[go: up one dir, main page]

CN115412323B - Method for accessing multiple applications through single login based on TCM - Google Patents

Method for accessing multiple applications through single login based on TCM Download PDF

Info

Publication number
CN115412323B
CN115412323B CN202211009513.XA CN202211009513A CN115412323B CN 115412323 B CN115412323 B CN 115412323B CN 202211009513 A CN202211009513 A CN 202211009513A CN 115412323 B CN115412323 B CN 115412323B
Authority
CN
China
Prior art keywords
server
tcm
application server
equipment
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211009513.XA
Other languages
Chinese (zh)
Other versions
CN115412323A (en
Inventor
戴凯
罗辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Yunyong Electronic Technology Co ltd
Original Assignee
Jiangsu Yunyong Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Yunyong Electronic Technology Co ltd filed Critical Jiangsu Yunyong Electronic Technology Co ltd
Priority to CN202211009513.XA priority Critical patent/CN115412323B/en
Publication of CN115412323A publication Critical patent/CN115412323A/en
Application granted granted Critical
Publication of CN115412323B publication Critical patent/CN115412323B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method for accessing a plurality of applications by single login based on TCM, which comprises the steps of judging whether the accessed TCM equipment has login information or not through a CA server, verifying whether the user name and the password are correct or not, writing a flag bit with effective login in the CA server, logging in other application servers of a system, and realizing single login access of a plurality of applications by a user after series signature verification operation and passing. The invention realizes that the TCM equipment can safely access different application programs by single login, is convenient and safe for users to use, and has strong popularization and application values.

