1、消费者Ru向商家系统Rb发送注册请求,并向商家系统Rb发送包括IDub和INFOu在内的基础信息;IDub表示消费者Ru在商家系统Rb中的身份标识符;S3.1, the consumer Ru sends a registration request to the merchant system Rb, and sends basic information including ID ub and INFO u to the merchant system Rb; ID ub represents the identity identifier of the consumer Ru in the merchant system Rb;
S3.2、商家系统Rb在收到注册请求后,先进行审核;通过审核后,向消费者Ru发送系统消息MSG;S3.2. After receiving the registration request, the merchant system Rb will review it first; after passing the review, it will send the system message MSG to the consumer Ru;
S3.3、收到系统消息MSG后,消费者Ru将自己设定的口令PWub经过1次哈希算法而得到安全令牌STub并将安全令牌STub发送至Rb;S3.3. After receiving the system message MSG, the consumer Ru passes the password PW ub set by itself through a hash algorithm to obtain the security token ST ub and sends the security token ST ub to Rb;
S3.4、商家系统Rb收到安全令牌STub后,存储STub和INFOu;S3.4. After the merchant system Rb receives the security token ST ub , it stores ST ub and INFO u ;
(4)商务流程的登录阶段:(4) The login stage of the business process:
S4.1、消费者Ru向商家系统Rb发送登录请求,并向商家系统Rb发送IDub、STub和SI等安全信息;SI表示除IDub和PWub之外的安全信息;S4.1. Consumer Ru sends a login request to the merchant system Rb, and sends security information such as ID ub , ST ub and SI to the merchant system Rb; SI represents security information other than ID ub and PW ub ;
S4.2、商家系统Rb在收到登录请求后,根据消费者Ru的IDub从数据库中调取预留的安全令牌STub并进行审核;通过审核后,向消费者Ru发送系统消息MSG;S4.2. After receiving the login request, the merchant system Rb retrieves the reserved security token ST ub from the database according to the ID ub of the consumer Ru and conducts audit; after passing the audit, it sends the system message MSG to the consumer Ru ;
(5)结算阶段:(5) Settlement stage:
S5.1、消费者Ru向商家系统Rb发送结算请求,并向商家系统Rb发送IDup用于Rb和Rp建立信任关系;S5.1, the consumer Ru sends a settlement request to the merchant system Rb, and sends ID up to the merchant system Rb for establishing a trust relationship between Rb and Rp;
S5.2、商家系统Rb在收到结算请求后,将IDup转发至支付平台Rp;S5.2. After receiving the settlement request, the merchant system Rb forwards the ID up to the payment platform Rp;
S5.3、支付平台Rp根据IDup从数据库中查询消费者Ru的相关信息,若未查询到则返回相关错误信息,若查询到则生成一个随机字符串S,并将S发送给商家系统Rb;S5.3. The payment platform Rp queries the relevant information of the consumer Ru from the database according to the ID up . If it is not queried, it will return the relevant error information. If it is queried, it will generate a random string S, and send S to the merchant system Rb ;
S5.4、商家系统Rb在收到随机字符串S后转发给消费者Ru;S5.4. After receiving the random string S, the merchant system Rb forwards it to the consumer Ru;
S5.5、消费者Ru收到随机字符串S后,将随机字符串S利用存储在本地的私钥PRKu对随机字符串S进行加密而得到安全令牌STup并将安全令牌STup发送至商家系统Rb;S5.5. After receiving the random string S, the consumer Ru encrypts the random string S with the private key PRK u stored locally to obtain a security token ST up and the security token ST up Sent to the merchant system Rb;
S5.6、商家系统Rb在收到安全令牌STup后转发给支付平台Rp;S5.6. After receiving the security token ST up , the merchant system Rb forwards it to the payment platform Rp;
S5.7、支付平台Rp收到安全令牌STup后,向认证中心CA请求消费者Ru的数字证书CERu,验证认证中心CA的数字签名后从CERu中提取消费者Ru的公钥PUKu;S5.7. After receiving the security token ST up , the payment platform Rp requests the certification center CA for the digital certificate CER u of the consumer Ru, and after verifying the digital signature of the certification center CA, extracts the public key PUK of the consumer Ru from the CER u u ;
S5.8、支付平台利用消费者Ru的公钥PUKu解密安全令牌STup并得到S’,若S=S’,则信任关系TRUST建立并发送通知验证成功的系统消息,若验证失败则发送通过验证失败的系统消息;S5.8. The payment platform uses the public key PUK u of the consumer Ru to decrypt the security token ST up and obtain S'. If S=S', the trust relationship TRUST is established and a system message notifying that the verification is successful is sent. If the verification fails, the Send system messages that fail authentication;
S5.9、商家系统Rb和支付平台Rp之间的信任关系建立;S5.9, the establishment of trust relationship between the merchant system Rb and the payment platform Rp;
S5.10、商家系统Rb向支付平台Rp发起结算请求并发送结算信息M;S5.10, the merchant system Rb initiates a settlement request to the payment platform Rp and sends settlement information M;
S5.11、支付平台Rp向商家系统Rb结算;S5.11. The payment platform Rp settles with the merchant system Rb;
S5.12、若结算成功,支付平台Rp向商家系统Rb返回结算成功消息;S5.12. If the settlement is successful, the payment platform Rp returns a settlement success message to the merchant system Rb;
S5.13、商家系统Rb向消费者Ru返回结算成功消息。S5.13, the merchant system Rb returns a settlement success message to the consumer Ru.