Description

Method for accessing multiple applications through single login based on TCM
Technical Field
The invention relates to the technical field of trusted computing, in particular to a method for accessing a plurality of applications by single login based on TCM.
Background
With the development of enterprises, the system applications are correspondingly increased, related personnel need to log in for multiple times when operating different system applications, and account numbers of each system are different, so that redundant operation of operators is increased. Meanwhile, account passwords are easy to leak and are illegally used, and the source cannot be traced. Only one system logs in, other system applications can be used at the same time, and the safety of account passwords and the traceability of operation in the using process are ensured, so that the method is a problem to be solved.
Chinese patent discloses a single sign-on method based on digital certificates, application number CN200310109481.1. According to the method, the digital certificate and the public/private key pair are stored in the application server, the public/private key of the server is utilized to encrypt and store the user information and apply the user information between multiple application systems, so that safe single sign-on is realized, and the method is safe and reliable. Not only avoids the loss of user information caused by the expiration of session, but also solves the limitation of rejecting cookies by the user. The user can log in once without repeatedly inputting login information, thereby realizing 'one-time login and roaming everywhere'. However, the applicant believes that the technical solution of the patent is that each application server issues a set of certificates, and it can be seen that the signature and the signature verification are performed by deriving a public and private key from the certificates. The public and private keys are not protected, and the risk of leakage exists, so that the risk of being leaked and impersonated exists. In the step t, when logging in other application servers, the user needs to log out first and then encrypt the local server private key to form a log-out ciphertext, so that the operation is complicated.
Disclosure of Invention
Aiming at the technical problems, the invention provides a single login access method for a plurality of applications based on TCM, which adopts the following technical scheme:
a method for TCM-based single sign-on access to multiple applications, comprising the steps of:
1) When the TCM equipment accesses the first application server, the first application server determines whether effective login information exists or not to the CA server; if no effective login information exists, returning to a user login interface, wherein a user is required to input a user name and a password;
2) The first application server determines whether the user name and the password of the first application server are correct or not from the user information server, and if so, the first application server is successfully logged in;
3) After successful login, the first application server writes the flag bit with effective login into the CA server, and stores effective login information in the CA server;
4) When any other application server except the first application server is logged in, if the other application server detects that an effective login flag bit is set in the CA server, the effective login information corresponding to the TCM equipment is checked, and if the check passes, the other application server is normally accessed; if the user needs to access the application server other than the current application server, repeating the steps, so that the user can access a plurality of applications in a single login.
Further, the valid login information in the step 3) is composed of four fields in the format: server name + TCM device serial number + username cryptogram signature; wherein the user name password ciphertext is encrypted by using a TCM device public key, and the user name password signature is signed by using a TCM device private key.
Further, the method for signing the effective login information corresponding to the TCM equipment comprises the following steps:
firstly, signing a TCM equipment serial number in the effective login information by using a CA server, and then checking a signature by using a CA server certificate built in the TCM equipment, wherein if the signature passes, the TCM equipment serial number in the effective login information is consistent with the equipment serial number in the TCM equipment;
then, decrypting the user name and the password in the effective login information by using the private key of the TCM equipment, and comparing the decrypted user name and password with the user name and password in the corresponding application server in the user information server; if the login information is consistent, the effective login information is legal, the TCM equipment certificates corresponding to the TCM equipment serial numbers in the CA server are used for checking the labels, if the labels pass, the user name and the password are not changed, and then the other application servers can be normally accessed.
Further, the first application server is any one of a Web server, an FTP server, a file server, and a mail server.
Further, the user information server is used for storing the user name and the password of the corresponding application server.
The invention realizes that the TCM equipment can safely access different application programs by single login, is convenient and safe for users to use, and has strong popularization and application values.
Drawings
Fig. 1: the invention discloses a flow diagram for issuing a TCM equipment certificate.
Fig. 2: the invention discloses a flow diagram of a single login access to a plurality of application servers.
Detailed Description
In order to make the objects, features and advantages of the present invention more comprehensible, the technical solutions in the embodiments of the present invention are described in detail below with reference to the accompanying drawings, and it is apparent that the embodiments described below are only some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In order to facilitate the understanding of the technical solution of the present invention, the following abbreviations and key terms are defined:
trusted cryptography module Trusted Cryptography Module (TCM), a hardware module of a trusted computing platform, provides cryptographic operations for the trusted computing platform, with protected memory space.
The CA server Certificate Authority (CA) takes charge of the functions of batch examination, issuing, archiving, revocation and the like of the digital certificate, and the digital certificate issued by the CA server has a digital signature of the CA server and can be used for identity confirmation.
User information server: the user name and the password of the corresponding application server are stored, and the user name and the password are contained in the effective login information.
The embodiments of the present application are only illustrated by examples of FTP servers, file servers, web servers, mail servers, and applicant should be noted that existing system application servers may be used.
Example 1:
in this embodiment, the manufacturer issues the login authority before the trusted cryptography module TCM device leaves the factory, and the issuing method is as shown in fig. 1, generates a public-private key pair on the TCM device, and uses the TCM device serial number as a part of the subject information to generate certificate request information to request the CA server to issue the device certificate. The CA server issues a TCM (TCM) equipment certificate to the TCM equipment and stores the corresponding relation between the TCM equipment certificate and the TCM equipment serial number. While a CA certificate is preset on the TCM device.
The process of the CA server issuing the TCM device certificate to the TCM device is generally:
(1) The TCM equipment generates public and private key pairs; (2) The TCM equipment forms a P10 certificate request by containing information such as a TCM equipment serial number, a public key and the like; (3) the CA server issues certificates to the TCM devices.
As shown in fig. 2, when the TCM device accesses the Web server, the Web server determines whether valid login information exists to the CA server, and if not, returns to the user login interface. At this point the user is required to enter a user name and password. The Web server determines to the user information server whether the user name and password of the Web server are correct. If the password is correct, the Web server is successfully logged in. After successful login, the Web server writes the flag bit with effective login into the CA server, and stores effective login information in the CA server. The effective login information consists of four fields with the following formats: server name + TCM device serial number + username cryptogram (encrypted using the TCM device public key) +username cryptogram signature (signed using the TCM device private key)).
After successfully logging in the Web server, logging in the FTP server again at this time, the FTP server detects that an effective login flag bit is set in the CA server (different TCM equipment serial numbers correspond to different flag bits, and when a plurality of users use the same, the CA server can have a plurality of effective login information, and can distinguish which TCM equipment is the effective login information according to the TCM equipment serial numbers). The serial numbers of the TCM devices in the effective login information are signed by using a CA server, then a CA certificate built in the TCM devices is used for signature verification, and if the signature verification passes, the TCM device serial numbers in the effective login information are consistent with the device serial numbers in the TCM devices.
And if the equipment serial number in the effective login information is consistent with the serial number in the TCM equipment, decrypting the user name and the password in the effective login information by using the private key of the TCM equipment, and comparing the decrypted user name and password with the user name and password in the corresponding application server in the user information server. If the information is consistent, the effective login information is legal, then the TCM equipment certificates corresponding to the TCM equipment serial numbers in the CA server are used for checking the labels, and if the labels pass the checking. Indicating that the user name and password have not been changed, the FTP server may be accessed normally at this time.
The private key of the CA server and the private key of the TCM equipment of the embodiment cannot be derived, the risk of leakage cannot exist, and the security is high.
In the embodiment, the CA server is used for signing the TCM equipment serial number in the effective login information, and then the CA server certificate built in the TCM equipment is used for verifying the signature, and the user name and the password in the effective login information are also verified by using the equipment certificate corresponding to the TCM, so that the identity verification effect can be achieved, the safety can be ensured, and the step that the random number signature is required to be generated each time in the prior art is omitted.
In the embodiment, the effective login information is stored in the CA server, and when the user switches to log in different application servers, the corresponding server only needs to call the corresponding interface to decrypt the user name and the password in the login information by using the private key of the TCM equipment, so that unnecessary operations are reduced.
Example 2:
the difference from the above embodiment 1 is that, after the Web server is successfully logged in, the mail server logs in, and the mail server detects that the valid login flag bit (different TCM device serial numbers correspond to different flag bits) has been set in the CA server, and when a plurality of users use the CA server has a plurality of valid login information, which TCM device valid login information can be distinguished according to the TCM device serial numbers. The serial numbers of the TCM devices in the effective login information are signed by using a CA server, then a CA certificate built in the TCM devices is used for signature verification, and if the signature verification passes, the TCM device serial numbers in the effective login information are consistent with the device serial numbers in the TCM devices.
And if the equipment serial number in the effective login information is consistent with the serial number in the TCM equipment, decrypting the user name and the password in the effective login information by using the private key of the TCM equipment, and comparing the decrypted user name and password with the user name and password in the corresponding application server in the user information server. If the information is consistent, the effective login information is legal, then the TCM equipment certificates corresponding to the TCM equipment serial numbers in the CA server are used for checking the labels, and if the labels pass the checking. Indicating that the user name and password have not been altered, the mail server may be accessed normally at this time.
Example 3:
the difference from the above embodiment is that the Web server is replaced with an FTP server, the FTP server is replaced with a file server, and the rest methods are the same.

Claims (4)

1. A method for TCM-based single sign-on access to multiple applications, comprising the steps of:
1) When the TCM equipment accesses the first application server, the first application server determines whether effective login information exists or not to the CA server; if no effective login information exists, returning to a user login interface, wherein a user is required to input a user name and a password;
2) The first application server determines whether the user name and the password of the first application server are correct or not from the user information server, and if so, the first application server is successfully logged in;
3) After successful login, the first application server writes the flag bit with effective login into the CA server, and stores effective login information in the CA server;
4) When any other application server except the first application server is logged in, if the other application server detects that an effective login flag bit is set in the CA server, the effective login information corresponding to the TCM equipment is checked, and if the check passes, the other application server is normally accessed; if the user needs to access the application server other than the current application server, repeating the step 4), so as to realize that the user accesses a plurality of applications in a single login, wherein the effective login information consists of four fields with the following formats: server name + TCM device serial number + username cryptogram signature; wherein the method comprises the steps of
The user name cipher text is encrypted by using a TCM (trusted computer system) equipment public key, the user name cipher signature is signed by using a TCM equipment private key, and the English of the TCM is named Trusted Cryptography Module, namely: a trusted cryptography module; the English language of CA is called Certificate Authority, namely: a credential management center.
2. The TCM-based single-sign-on method of accessing multiple applications of claim 1, wherein: the method for checking the effective login information corresponding to the TCM equipment comprises the following steps:
firstly, signing a TCM equipment serial number in the effective login information by using a CA server, and then checking a signature by using a CA server certificate built in the TCM equipment, wherein if the signature passes, the TCM equipment serial number in the effective login information is consistent with the equipment serial number in the TCM equipment;
then, decrypting the user name and the password in the effective login information by using the private key of the TCM equipment, and comparing the decrypted user name and password with the user name and password in the corresponding application server in the user information server; if the login information is consistent, the effective login information is legal, the TCM equipment certificates corresponding to the TCM equipment serial numbers in the CA server are used for checking the labels, if the labels pass, the user name and the password are not changed, and the other application servers are normally accessed at the moment.
3. The TCM-based single-sign-on method of accessing multiple applications of claim 2, wherein: the first application server is any one of a Web server, an FTP server, a file server and a mail server.
4. The TCM-based single-sign-on method of accessing multiple applications of claim 1, wherein: the user information server is used for storing the user name and the password of the corresponding application server.
CN202211009513.XA 2022-08-23 2022-08-23 Method for accessing multiple applications through single login based on TCM Active CN115412323B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211009513.XA CN115412323B (en) 2022-08-23 2022-08-23 Method for accessing multiple applications through single login based on TCM