进一步地,所述方法还包括有:Further, the method also includes:
(6)契约维护阶段:(6) Contract maintenance stage:
S6.1、消费者Ru主动向支付平台Rp发起维护契约请求,并向支付平台Rp发送利用私钥加密后的包括IDup、STup和INFOu在内的基础信息;契约维护主要用于修改消费者Ru的相关信息INFOu;S6.1. Consumer Ru actively initiates a maintenance contract request to payment platform Rp, and sends basic information including ID up , ST up and INFO u encrypted with private key to payment platform Rp; contract maintenance is mainly used for modification Information INFO u of consumer Ru;
S6.2、支付平台Rp在收到维护契约请求后,先进行审核,审核的内容包括信息完整性和标识符唯一性;审核成功后向认证中心CA请求消费者Ru的数字证书CERu并提取消费者Ru的公钥PUKu;S6.2. After the payment platform Rp receives the maintenance contract request, it first conducts an audit, and the audit content includes information integrity and identifier uniqueness; after the audit is successful, it requests the certification center CA for the digital certificate CER u of the consumer Ru and extracts it the public key PUK u of the consumer Ru;
S6.3、支付平台Rp用消费者Ru的公钥PUKu解密INFOu后,用解密得到的INFOu替换原来的INFO’u。S6.3. After the payment platform Rp decrypts the INFO u with the public key PUK u of the consumer Ru, it replaces the original INFO' u with the decrypted INFO u .
进一步地,步骤S2.2中,审核的内容包括信息完整性和标识符唯一性。Further, in step S2.2, the audited content includes information integrity and identifier uniqueness.
进一步地,步骤S3.2中,审核的内容包括信息完整性和标识符唯一性。Further, in step S3.2, the audited content includes information integrity and identifier uniqueness.
本发明的有益效果在于:The beneficial effects of the present invention are:
(1)能抵抗拒绝服务攻击(1) Resistant to denial of service attacks
本发明将身份认证请求过程进行事先验证,未通过事先验证的请求将不会再服务器端进行处理,可有效抵抗拒绝服务攻击。The present invention verifies the identity authentication request process in advance, and requests that fail to pass the pre-verification will not be processed on the server side, which can effectively resist denial of service attacks.
(2)抵抗钓鱼攻击(2) Resist phishing attacks
本发明引入可信第三方,实现双向身份认证,可有效抵抗钓鱼攻击。The invention introduces a trusted third party, realizes two-way identity authentication, and can effectively resist phishing attacks.
(3)认证效率(3) Certification efficiency
本发明一方面能够降低服务器端和客户端双方的计算强度并简化了用户认证和授权的流程,有效地提高了认证效率。On the one hand, the present invention can reduce the computing intensity of both the server and the client, simplify the user authentication and authorization process, and effectively improve the authentication efficiency.
(4)抗DoS和字典攻击(4) Anti-DoS and dictionary attacks
在本发明中,消费者Ru的结算请求并不是Ru主动触发的,而是由Rp发送的信息被动触发的。即:消费者Ru在完成商务流程之后,向商家系统Rb提出结算请求,Rb收到请求后将Ru在支付平台Rp中的唯一标识符IDup发送给Rp,Rp会在数据库中查询IDup的真实性再建立连接。在这个过程中,首先Ru无法主动发送结算请求,则攻击者也无法主动发送结算请求,因此攻击者很难达成主动的匿名请求,减少了DoS攻击和字典攻击发生的可能性。In the present invention, the settlement request of the consumer Ru is not actively triggered by Ru, but passively triggered by the information sent by Rp. That is: after the consumer Ru completes the business process, he makes a settlement request to the merchant system Rb. After receiving the request, Rb sends the unique identifier ID up of Ru in the payment platform Rp to Rp, and Rp will query the database for ID up . Authenticity re-establishes connection. In this process, firstly, Ru cannot actively send settlement requests, and the attackers cannot actively send settlement requests, so it is difficult for attackers to achieve active anonymous requests, reducing the possibility of DoS attacks and dictionary attacks.
(5)抗冒充和重放攻击(5) Resist impersonation and replay attacks
在本发明中,在每次Ru提出登录请求后,Rp会将随机字符串S发送给客户端,Rp收到请求后会要求Rb向Ru转发随机字符串S,收到S后Ru需要利用私钥PRKu对S进行加密,并将加密后的安全令牌STup发送给Rp,Rp则利用契约建立阶段存储的消费者公钥PUKu进行解密,将解密得到的S’和S进行比对。在每次用户成功登录之后,这个随机字符串S都会销毁。基于上述流程,可以得出以下结论。In the present invention, every time Ru makes a login request, Rp will send the random string S to the client. After receiving the request, Rp will ask Rb to forward the random string S to Ru. After receiving S, Ru needs to use the private The key PRK u encrypts S, and sends the encrypted security token ST up to Rp. Rp uses the consumer public key PUK u stored in the contract establishment stage to decrypt, and compares the decrypted S' and S . This random string S is destroyed every time the user successfully logs in. Based on the above process, the following conclusions can be drawn.
a)消费者Ru的密钥对(PRKu,PUKu)仅在契约建立阶段中传输,商家系统Rb并不参与此阶段,因此Rb不可能获取密钥;a) The key pair (PRK u , PUK u ) of the consumer Ru is only transmitted in the contract establishment phase, and the merchant system Rb does not participate in this phase, so it is impossible for Rb to obtain the key;
b)由于每次结算过程中的字符串S是随机生成的,因此STup(利用PRKu加密的S)也是唯一的,商家系统Rb无法将本次结算过程获取的STup用于之后的结算。b) Since the string S in each settlement process is randomly generated, ST up (S encrypted with PRK u ) is also unique, and the merchant system Rb cannot use the ST up obtained in this settlement process for subsequent settlements .
基于上述分析,本方案可以有效地防范冒充和重放攻击。Based on the above analysis, this scheme can effectively prevent impersonation and replay attacks.
(6)抗交易抵赖(6) Anti-transaction denial
基于本发明的工作流程,可以得出以下结论。Based on the workflow of the present invention, the following conclusions can be drawn.
a)消费者Ru的私钥PRKu属于Ru独享信息,并在契约建立阶段由Ru和Rp双方认可,Ru在结算过程中利用PRKu对随机字符串S进行数字签名。根据对称加密和数字签名的基本原理可知,此过程是不可抵赖的。a) Consumer Ru's private key PRK u belongs to Ru's exclusive information and is recognized by both Ru and Rp during the contract establishment stage. Ru uses PRK u to digitally sign the random string S during the settlement process. According to the basic principles of symmetric encryption and digital signature, this process is non-repudiation.
b)在本发明的各个关键流程中,均有日志存储环节,日志可为历史交易的真实性作保证。b) In each key process of the present invention, there is a log storage link, and the log can guarantee the authenticity of historical transactions.
基于上述分析,Ru在正常情况下无法否认已发生交易的真实性,即本发明可以有效地防交易抵赖。Based on the above analysis, Ru cannot deny the authenticity of the transaction that has occurred under normal circumstances, that is, the present invention can effectively prevent transaction denial.
附图说明Description of drawings
图1为现有技术中身份认证系统的构成元素示意图;1 is a schematic diagram of the constituent elements of an identity authentication system in the prior art;
图2为现有的身份认证技术中挑战应答认证过程示意图;2 is a schematic diagram of a challenge-response authentication process in an existing identity authentication technology;
图3为本发明实施例中数字证书申请阶段流程示意图;3 is a schematic flowchart of a digital certificate application stage in an embodiment of the present invention;
图4为本发明实施例中契约初始化阶段流程示意图;4 is a schematic flowchart of a contract initialization phase in an embodiment of the present invention;
图5为本发明实施例中商务流程的注册阶段流程示意图;5 is a schematic flowchart of a registration stage of a business process in an embodiment of the present invention;
图6为本发明实施例中商务流程的登录阶段流程示意图;6 is a schematic flowchart of a login stage of a business process in an embodiment of the present invention;
图7为本发明实施例中结算阶段流程示意图;7 is a schematic flowchart of a settlement stage in an embodiment of the present invention;
图8为本发明实施例中契约维护阶段流程示意图。FIG. 8 is a schematic flowchart of a contract maintenance phase in an embodiment of the present invention.
具体实施方式Detailed ways
以下将结合附图对本发明作进一步的描述,需要说明的是,本实施例以本技术方案为前提,给出了详细的实施方式和具体的操作过程,但本发明的保护范围并不限于本实施例。The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that the present embodiment takes the technical solution as the premise, and provides a detailed implementation manner and a specific operation process, but the protection scope of the present invention is not limited to the present invention. Example.
1、以下先对本领域的一些技术术语作简单的说明1. The following is a brief description of some technical terms in this field
1)密码和加密算法1) Password and encryption algorithm
密码学是信息理论的一个分支,它负责处理安全消息的所有环节,包括身份认证、数字签名和密钥管理。简单来说,加密是一个过程,它将明文信息用某种方法重新编排,让它成为不被理解的密文信息,信息接收者在通过相反的过程将密文信息还原为明文信息然后使用。我们可以用下面的定义和流程来解释加密和解密过程。Cryptography is a branch of information theory that handles all aspects of secure messaging, including authentication, digital signatures, and key management. In simple terms, encryption is a process that rearranges plaintext information in a certain way to make it incomprehensible ciphertext information. The recipient of the information restores the ciphertext information to plaintext information through the opposite process and then uses it. We can explain the encryption and decryption process with the following definitions and procedures.
定义:加密算法Definition: Encryption Algorithm
对加解密过程中的信息定义如下:The information in the encryption and decryption process is defined as follows:
(1)Mp:信息发送方明文原始信息;(1) M p : the original plaintext information of the information sender;
(2)K:信息发送方用于加密Mp的密钥;(2) K: the key used by the information sender to encrypt Mp ;
(3)Mc:信息发送方将Mp进行加密后得到的密文;(3) M c : the ciphertext obtained after the information sender encrypts M p ;
(4)Mc’:信息接收方收到的密文;(4) M c ': cipher text received by the information receiver;
(5)K’:信息接收方用于解密Mc’的密钥;(5) K ': the key used by the information receiver to decrypt Mc';
(6)Mp’:将Mc’解密后得到的明文信息。(6) M p ': plaintext information obtained after decrypting M c '.
则,加密算法可定义为:Then, the encryption algorithm can be defined as:
E:(Mp+K)→Mc E:(M p +K)→M c
解密算法可定义为:The decryption algorithm can be defined as:
E’:(Mc’+K’)→Mp’E':(M c '+K')→M p '
2)身份认证2) Identity authentication
身份认证(Identity Authentication)是认证商务参与者身份是否合法的过程,它是整个商务活动可运行的基础。身份认证的基本原理是检验被认证者的相关信息以实现身份确认的。随着电子商务——尤其是移动商务——的飞速发展,认证商务参与者的身份和保证各方安全正在成为移动商务流程里最为关键的过程之一。身份认证技术按照认证级别和认证实体的不同可以分为单向认证和双向认证两种,其特点和适用环境如表1所示。Identity Authentication is the process of verifying the legality of the identity of business participants, and it is the basis for the operation of the entire business activity. The basic principle of identity authentication is to verify the relevant information of the authenticated to realize identity confirmation. With the rapid development of e-commerce, especially mobile commerce, authenticating the identities of business participants and ensuring the security of all parties is becoming one of the most critical processes in the mobile commerce process. Identity authentication technology can be divided into one-way authentication and two-way authentication according to the different authentication levels and authentication entities, and its characteristics and applicable environment are shown in Table 1.
表1 单向和双向身份认证Table 1 One-way and two-way authentication
常见的身份认证系统包括以下几个部分:身份认证协议、商务参与者、认证信息和攻击者等元素组成,如图1所示。A common identity authentication system includes the following parts: identity authentication protocol, business participants, authentication information and attackers, as shown in Figure 1.
根据上述基本元素,我们可以描述身份认证系统应具有的基本功能。如表2所示。一般来说,身份认证方案可以分为两类:简单身份认证方案和高强度身份认证方案。简单身份认证方案的身份认证信息中一般只包含账号和口令等关键信息、信息一般以非加密的形式传输。但是非加密的信息极易被非法获取,一般的解决方案是将信息通过哈希函数(如MD5或SHA)进行处理或使用动态口令(OTP),利用这些方案,即使信息明文被窃取,也无法推导出原始身份认证信息。高强度身份认证方案一般将采用复合式加密机制来防止认证过程中的敏感数据被非法获取和使用。例如,Kerberos协议就是一种被广泛应用的强度身份认证方案。新兴的高强度身份认证方案更是将可信第三方、挑战/应答、智能卡甚至生物识别等技术融合,实现了更高强度的身份认证。下面列出几种常见的身份认证方案,并讨论它们的特点和应用环境。According to the above basic elements, we can describe the basic functions that the identity authentication system should have. As shown in table 2. Generally speaking, identity authentication schemes can be divided into two categories: simple identity authentication schemes and high-strength identity authentication schemes. The identity authentication information of the simple identity authentication scheme generally only contains key information such as account numbers and passwords, and the information is generally transmitted in an unencrypted form. However, non-encrypted information is easily obtained illegally. The general solution is to process the information through a hash function (such as MD5 or SHA) or use dynamic passwords (OTP). Using these schemes, even if the plaintext of the information is stolen, it cannot be Derive the original authentication information. High-strength identity authentication schemes generally use a compound encryption mechanism to prevent sensitive data from being illegally obtained and used during the authentication process. For example, the Kerberos protocol is a widely used strong authentication scheme. Emerging high-intensity authentication schemes integrate technologies such as trusted third parties, challenge/response, smart cards and even biometrics to achieve higher-intensity authentication. Several common authentication schemes are listed below, and their characteristics and application environments are discussed.
表2 身份认证系统的主要功能Table 2 Main functions of the identity authentication system
3)动态口令3) Dynamic password
动态口令也被叫做一次性口令(One Time Password)。动态口令所使用的秘密信息在每次交易过程中是不同的,攻击者即使通过某种手段获取了某次交易过程中的安全信息,也无法用于下一次交易。Dynamic passwords are also called one-time passwords (One Time Password). The secret information used by the dynamic password is different in each transaction process. Even if the attacker obtains the security information in a certain transaction process by some means, it cannot be used for the next transaction.
动态口令的基本原理是:被认证方首先提出认证请求,认证方根据认证请求生成一个动态信息,这个动态信息可以是任何无法推断的唯一性信息,例如随机数或时间戳,也可以是在固定信息基础上进行计算或组合而形成的唯一性信息,例如通过动态加密或摘要算法得到的值。The basic principle of dynamic passwords is that the authenticated party first makes an authentication request, and the authenticator generates a dynamic information according to the authentication request. This dynamic information can be any unique information that cannot be inferred, such as random numbers or timestamps, or it can be fixed in The unique information formed by calculation or combination on the basis of information, such as the value obtained by dynamic encryption or digest algorithm.
由于动态口令的唯一性和不一致性,基于动态口令的身份认证技术在某种程度上可以防范窃听和重放攻击,也可以降低由商务系统本身的安全缺陷引发后续连锁安全问题的风险。典型的动态口令如表3所示。Due to the uniqueness and inconsistency of dynamic passwords, the identity authentication technology based on dynamic passwords can prevent eavesdropping and replay attacks to a certain extent, and can also reduce the risk of subsequent chain security problems caused by the security defects of the business system itself. Typical dynamic passwords are shown in Table 3.
表3 典型的动态口令Table 3 Typical dynamic passwords
与传统的静态密码认证技术相比,动态口令具有表4中所描述的特点:Compared with the traditional static password authentication technology, the dynamic password has the characteristics described in Table 4:
表4 动态口令的特点Table 4 Characteristics of dynamic passwords
2、方法描述2. Method description
方法描述所用到的参数及其符号如表5所示:The parameters and their symbols used in the method description are shown in Table 5:
表5 本技术方案符号说明Table 5 Symbol description of this technical solution
所述方法包括如下步骤:The method includes the following steps:
(1)数字证书申请阶段,如图3所示:(1) The digital certificate application stage, as shown in Figure 3:
S1.1、消费者Ru和支付平台Rp分别向认证中心CA发送申请数字证书请求;S1.1, the consumer Ru and the payment platform Rp respectively send a request for applying for a digital certificate to the certification center CA;
S1.2、认证中心CA审核申请数字证书请求后,分别为消费者Ru和支付平台Rp发放数字证书CERu和CERp,所述数字证书中包含身份认证参与者各自的基本信息INFO、公钥PUK和认证中心CA的数字签名DS;S1.2. After the certification center CA examines the request for a digital certificate, it issues digital certificates CER u and CER p for the consumer Ru and the payment platform Rp respectively. The digital certificates contain the basic information INFO and the public key of the identity authentication participants. Digital Signature DS of PUK and Certification Authority CA;
(2)契约初始化阶段,如图4所示:(2) Contract initialization phase, as shown in Figure 4:
S2.1、消费者Ru向支付平台Rp发送建立契约请求,并向支付平台Rp发送包括IDup和INFOu在内的基础信息;其中IDup表示消费者Ru在支付平台Rp中的身份标识符IDup;INFOu表示消费者Ru的非安全性信息;一般地,非安全性信息包括昵称、性别、兴趣、积分等。S2.1, the consumer Ru sends a contract establishment request to the payment platform Rp, and sends basic information including ID up and INFO u to the payment platform Rp; where ID up represents the identity identifier of the consumer Ru in the payment platform Rp ID up ; INFO u represents the non-security information of the consumer Ru; generally, the non-security information includes nickname, gender, interest, points and the like.
S2.2、支付平台Rp在收到建立契约请求后,先进行审核,审核的内容包括信息完整性和标识符唯一性;S2.2. After receiving the request to establish a contract, the payment platform Rp will conduct an audit first, and the audit content includes information integrity and identifier uniqueness;
S2.3、通过审核后,支付平台Rp向消费者Ru发送审核成功消息;S2.3. After passing the review, the payment platform Rp sends a review success message to the consumer Ru;
S2.4、收到成功消息后,消费者Ru和支付平台Rp分别向认证中心CA请求对方的数字证书CERp和CERu,CERp表示支付平台Rp的数字证书,CERu表示消费者Ru的数字证书;由于数字证书中包含了消费者Ru和支付平台Rp的真实身份信息,并由可信第三方即认证中心CA通过数字签名提供保障,因此消费者Ru和支付平台Rp可通过数字证书双向确认对方的身份;S2.4. After receiving the success message, the consumer Ru and the payment platform Rp request the certification center CA for the digital certificates CER p and CER u of the other party respectively, CER p represents the digital certificate of the payment platform Rp, and CER u represents the digital certificate of the consumer Ru Digital certificate; since the digital certificate contains the real identity information of the consumer Ru and the payment platform Rp, and is guaranteed by a trusted third party, namely the certification center CA, through digital signatures, the consumer Ru and the payment platform Rp can pass the digital certificate to the two-way confirm the identity of the other party;
S2.5、认证中心接收到消费者Ru和支付平台Rp的数字证书请求后,提取数字证书CERp和CERu;S2.5. After receiving the digital certificate request from the consumer Ru and the payment platform Rp, the certification center extracts the digital certificates CER p and CER u ;
S2.6、认证中心CA向消费者Ru和支付平台Rp分别发送数字证书CERp和CERu;S2.6, the certification center CA sends the digital certificates CER p and CER u to the consumer Ru and the payment platform Rp respectively;
S2.7、消费者Ru和支付平台Rp收到对方的数字证书后,验证认证中心CA的数字签名DS并确认对方真实身份,契约达成,支付平台Rp存储INFOu。S2.7. After the consumer Ru and the payment platform Rp receive the digital certificate of the other party, they verify the digital signature DS of the certification center CA and confirm the true identity of the other party. The contract is reached, and the payment platform Rp stores INFO u .
(3)商务流程的注册阶段,如图5所示:(3) The registration stage of the business process, as shown in Figure 5:
S3.1、消费者Ru向商家系统Rb发送注册请求,并向商家系统Rb发送包括IDub和INFOu在内的基础信息;IDub表示消费者Ru在商家系统Rb中的身份标识符;S3.1, the consumer Ru sends a registration request to the merchant system Rb, and sends basic information including ID ub and INFO u to the merchant system Rb; ID ub represents the identity identifier of the consumer Ru in the merchant system Rb;
S3.2、商家系统Rb在收到注册请求后,先进行审核,审核的内容包括信息完整性和标识符唯一性;通过审核后,向消费者Ru发送系统消息MSG;S3.2. After receiving the registration request, the merchant system Rb will conduct an audit first, and the audit content includes information integrity and identifier uniqueness; after passing the audit, it will send the system message MSG to the consumer Ru;
S3.3、收到系统消息MSG后,消费者Ru将自己设定的口令PWub经过1次哈希算法而得到安全令牌STub并将安全令牌STub发送至Rb;S3.3. After receiving the system message MSG, the consumer Ru passes the password PW ub set by itself through a hash algorithm to obtain the security token ST ub and sends the security token ST ub to Rb;
STub=HASH(PWub);ST ub = HASH(PW ub );
S3.4、商家系统Rb收到安全令牌STub后,存储STub和INFOu;S3.4. After the merchant system Rb receives the security token ST ub , it stores ST ub and INFO u ;
(4)商务流程的登录阶段,如图6所示:(4) The login stage of the business process, as shown in Figure 6:
S4.1、消费者Ru向商家系统Rb发送登录请求,并向商家系统Rb发送IDub、STub和SI等安全信息;SI表示除IDub和PWub之外的安全信息,例如验证码和挑战/应答信息;S4.1. Consumer Ru sends a login request to the merchant system Rb, and sends security information such as ID ub , ST ub and SI to the merchant system Rb; SI represents security information other than ID ub and PW ub , such as verification code and challenge/response information;
S4.2、商家系统Rb在收到登录请求后,根据消费者Ru的IDub从数据库中调取预留的安全令牌STub并进行审核,审核内容包括计算判断用户的登录请求中的STub和数据库中的安全令牌STub是否一致;通过审核后,向消费者Ru发送系统消息MSG;S4.2. After receiving the login request, the merchant system Rb retrieves the reserved security token ST ub from the database according to the ID ub of the consumer Ru and conducts an audit. The audit content includes calculating and judging the ST in the user's login request. Whether the security token ST ub in the database is consistent with ub ; after passing the audit, send the system message MSG to the consumer Ru;
(5)结算阶段,如图7所示:(5) Settlement stage, as shown in Figure 7:
S5.1、消费者Ru向商家系统Rb发送结算请求,并向商家系统Rb发送IDup用于Rb和Rp建立信任关系;S5.1, the consumer Ru sends a settlement request to the merchant system Rb, and sends ID up to the merchant system Rb for establishing a trust relationship between Rb and Rp;
S5.2、商家系统Rb在收到结算请求后,将IDup转发至支付平台Rp;S5.2. After receiving the settlement request, the merchant system Rb forwards the ID up to the payment platform Rp;
S5.3、支付平台Rp根据IDup从数据库中查询消费者Ru的相关信息,若未查询到则返回相关错误信息,若查询到则生成一个随机字符串S,并将S发送给商家系统Rb;S5.3. The payment platform Rp queries the relevant information of the consumer Ru from the database according to the ID up . If it is not queried, it will return the relevant error information. If it is queried, it will generate a random string S, and send S to the merchant system Rb ;
S5.4、商家系统Rb在收到随机字符串S后转发给消费者Ru;S5.4. After receiving the random string S, the merchant system Rb forwards it to the consumer Ru;
S5.5、消费者Ru收到随机字符串S后,将随机字符串S利用存储在本地的私钥PRKu对随机字符串S进行加密而得到安全令牌STup并将安全令牌STup发送至商家系统Rb;S5.5. After receiving the random string S, the consumer Ru encrypts the random string S with the private key PRK u stored locally to obtain a security token ST up and the security token ST up Sent to the merchant system Rb;
STup=EC(S)PRKu; STup =EC(S) PRKu ;
EC(S)PRKu表示用私钥PRKu对随机字符串S进行加密;EC(S) PRKu means to encrypt the random string S with the private key PRK u ;
S5.6、商家系统Rb在收到安全令牌STup后转发给支付平台Rp;S5.6. After receiving the security token ST up , the merchant system Rb forwards it to the payment platform Rp;
S5.7、支付平台Rp收到安全令牌STup后,向认证中心CA请求消费者Ru的数字证书CERu,验证认证中心CA的数字签名后从CERu中提取消费者Ru的公钥PUKu;S5.7. After receiving the security token ST up , the payment platform Rp requests the certification center CA for the digital certificate CER u of the consumer Ru, and after verifying the digital signature of the certification center CA, extracts the public key PUK of the consumer Ru from the CER u u ;
S5.8、支付平台利用消费者Ru的公钥PUKu解密安全令牌STup并得到S’,若S=S’,则信任关系TRUST建立并发送通知验证成功的系统消息,若验证失败则发送通过验证失败的系统消息;S5.8. The payment platform uses the public key PUK u of the consumer Ru to decrypt the security token ST up and obtain S'. If S=S', the trust relationship TRUST is established and a system message notifying that the verification is successful is sent. If the verification fails, the Send system messages that fail authentication;
S’=DC(STup)PUKu;S'=DC( STup ) PUKu ;
DC(STup)PUKu表示采用公钥PUKu解密STup;DC(ST up ) PUK means using the public key PUK u to decrypt ST up ;
S5.9、商家系统Rb和支付平台Rp之间的信任关系建立;S5.9, the establishment of trust relationship between the merchant system Rb and the payment platform Rp;
TRUST=IsTrue(S=S’);TRUST=IsTrue(S=S');
IsTrue()表示判断条件是否成立的函数;IsTrue() represents a function that judges whether a condition is true;
S5.10、商家系统Rb向支付平台Rp发起结算请求并发送结算信息M;S5.10, the merchant system Rb initiates a settlement request to the payment platform Rp and sends settlement information M;
S5.11、支付平台Rp向商家系统Rb结算;S5.11. The payment platform Rp settles with the merchant system Rb;
S5.12、若结算成功,支付平台Rp向商家系统Rb返回结算成功消息;S5.12. If the settlement is successful, the payment platform Rp returns a settlement success message to the merchant system Rb;
S5.13、商家系统Rb向消费者Ru返回结算成功消息。S5.13, the merchant system Rb returns a settlement success message to the consumer Ru.
(6)契约维护阶段,如图8所示:(6) Contract maintenance stage, as shown in Figure 8:
S6.1、消费者Ru主动向支付平台Rp发起维护契约请求,并向支付平台Rp发送利用私钥加密后的包括IDup、STup和INFOu在内的基础信息;契约维护的目的一般是修改消费者Ru的相关信息INFOu;S6.1. Consumer Ru actively initiates a maintenance contract request to payment platform Rp, and sends basic information including ID up , ST up and INFO u encrypted with private key to payment platform Rp; the purpose of contract maintenance is generally to Modify the relevant information of consumer Ru INFO u ;
S6.2、支付平台Rp在收到维护契约请求后,先进行审核,审核的内容包括信息完整性和标识符唯一性;审核成功后向认证中心CA请求消费者Ru的数字证书CERu并提取消费者Ru的公钥PUKu;S6.2. After the payment platform Rp receives the maintenance contract request, it first conducts an audit, and the audit content includes information integrity and identifier uniqueness; after the audit is successful, it requests the certification center CA for the digital certificate CER u of the consumer Ru and extracts it the public key PUK u of the consumer Ru;
INFOu=new(INFOu);INFO u =new(INFO u );
S6.3、支付平台Rp用消费者Ru的公钥PUKu解密INFOu后,用解密得到的INFOu替换原来的INFO’u:S6.3. After the payment platform Rp decrypts the INFO u with the public key PUK u of the consumer Ru, it replaces the original INFO' u with the decrypted INFO u :
INFOu=DC(new(INFOu))PUKu;INFO u =DC(new(INFO u )) PUK ;
INFO’u=INFOu。INFO' u =INFO u .
本实施例方法相对于现有技术,主要具有如下优势:Compared with the prior art, the method of this embodiment mainly has the following advantages:
(1)能抵抗拒绝服务攻击(1) Resistant to denial of service attacks
本实施例方法将身份认证请求过程进行事先验证,未通过事先验证的请求将不会再服务器端进行处理,可有效抵抗拒绝服务攻击。The method of this embodiment performs pre-verification on the identity authentication request process, and requests that fail the pre-verification will not be processed on the server side, which can effectively resist denial of service attacks.
(2)抵抗钓鱼攻击(2) Resist phishing attacks
本实施例方法引入可信第三方,实现双向身份认证,可有效抵抗钓鱼攻击。The method of this embodiment introduces a trusted third party, realizes two-way identity authentication, and can effectively resist phishing attacks.
(3)认证效率(3) Certification efficiency
本实施例方法一方面能够降低服务器端和客户端双方的计算强度并简化了用户认证和授权的流程,有效地提高了认证效率。On the one hand, the method of this embodiment can reduce the computational intensity of both the server and the client, simplify the user authentication and authorization process, and effectively improve the authentication efficiency.
(4)抗DoS和字典攻击(4) Anti-DoS and dictionary attacks
在本方案中,消费者Ru的结算请求并不是Ru主动触发的,而是由Rp发送的信息被动触发的。即:消费者Ru在完成商务流程之后,向商家系统Rb提出结算请求,Rb收到请求后将Ru在支付平台Rp中的唯一标识符IDup发送给Rp,Rp会在数据库中查询IDup的真实性再建立连接。在这个过程中,首先Ru无法主动发送结算请求,则攻击者也无法主动发送结算请求,因此攻击者很难达成主动的匿名请求,减少了DoS攻击和字典攻击发生的可能性。In this solution, the settlement request of the consumer Ru is not actively triggered by Ru, but passively triggered by the information sent by Rp. That is: after the consumer Ru completes the business process, he makes a settlement request to the merchant system Rb. After receiving the request, Rb sends the unique identifier ID up of Ru in the payment platform Rp to Rp, and Rp will query the database for ID up . Authenticity re-establishes connection. In this process, firstly, Ru cannot actively send settlement requests, and the attackers cannot actively send settlement requests, so it is difficult for attackers to achieve active anonymous requests, reducing the possibility of DoS attacks and dictionary attacks.
(5)抗冒充和重放攻击(5) Resist impersonation and replay attacks
在本方案中,在每次Ru提出登录请求后,Rp会将随机字符串S发送给客户端,Rp收到请求后会要求Rb向Ru转发随机字符串S,收到S后Ru需要利用私钥PRKu对S进行加密,并将加密后的安全令牌STup发送给Rp,Rp则利用契约建立阶段存储的消费者公钥PUKu进行解密,将解密得到的S’和S进行比对。在每次用户成功登录之后,这个随机字符串S都会销毁。基于上述流程,可以得出以下结论。In this solution, Rp will send a random string S to the client every time Ru makes a login request. After receiving the request, Rp will ask Rb to forward the random string S to Ru. After receiving S, Ru needs to use the private The key PRK u encrypts S, and sends the encrypted security token ST up to Rp. Rp uses the consumer public key PUK u stored in the contract establishment stage to decrypt, and compares the decrypted S' and S . This random string S is destroyed every time the user successfully logs in. Based on the above process, the following conclusions can be drawn.
a)消费者Ru的密钥对(PRKu,PUKu)仅在契约建立阶段中传输,商家系统Rb并不参与此阶段,因此Rb不可能获取密钥;a) The key pair (PRK u , PUK u ) of the consumer Ru is only transmitted in the contract establishment phase, and the merchant system Rb does not participate in this phase, so it is impossible for Rb to obtain the key;
b)由于每次结算过程中的字符串S是随机生成的,因此STup(利用PRKu加密的S)也是唯一的,商家系统Rb无法将本次结算过程获取的STup用于之后的结算。b) Since the string S in each settlement process is randomly generated, ST up (S encrypted with PRK u ) is also unique, and the merchant system Rb cannot use the ST up obtained in this settlement process for subsequent settlements .
基于上述分析,本方案可以有效地防范冒充和重放攻击。Based on the above analysis, this scheme can effectively prevent impersonation and replay attacks.
(6)抗交易抵赖(6) Anti-transaction denial
基于本方案的工作流程,可以得出以下结论。Based on the workflow of this scheme, the following conclusions can be drawn.
a)消费者Ru的私钥PRKu属于Ru独享信息,并在契约建立阶段由Ru和Rp双方认可,Ru在结算过程中利用PRKu对随机字符串S进行数字签名。根据对称加密和数字签名的基本原理可知,此过程是不可抵赖的。a) Consumer Ru's private key PRK u belongs to Ru's exclusive information and is recognized by both Ru and Rp during the contract establishment stage. Ru uses PRK u to digitally sign the random string S during the settlement process. According to the basic principles of symmetric encryption and digital signature, this process is non-repudiation.
b)在本方案的各个关键流程中,均有日志存储环节,日志可为历史交易的真实性作保证。b) In each key process of this scheme, there is a log storage link, and the log can guarantee the authenticity of historical transactions.
基于上述分析,Ru在正常情况下无法否认已发生交易的真实性,即本方案可以有效地防交易抵赖。Based on the above analysis, Ru cannot deny the authenticity of the transaction that has occurred under normal circumstances, that is, this solution can effectively prevent transaction denial.
对于本领域的技术人员来说,可以根据以上的技术方案和构思,给出各种相应的改变和变形,而所有的这些改变和变形,都应该包括在本发明权利要求的保护范围之内。For those skilled in the art, various corresponding changes and deformations can be given according to the above technical solutions and concepts, and all these changes and deformations should be included within the protection scope of the claims of the present invention.
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911061547.1A CN110855444A (en) | 2019-11-01 | 2019-11-01 | A pure software CAVA identity authentication method based on trusted third party |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911061547.1A CN110855444A (en) | 2019-11-01 | 2019-11-01 | A pure software CAVA identity authentication method based on trusted third party |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110855444A true CN110855444A (en) | 2020-02-28 |
Family
ID=69598775
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911061547.1A Pending CN110855444A (en) | 2019-11-01 | 2019-11-01 | A pure software CAVA identity authentication method based on trusted third party |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110855444A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114626860A (en) * | 2022-05-12 | 2022-06-14 | 武汉和悦数字科技有限公司 | Dynamic identity identification method and device for online commodity payment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070288392A1 (en) * | 2003-12-31 | 2007-12-13 | Guilin Peng | Secure Online Payment System And Online Payment Authentication Method |
US20110270763A1 (en) * | 2010-04-30 | 2011-11-03 | Tobsc Inc. | Methods and apparatus for a financial document clearinghouse and secure delivery network |
CN102448061A (en) * | 2011-11-18 | 2012-05-09 | 王黎明 | Method and system for preventing phishing attack based on mobile terminal |
CN103020825A (en) * | 2012-12-05 | 2013-04-03 | 福建省派活园科技信息有限公司 | Safety payment authentication method based on software client |
WO2014053172A1 (en) * | 2012-10-03 | 2014-04-10 | Buntinx Bvba | Method and system for securely authenticating entities |
CN105577612A (en) * | 2014-10-11 | 2016-05-11 | 中兴通讯股份有限公司 | Identity authentication method, third party server, merchant server, and user terminal |
CN106330430A (en) * | 2016-08-29 | 2017-01-11 | 江苏高网信息科技有限公司 | Third-party mobile payment method based on NTRU |
-
2019
- 2019-11-01 CN CN201911061547.1A patent/CN110855444A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070288392A1 (en) * | 2003-12-31 | 2007-12-13 | Guilin Peng | Secure Online Payment System And Online Payment Authentication Method |
US20110270763A1 (en) * | 2010-04-30 | 2011-11-03 | Tobsc Inc. | Methods and apparatus for a financial document clearinghouse and secure delivery network |
CN102448061A (en) * | 2011-11-18 | 2012-05-09 | 王黎明 | Method and system for preventing phishing attack based on mobile terminal |
WO2014053172A1 (en) * | 2012-10-03 | 2014-04-10 | Buntinx Bvba | Method and system for securely authenticating entities |
CN103020825A (en) * | 2012-12-05 | 2013-04-03 | 福建省派活园科技信息有限公司 | Safety payment authentication method based on software client |
CN105577612A (en) * | 2014-10-11 | 2016-05-11 | 中兴通讯股份有限公司 | Identity authentication method, third party server, merchant server, and user terminal |
CN106330430A (en) * | 2016-08-29 | 2017-01-11 | 江苏高网信息科技有限公司 | Third-party mobile payment method based on NTRU |
Non-Patent Citations (1)
Title |
---|
王亮: "基于信任传递的移动商务虚拟身份认证机制研究", 《中国优秀博硕士学位论文全文数据库(博士)信息科技辑》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114626860A (en) * | 2022-05-12 | 2022-06-14 | 武汉和悦数字科技有限公司 | Dynamic identity identification method and device for online commodity payment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3661120B1 (en) | Method and apparatus for security authentication | |
CN109728909B (en) | Identity authentication method and system based on USBKey | |
WO2020087805A1 (en) | Trusted authentication method employing two cryptographic values and chaotic encryption in measurement and control network | |
CN101674304B (en) | Network identity authentication system and method | |
US7975139B2 (en) | Use and generation of a session key in a secure socket layer connection | |
US7930542B2 (en) | MashSSL: a novel multi party authentication and key exchange mechanism based on SSL | |
CN108111301A (en) | The method and its system for realizing SSH agreements are exchanged based on rear quantum key | |
TWI512524B (en) | System and method for identifying users | |
CN109962784A (en) | A Data Encryption, Decryption and Recovery Method Based on Digital Envelope Multi-Certificate | |
CN104243494B (en) | A kind of data processing method | |
WO2008031301A1 (en) | A method for the point to point online identity authenticaiton | |
CN103701787A (en) | User name password authentication method implemented on basis of public key algorithm | |
CN112020038A (en) | Domestic encryption terminal suitable for rail transit mobile application | |
CN113507372A (en) | Bidirectional authentication method for interface request | |
CN114513339A (en) | A security authentication method, system and device | |
CN118174921A (en) | Multi-factor SSH login authentication method based on national encryption algorithm and supporting bidirectional authentication | |
CN110866754A (en) | A pure software DPVA identity authentication method based on dynamic password | |
CN110572257B (en) | Identity-based data source identification method and system | |
CN114553441B (en) | Electronic contract signing method and system | |
CN106230840B (en) | A kind of command identifying method of high security | |
CN110855444A (en) | A pure software CAVA identity authentication method based on trusted third party | |
CN114389808B (en) | A Design Method of OpenID Protocol Based on SM9 Blind Signature | |
CN110784305A (en) | Single sign-on authentication method based on careless pseudorandom function and signcryption | |
Subpratatsavee et al. | Internet banking transaction authentication using mobile one-time password and qr code | |
CN114765533B (en) | Remote proving method, device and system based on quantum key communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200228 |
|
RJ01 | Rejection of invention patent application after publication |