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211009513.XA CN115412323B (en) 2022-08-23 2022-08-23 Method for accessing multiple applications through single login based on TCM

Publications (2)

Publication Number Publication Date
CN115412323A CN115412323A (en) 2022-11-29
CN115412323B true CN115412323B (en) 2023-07-18

Family

ID=84162420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211009513.XA Active CN115412323B (en) 2022-08-23 2022-08-23 Method for accessing multiple applications through single login based on TCM

Country Status (1)

Country Link
CN (1) CN115412323B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101626292A (en) * 2008-07-09 2010-01-13 上海格尔软件股份有限公司 Linux log-on protection method
CN106559408A (en) * 2015-11-27 2017-04-05 国网智能电网研究院 A kind of SDN authentication methods based on trust management
US9736145B1 (en) * 2014-08-01 2017-08-15 Secureauth Corporation Generation and validation of derived credentials
US11245690B1 (en) * 2020-02-05 2022-02-08 Dg Ventures, Llc System and method for streamlined user authentication on a server using a securely stored client identifier

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1323508C (en) * 2003-12-17 2007-06-27 上海市高级人民法院 A Single Sign On method based on digital certificate
EP2055077B1 (en) * 2006-08-22 2017-04-05 InterDigital Technology Corporation Method and apparatus for providing trusted single sign-on access to applications and internet-based services
WO2011031272A1 (en) * 2009-09-14 2011-03-17 Interdigital Patent Holdings, Inc. Method and apparatus for trusted authentication and logon
CN102111410B (en) * 2011-01-13 2013-07-03 中国科学院软件研究所 Agent-based single sign on (SSO) method and system
JP6417483B2 (en) * 2014-12-31 2018-11-07 サイトリックス システムズ,インコーポレイテッド Shared secret repository for applications including single sign-on
CN110334489A (en) * 2019-07-12 2019-10-15 广州大白互联网科技有限公司 A kind of unified single sign-on system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101626292A (en) * 2008-07-09 2010-01-13 上海格尔软件股份有限公司 Linux log-on protection method
US9736145B1 (en) * 2014-08-01 2017-08-15 Secureauth Corporation Generation and validation of derived credentials
CN106559408A (en) * 2015-11-27 2017-04-05 国网智能电网研究院 A kind of SDN authentication methods based on trust management
US11245690B1 (en) * 2020-02-05 2022-02-08 Dg Ventures, Llc System and method for streamlined user authentication on a server using a securely stored client identifier

Also Published As

Publication number Publication date
CN115412323A (en) 2022-11-29

Similar Documents

Publication Publication Date Title
US11316685B1 (en) Systems and methods for encrypted content management
CN111783075B (en) Authority management method, device and medium based on secret key and electronic equipment
US10929524B2 (en) Method and system for verifying an access request
US10122529B2 (en) System and method of enforcing a computer policy
US10250591B2 (en) Password-based authentication
CN113626802B (en) Login verification system and method for equipment password
CN103067399A (en) A wireless transmitting/receiving unit
CN114697040A (en) Electronic signature method and system based on symmetric key
CN110740116B (en) System and method for multi-application identity authentication
CN119484898A (en) Encrypted video playback method, device, storage medium and computer equipment
KR20180087543A (en) Key management method and fido authenticator software authenticator
Mahnamfar et al. ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems
CN110830507B (en) Resource access method, device, electronic equipment and system
CN115412323B (en) Method for accessing multiple applications through single login based on TCM
CN115549930B (en) Verification method for logging in operating system
CN114553566B (en) Data encryption method, device, equipment and storage medium
CN117494104A (en) 3 DES-based password management method, system, equipment and medium
EP4222623A1 (en) Exclusive self-escrow method and apparatus
CN112260831A (en) Security authentication method based on dynamic key
CN112685293A (en) Testing method of encryption interface and related equipment
Doğan A Survey on Password-free Authentication Method: Passkey
Yingkai et al. A kind of identity authentication under cloud computing environment
Xu et al. OTP bidirectional authentication scheme based on MAC address
CN114866253B (en) Reliable cloud host login system and cloud host login method implemented by same
CN118842657B (en) Method and device for accessing computing power resources of intelligent computing center

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant