CN116188007A - Identity verification method and system - Google Patents
Identity verification method and system Download PDFInfo
- Publication number
- CN116188007A CN116188007A CN202310071637.9A CN202310071637A CN116188007A CN 116188007 A CN116188007 A CN 116188007A CN 202310071637 A CN202310071637 A CN 202310071637A CN 116188007 A CN116188007 A CN 116188007A
- Authority
- CN
- China
- Prior art keywords
- credential
- computing node
- user
- identity
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域Technical Field
本申请涉及信息安全技术领域,尤其涉及一种身份验证方法及系统。The present application relates to the field of information security technology, and in particular to an identity authentication method and system.
背景技术Background Art
在金融业务领域,一些交易平台会通过终端设备的应用程序支持用户进行财务支付等金融交易。相关技术中,通过终端设备或第三方对用户的身份信息进行认证,以便确认用户使用数据的合法性。但是当第三方不可信,终端设备或第三方被攻击等情况发生时,相关技术的方法无法保证用户信息的安全。In the financial business field, some trading platforms support users to conduct financial transactions such as financial payments through applications on terminal devices. In related technologies, the user's identity information is authenticated through the terminal device or a third party to confirm the legitimacy of the user's use of data. However, when the third party is untrustworthy, the terminal device or the third party is attacked, etc., the related technical methods cannot guarantee the security of user information.
由此可见,相关技术存在用户信息数据安全性低的问题。This shows that the related technology has the problem of low security of user information data.
发明内容Summary of the invention
有鉴于此,本申请的目的在于解决背景技术所述的用户信息数据安全性低的问题,提出一种身份验证方法及系统。In view of this, the purpose of this application is to solve the problem of low security of user information data described in the background technology and to propose an identity authentication method and system.
基于上述目的,本申请提供了一种身份验证方法,应用于身份验证系统,所述系统包括:计算节点端、用户端、终端设备端;所述终端设备端安装有至少一个应用程序;Based on the above purpose, the present application provides an identity authentication method, which is applied to an identity authentication system, the system comprising: a computing node end, a user end, and a terminal device end; the terminal device end is installed with at least one application;
所述方法,包括:The method comprises:
所述用户端发送目标身份凭证及开放权限请求至所述终端设备端;The user terminal sends the target identity certificate and the open permission request to the terminal device terminal;
所述终端设备端发送所述目标身份凭证及验证请求至所述计算节点端;The terminal device sends the target identity certificate and the verification request to the computing node;
所述计算节点端响应于确定根据所述验证请求所述目标身份凭证验证通过,发送正反馈信息至所述终端设备端;In response to determining that the target identity credential is verified according to the verification request, the computing node sends positive feedback information to the terminal device;
所述终端设备端根据所述正反馈信息向所述用户端开放所述目标应用程序的权限。The terminal device opens the permission of the target application to the user terminal according to the positive feedback information.
可选地,所述目标身份凭证的获取方法包括:Optionally, the method for obtaining the target identity credential includes:
所述用户端发送用户身份信息及主凭证请求至所述计算节点端;The user terminal sends user identity information and a master credential request to the computing node terminal;
所述计算节点端响应于根据所述主凭证请求所述用户信息验证通过,对所述主凭证加密并发送至所述用户端;In response to the user information verification being passed by the request according to the master credential, the computing node encrypts the master credential and sends it to the user end;
所述用户端通过解密,得到所述主凭证;The user terminal obtains the master certificate by decrypting;
所述用户端发送用户属性信息、所述主凭证及系统分凭证请求至所述计算节点端;The user terminal sends user attribute information, the main credential and a system sub-credential request to the computing node terminal;
所述计算节点端响应于根据所述系统分凭证请求对所述用户属性信息、主凭证验证通过,对所述系统分凭证加密并至发送至所述用户端;In response to the user attribute information and the primary credential being verified according to the system credential request, the computing node encrypts the system credential and sends it to the user end;
所述用户端通过解密,得到所述系统分凭证;The user terminal obtains the system sub-credential by decryption;
所述用户端发送所述主凭证、所述系统分凭证及应用分凭证请求至所述计算节点端;The user terminal sends the master credential, the system sub-credential and the application sub-credential request to the computing node terminal;
所述计算节点端响应于根据所述应用分凭证请求对所述主凭证、所述系统分凭证验证通过,对所述应用分凭证加密并发送至所述用户端;每个所述应用分凭证唯一对应一个应用程序;In response to the main credential and the system credential being verified according to the application credential request, the computing node encrypts the application credential and sends it to the user end; each application credential uniquely corresponds to an application program;
所述用户端通过解密,得到所述应用分凭证;The user terminal obtains the application sub-credential by decrypting;
所述用户端将所述主凭证、所述系统分凭证、所述目标应用程序对应的应用分凭证作为分凭证集合,得到目标身份凭证。The user terminal uses the main credential, the system sub-credential, and the application sub-credential corresponding to the target application as a sub-credential set to obtain a target identity credential.
可选地,所述计算节点端的加密方法包括:Optionally, the encryption method at the computing node end includes:
获取随机数并生成一个生成元为P的循环群;Get random numbers And generate a cyclic group with generator P;
计算Yi=λi·P,δi=H3(PIDi,credi,pki,Yi), Calculate Y i =λ i ·P, δ i =H 3 (PID i , cred i , pk i , Y i ),
其中,P为循环群的生成元,PIDi为所述计算节点端假名,credi为所述计算节点端发送的分凭证,pki为所述计算节点端的公钥,ski为所述计算节点端的私钥;Wherein, P is the generator of the cyclic group, PID i is the pseudonym of the computing node, cred i is the sub-credential sent by the computing node, pk i is the public key of the computing node, and sk i is the private key of the computing node;
设置加密签名为σi=(Yi,Φi);Set the encrypted signature to σ i =(Y i ,Φ i );
将(PIDi,credi,pki,σi,Ti)作为加密信息,其中Ti为所述加密信息的时间戳。(PID i , cred i , pk i , σ i , Ti ) is used as the encryption information, where Ti is the timestamp of the encryption information.
可选地,所述用户端的解密方法包括:Optionally, the decryption method of the user terminal includes:
计算δi=H3(PIDi,credi,pki,Yi);Calculate δ i =H 3 (PID i , cred i , pk i , Y i );
根据所述δi,计算验证等式 According to the δ i , the calculation verifies the equation
其中,Ui为所述计算节点端的公钥生成过程的中间值,θi为所述计算节点端的私钥生成过程的中间值;Wherein, U i is the intermediate value of the public key generation process of the computing node end, and θ i is the intermediate value of the private key generation process of the computing node end;
响应于确定所述验证等式能够正确证明,确定解密完成。In response to determining that the verification equation can be correctly proved, it is determined that decryption is complete.
可选地,所述用户属性信息的获取方法,包括:Optionally, the method for acquiring user attribute information includes:
所述用户端获取所述目标应用程序的属性结构信息,并根据所述属性结构信息确定属性名称;The user terminal obtains the attribute structure information of the target application, and determines the attribute name according to the attribute structure information;
所述用户端根据所述属性名称调取对应的属性值;The user terminal retrieves the corresponding attribute value according to the attribute name;
所述用户端根据所述属性名称、所述属性值确定所述用户属性信息。The user terminal determines the user attribute information according to the attribute name and the attribute value.
可选地,所述用户端发送目标身份凭证及开放权限请求至所述终端设备端,包括:Optionally, the user terminal sends the target identity credential and the open permission request to the terminal device terminal, including:
获取预定的系统主密钥Msk和系统公共参数 Get the predetermined system master key Msk and system public parameters
指定所有所述目标身份凭证的分凭证的访问结构;Specifying an access structure of all sub-credentials of the target identity credential;
对于任一分凭证fu,随机选取一个秘密数ku∈GT作为其对称加密密钥,并随机选取一个随机数 For any sub-credential f u , a secret number k u ∈ GT is randomly selected as its symmetric encryption key, and a random number is randomly selected
根据所述秘密数ku和所述随机数su,计算得到该分凭证fu的密文Cu={Cu,-1,Cu,0,Cu,1,Cu,2};其中, 表示对fu进行以ku为密钥的对称加密算法;响应于确定该分凭证的每一属性atti的属性值确定 所述每一属性atti为用户身份信息或用户属性信息;According to the secret number ku and the random number su , the ciphertext of the sub-voucher fu is calculated as Cu = {Cu ,-1 , Cu,0 , Cu ,1 , Cu ,2 }; wherein, represents a symmetric encryption algorithm using k u as the key for f u ; in response to determining the attribute value of each attribute att i of the sub-voucher Sure Each attribute at i is user identity information or user attribute information;
响应于确定该分凭证的每一属性atti的属性值确定Ci,2,t为数据集合G的一个随机数;In response to determining the attribute value of each attribute at i of the sub-credential Determine Ci,2,t as a random number in the data set G;
集合所有所述分凭证的密文,得到目标密文C={C1,C2,···,Cu,···,CN};Gather the ciphertexts of all the sub-vouchers to obtain the target ciphertext C = {C 1 ,C 2 ,···,C u ,···,C N };
所述用户端发送所述目标身份凭证、所述目标密文以及开放权限请求至所述终端设备端。The user terminal sends the target identity credential, the target ciphertext and an open permission request to the terminal device terminal.
可选地,所述所述终端设备端发送所述目标身份凭证及验证请求至所述计算节点端,包括:Optionally, the terminal device sends the target identity credential and the verification request to the computing node, including:
所述终端设备端根据所述开放权限请求,发送所述目标身份凭证、目标密文及验证请求至所述计算节点端。The terminal device sends the target identity credential, target ciphertext and verification request to the computing node according to the open permission request.
可选地,所述终端设备端发送所述目标身份凭证、目标密文及验证请求至所述计算节点端后,所述方法还包括:Optionally, after the terminal device sends the target identity credential, the target ciphertext and the verification request to the computing node, the method further includes:
所述计算节点端,响应于确定所述目标身份凭证的分凭证的访问结构符合验证条件,通过秘钥加密算法,计算得到所述目标身份凭证的私钥;The computing node, in response to determining that the access structure of the sub-credential of the target identity credential meets the verification condition, calculates the private key of the target identity credential through a secret key encryption algorithm;
根据所述私钥和所述主密钥,得到解密密钥;Obtaining a decryption key according to the private key and the master key;
响应于确定所述解密秘钥能够解密所述目标密文,确定所述目标身份凭证验证通过。In response to determining that the decryption key is capable of decrypting the target ciphertext, it is determined that the target identity credential is authenticated.
可选地,所述通过秘钥加密算法,计算得到所述目标身份凭证的私钥,包括:Optionally, the calculating the private key of the target identity credential by using a secret key encryption algorithm includes:
获取所述目标身份凭证的身份属性列表L=[L1,L2,···,Ln];Obtaining the identity attribute list L=[L 1 ,L 2 ,...,L n ] of the target identity credential;
根据所述身份属性列表,计算得到密钥skL={D0,D1,D2};其中, D1={D1i},Qs=h1(L),According to the identity attribute list, the key sk L ={D 0 ,D 1 ,D 2 } is calculated; wherein, D 1 = {D 1i }, Qs = h1 (L),
其中,α和s为预定的系统主密钥元素,ui为所述目标身份凭证的第i个属性值,iti为所述身份属性列表的第i个身份属性。Among them, α and s are predetermined system master key elements, ui is the i-th attribute value of the target identity credential, and iti is the i-th identity attribute of the identity attribute list.
基于同一发明构思,本申请还提供了一种身份验证系统,包括:Based on the same inventive concept, the present application also provides an identity authentication system, including:
计算节点端、用户端、终端设备端;所述终端设备端安装有至少一个应用程序;所述计算节点端、所述用户端和所述终端设备端通信连接;A computing node end, a user end, and a terminal device end; the terminal device end is installed with at least one application; the computing node end, the user end, and the terminal device end are in communication connection;
所述用户端被配置为发送目标身份凭证及开放权限请求至所述终端设备端;The user terminal is configured to send a target identity certificate and an open permission request to the terminal device terminal;
所述终端设备端被配置发送所述目标身份凭证及验证请求至所述计算节点端;The terminal device is configured to send the target identity credential and the verification request to the computing node;
所述计算节点端被配置响应于确定根据所述验证请求所述目标身份凭证验证通过,发送正反馈信息至所述终端设备端;The computing node is configured to send positive feedback information to the terminal device in response to determining that the target identity credential is authenticated according to the authentication request;
所述终端设备端被配置根据所述正反馈信息向所述用户端开放所述目标应用程序的权限。The terminal device is configured to open permissions of the target application to the user terminal according to the positive feedback information.
从上面所述可以看出,本申请提供的身份验证方法、系统、电子设备及存储介质,通过可信第三方——计算节点端实现用户身份凭证的分发和验证。其中身份凭证的分发和验证过程中,只涉及用户的部分属性信息。以此保护用户的信息免遭泄露,提高了用户信息的安全性。From the above, it can be seen that the identity authentication method, system, electronic device and storage medium provided by this application realize the distribution and verification of user identity credentials through a trusted third party - the computing node. In the distribution and verification process of the identity credentials, only part of the user's attribute information is involved. In this way, the user's information is protected from leakage and the security of the user's information is improved.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本申请或相关技术中的技术方案,下面将对实施例或相关技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the present application or related technologies, the drawings required for use in the embodiments or related technical descriptions are briefly introduced below. Obviously, the drawings described below are merely embodiments of the present application. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying any creative work.
图1为本申请一个或多个实施例的身份验证方法的流程示意图;FIG1 is a schematic diagram of a process flow of an identity authentication method according to one or more embodiments of the present application;
图2为本申请一个或多个实施例的身份验证方法的流程示意图;FIG2 is a schematic diagram of a process flow of an identity authentication method according to one or more embodiments of the present application;
图3为本申请一个或多个实施例的身份验证系统的结构示意图。FIG3 is a schematic diagram of the structure of an identity authentication system according to one or more embodiments of the present application.
具体实施方式DETAILED DESCRIPTION
为使本申请的目的、技术方案和优点更加清楚明白,以下结合具体实施例,并参照附图,对本申请进一步详细说明。In order to make the objectives, technical solutions and advantages of the present application more clearly understood, the present application is further described in detail below in combination with specific embodiments and with reference to the accompanying drawings.
需要说明的是,除非另外定义,本申请实施例使用的技术术语或者科学术语应当为本申请所属领域内具有一般技能的人士所理解的通常意义。本申请实施例中使用的“第一”、“第二”以及类似的词语并不表示任何顺序、数量或者重要性,而只是用来区分不同的组成部分。“包括”或者“包含”等类似的词语意指出现该词前面的元件或者物件涵盖出现在该词后面列举的元件或者物件及其等同,而不排除其他元件或者物件。“连接”或者“相连”等类似的词语并非限定于物理的或者机械的连接,而是可以包括电性的连接,不管是直接的还是间接的。“上”、“下”、“左”、“右”等仅用于表示相对位置关系,当被描述对象的绝对位置改变后,则该相对位置关系也可能相应地改变。It should be noted that, unless otherwise defined, the technical terms or scientific terms used in the embodiments of the present application should be the usual meanings understood by people with ordinary skills in the field to which the present application belongs. The "first", "second" and similar words used in the embodiments of the present application do not represent any order, quantity or importance, but are only used to distinguish different components. "Including" or "comprising" and similar words mean that the elements or objects appearing in front of the word cover the elements or objects listed after the word and their equivalents, without excluding other elements or objects. "Connect" or "connected" and similar words are not limited to physical or mechanical connections, but can include electrical connections, whether direct or indirect. "Up", "down", "left", "right" and the like are only used to indicate relative positional relationships. When the absolute position of the described object changes, the relative positional relationship may also change accordingly.
如背景技术所述,在金融业务领域,一些交易平台会通过终端设备的应用程序支持用户进行财务支付等金融交易。As described in the background art, in the field of financial services, some trading platforms support users to conduct financial transactions such as financial payments through applications on terminal devices.
相关技术中,通过终端设备或第三方对用户的身份信息进行认证,以便确认用户使用数据的合法性。在进行合法性的验证过程中,相关技术通过要求提供用户的全部信息,导致攻击者可以通过技术手段获取用户的全部信息,用户的隐私数据被泄露。In the related technologies, the user's identity information is authenticated through the terminal device or a third party to confirm the legitimacy of the user's use of data. In the process of legitimacy verification, the related technologies require the user to provide all the information, which allows attackers to obtain all the user's information through technical means, and the user's private data is leaked.
综上所述,相关技术存在用户信息数据安全性低的问题。In summary, the related technology has the problem of low security of user information data.
由此,本申请提出一种身份验证方法,根据目标应用程序的要求,提供目标应用程序要求的属性数据,而非全部属性数据,以此保护用户的数据安全。Therefore, the present application proposes an identity authentication method, which provides the attribute data required by the target application, rather than all the attribute data, according to the requirements of the target application, so as to protect the user's data security.
以下,通过具体的实施例来详细说明本说明书一个或多个实施例的技术方案。The technical solutions of one or more embodiments of this specification are described in detail below through specific examples.
参考图1,本申请一个或多个实施例的身份验证方法,应用于身份验证系统,所述系统包括:计算节点端、用户端、终端设备端;所述终端设备端安装有至少一个应用程序;Referring to FIG1 , the identity authentication method of one or more embodiments of the present application is applied to an identity authentication system, the system comprising: a computing node end, a user end, and a terminal device end; the terminal device end is installed with at least one application;
所述方法,包括:The method comprises:
步骤S101:所述用户端发送目标身份凭证及开放权限请求至所述终端设备端。Step S101: The user terminal sends a target identity certificate and an open permission request to the terminal device terminal.
在一些实施例中,所述用户端在发送目标身份凭证及开放权限请求至所述终端设备端,之前,通过如下方法获取所述目标身份凭证:所述用户端发送用户身份信息及主凭证请求至所述计算节点端;所述计算节点端响应于根据所述主凭证请求对所述用户信息验证通过,发送主凭证至所述用户端;所述用户端发送用户属性信息、所述主凭证及系统分凭证请求至所述计算节点端;所述计算节点端响应于根据所述系统分凭证请求对所述用户属性信息、主凭证验证通过,发送系统分凭证至所述用户端;所述用户端发送所述主凭证、所述系统分凭证及应用分凭证请求至所述计算节点端;所述计算节点端响应于根据所述应用分凭证请求对所述主凭证、所述系统分凭证验证通过,发送应用分凭证至所述用户端;每个所述应用分凭证唯一对应一个应用程序;所述用户端集合所述主凭证、所述系统分凭证、所述目标应用程序对应的应用分凭证,得到目标身份凭证。In some embodiments, before sending the target identity credential and the open permission request to the terminal device, the user end obtains the target identity credential by the following method: the user end sends user identity information and a master credential request to the computing node end; the computing node end sends the master credential to the user end in response to the verification of the user information according to the master credential request; the user end sends user attribute information, the master credential and a system sub-credential request to the computing node end; the computing node end sends the system sub-credential to the user end in response to the verification of the user attribute information and the master credential according to the system sub-credential request; the user end sends the master credential, the system sub-credential and the application sub-credential request to the computing node end; the computing node end sends the application sub-credential to the user end in response to the verification of the master credential and the system sub-credential according to the application sub-credential request; each of the application sub-credentials uniquely corresponds to an application; the user end collects the master credential, the system sub-credential and the application sub-credential corresponding to the target application to obtain the target identity credential.
也即,在一些实施例中,所述用户端通过与所述计算节点端的交互,依次获得主凭证、系统分凭证和应用分凭证。That is, in some embodiments, the user terminal obtains the main credential, the system sub-credential and the application sub-credential in sequence through interaction with the computing node terminal.
在一些实施例中,所述主凭证由上下文(context)、声明(claim)和来源(source)三部分组成。其中,context指明为固定位“master”,以表示该凭证为主凭证;claim由属性名称、对属性值的承诺以及属性值的来源组成,通过claim={a,value,P}表示,属性名称a为用户身份标识号码(ID,Identity Document),属性值为用户身份信息,属性值的来源可以为预定的可信第三方获取;source为发放该凭证的计算节点的ID。在一些实施例中,属性值加密存储。In some embodiments, the master credential consists of three parts: context, claim, and source. Among them, context specifies the fixed bit "master" to indicate that the credential is a master credential; claim consists of the attribute name, the commitment to the attribute value, and the source of the attribute value, which is represented by claim = {a, value, P}. The attribute name a is the user identity identification number (ID, Identity Document), the attribute value is the user identity information, and the source of the attribute value can be obtained from a predetermined trusted third party; source is the ID of the computing node that issued the credential. In some embodiments, the attribute value is stored encrypted.
在一些实施例中,所述系统分凭证由context、claim、source三部分组成。其中,context指明其存储的信息内容;claim由属性名称、对属性值的承诺以及属性值的来源组成,通过claim={a,value,P}表示,属性名称a为用户身份标识号码(ID,IdentityDocument),属性值为用户属性信息,属性值的来源可以为预定的可信第三方获取;source为发放该凭证的计算节点的ID。在一些实施例中,属性值加密存储。In some embodiments, the system sub-credential consists of three parts: context, claim, and source. Among them, context indicates the information content stored; claim consists of the attribute name, the commitment to the attribute value, and the source of the attribute value, which is represented by claim = {a, value, P}, where the attribute name a is the user identity identification number (ID, IdentityDocument), the attribute value is the user attribute information, and the source of the attribute value can be obtained from a predetermined trusted third party; source is the ID of the computing node that issued the credential. In some embodiments, the attribute value is stored encrypted.
在一些实施例中,所述应用分凭证由context、source两部分组成。其中,context指明其对应应用程序的运行环境信息;source为发放该凭证的计算节点的ID。In some embodiments, the application sub-credential consists of two parts: context and source, wherein the context indicates the operating environment information of the corresponding application program; and the source is the ID of the computing node that issued the credential.
如图2所示,在一些实施例中,所述获取主凭证的步骤具体包括:所述用户端通过一个可信的第三方获取用户身份识别号,然后根据所述用户身份识别号发送一个claim至所述计算节点端请求主凭证,如上所述,所述claim为一个包括属性名称、属性值、属性值的来源三组信息的三元组;所述计算节点端响应于收到所述claim,验证所述claim的合法性,并在确认合法的基础上与数据库中存储属性名称、属性值进行对比,响应于未在数据库中找到对应的数据,表明该用户未注册主凭证,则生成主凭证并发送至所述用户端。在一些实施例中,所述计算节点端利用无证书签名对所述主凭证进行加密。在一些实施例中,所述计算节点在发送所述主凭证的同时存储所述属性名称、属性值至所述数据库中。As shown in FIG. 2 , in some embodiments, the step of obtaining the master credential specifically includes: the user end obtains the user identification number through a trusted third party, and then sends a claim to the computing node end to request the master credential based on the user identification number. As described above, the claim is a triplet including three groups of information: attribute name, attribute value, and source of attribute value; in response to receiving the claim, the computing node end verifies the legitimacy of the claim, and compares the attribute name and attribute value with the attribute name and attribute value stored in the database on the basis of confirming the legitimacy. In response to not finding the corresponding data in the database, indicating that the user has not registered the master credential, the master credential is generated and sent to the user end. In some embodiments, the computing node end encrypts the master credential using a certificateless signature. In some embodiments, the computing node stores the attribute name and attribute value in the database while sending the master credential.
在一些实施例中,所述获取系统分凭证的步骤具体包括:所述用户端提交主凭证、用户属性信息及系统分凭证请求至所述计算节点端;所述计算节点端响应于收到所述主凭证,验证所述主凭证中的属性名称、属性值与数据库中存储的属性名称、属性值进行比对以确定所述主凭证的合法性,响应于确定所述主凭证通过验证,生成所述系统分凭证并发送至所述用户端。在一些实施例中,所述用户属性信息的获取方法,包括:所述用户端获取所述目标应用程序的属性结构信息,并根据所述属性结构信息确定属性名称;所述用户端根据所述属性名称调取对应的属性值;所述用户端根据所述属性名称、所述属性值确定所述用户属性信息。例如,根据所述目标应用程序的属性结构信息要求用户提供的属性信息包括性别、年龄和家庭住址,所述用户端根据上述要求,筛选出性别、年龄和家庭住址的属性值,并根据上述属性名称及属性值确定所述用户属性信息。在一些实施例中,所述用户属性信息可以包括性别、年龄、住址等信息。在一些实施例中,所述计算节点端利用无证书签名对所述主凭证进行加密。In some embodiments, the step of obtaining the system sub-credential specifically includes: the user terminal submits the master credential, user attribute information and the system sub-credential request to the computing node terminal; the computing node terminal verifies the attribute name and attribute value in the master credential in response to receiving the master credential, and compares the attribute name and attribute value stored in the database to determine the legitimacy of the master credential, and generates the system sub-credential and sends it to the user terminal in response to determining that the master credential passes the verification. In some embodiments, the method for obtaining user attribute information includes: the user terminal obtains the attribute structure information of the target application, and determines the attribute name according to the attribute structure information; the user terminal retrieves the corresponding attribute value according to the attribute name; the user terminal determines the user attribute information according to the attribute name and the attribute value. For example, according to the attribute structure information of the target application, the attribute information required to be provided by the user includes gender, age and home address. According to the above requirements, the user terminal selects the attribute values of gender, age and home address, and determines the user attribute information according to the above attribute name and attribute value. In some embodiments, the user attribute information may include information such as gender, age, and address. In some embodiments, the computing node encrypts the master credential using a certificateless signature.
在一些实施例中,所述获取应用分凭证的步骤具体包括:所述用户端提交所述主凭证、系统分凭证及应用分凭证请求至所述计算节点端;所述计算节点在收到上述信息后,首先根据所述主凭证的属性名称、属性值进行验证,再根据根据所述系统分凭证进行验证,响应于验证通过,根据所述应用分凭证请求发放所述应用分凭证。在一些实施例中,所述计算节点端利用无证书签名对所述主凭证进行加密。In some embodiments, the step of obtaining the application sub-credential specifically includes: the user terminal submits the master credential, system sub-credential and application sub-credential request to the computing node terminal; after receiving the above information, the computing node first verifies according to the attribute name and attribute value of the master credential, and then verifies according to the system sub-credential, and in response to the verification passing, issues the application sub-credential according to the application sub-credential request. In some embodiments, the computing node terminal encrypts the master credential using a certificateless signature.
在一些实施例中,主凭证根据用户身份信息验证获得,系统分凭证根据用户属性信息验证获得。在一些实施例中,所述用户身份信息是所述用户端的唯一认证凭证。在一些实施例中,所述用户身份信息可以为用户身份证号或系统分配用户的唯一识别码。在一些实施例中,所述用户属性信息包括用户的其他身份信息,可以包括性别、民族、职业等信息。在一些实施例中,所述用户属性信息可以根据所述目标应用程序的要求进行提供。例如,所述目标应用程序需要用户姓名、年龄、性别、职业等属性信息,则用户端只需要提供上述属性信息即可,无需提供全部属性信息。In some embodiments, the main credential is obtained by verifying the user identity information, and the system sub-credential is obtained by verifying the user attribute information. In some embodiments, the user identity information is the only authentication credential of the user terminal. In some embodiments, the user identity information may be the user ID number or the unique identification code assigned to the user by the system. In some embodiments, the user attribute information includes other identity information of the user, which may include gender, nationality, occupation and other information. In some embodiments, the user attribute information may be provided according to the requirements of the target application. For example, if the target application requires attribute information such as user name, age, gender, occupation, etc., the user terminal only needs to provide the above attribute information, without providing all attribute information.
在一些实施例中,所述计算节点端向用户端发送凭证时利用无证书密码签名技术对所述凭证进行加密。通过所述无证书密码签名技术可以实现如下安全需求:保证凭证的不可伪造性;具有无链接性,即攻击者无法链接在不同时间发送的消息;抵抗各类已知攻击,如中间人攻击、重放攻击、修改攻击等。In some embodiments, the computing node uses a certificateless cryptographic signature technology to encrypt the credentials when sending them to the user. The certificateless cryptographic signature technology can achieve the following security requirements: ensuring that the credentials cannot be forged; having no linkability, that is, attackers cannot link messages sent at different times; and resisting various known attacks, such as man-in-the-middle attacks, replay attacks, modification attacks, etc.
在一些实施例中,所述生成无证书密码签名的方法如下:首先进行初始化,计算节点端通过群组密钥协商算法协商出一个数并计算Ppub=α·P,P为预先生成的循环群的生成元。设置α为共同密钥,Ppub为公钥,选择三个通用哈希函数 在保证α保密的前提下,发布系统参数params={q,G,P,Ppub,H1,H2,H3};然后根据计算节点端真实的标识符IDi∈{0,1}*生成相应的假名,在一些实施例中,所述计算节点端包括多个计算节点,各计算节点计算各自节点的假名PIDi=(AIDi,Ti),其中, Ti为所述加密信息的时间戳。计算节点端的计算节点基于自己的假名PIDi生成自己的部分私钥,计算节点选择一个随机数并计算Xi=xi·P,Ri=H2(PIDi,Xi,Ppub)和θi=(xi+α·Ri)modq,各个计算节点生成部分私钥spki=(θi,Xi),并计算Ri=H2(PIDi,Xi,Ppub),计算节点端的各个计算节点通过证明等式θi·P=Xi+Ri·Ppub来验证部分私钥spki的合法性,正确性的证明:θi·P=(Xi+α·Ri)·P=Xi·P+α·Ri·P=Xi+Ri·Ppub,响应于证明所述证明成功验证的计算节点接收其部分私钥spki,然后生成最终的公钥/私钥,该计算节点选择密值并计算Ui=βi·P,计算节点将ski=βi+θi设置为私钥,与之对应的公钥是pki=(Ui,θi),并将公钥pki公开。In some embodiments, the method for generating a certificateless cryptographic signature is as follows: First, initialization is performed, and the computing node negotiates a digital And calculate P pub = α·P, where P is the generator of the pre-generated cyclic group. Set α as the common key and P pub as the public key, and select three universal hash functions Under the premise of ensuring the confidentiality of α, the system parameters params = {q, G, P, P pub , H 1 , H 2 , H 3 } are published; then the corresponding pseudonym is generated according to the real identifier ID i ∈ {0, 1} * of the computing node end. In some embodiments, the computing node end includes multiple computing nodes, and each computing node calculates the pseudonym PID i = (AID i , T i ) of its own node, where Ti is the timestamp of the encrypted information. The computing node at the computing node end generates its own partial private key based on its own pseudonym PID i , and the computing node selects a random number And calculate Xi = xi ·P, Ri =H 2 (PID i , Xi , P pub ) and θi =( xi +α·R i ) modq, each computing node generates a partial private key spk i =( θi , Xi ), and calculates Ri =H 2 (PID i , Xi , P pub ), each computing node on the computing node end verifies the legitimacy of the partial private key spk i by proving the equation θi ·P= Xi +R i ·P pub , the proof of correctness is: θi · P=( Xi +α·R i )·P=Xi · P+α·R i ·P= Xi +R i ·P pub , in response to the computing node proving the successful verification of the proof receives its partial private key spk i , and then generates a final public key/private key, the computing node selects a secret value And calculate U i =β i ·P, the computing node sets sk i =β i +θ i as the private key, the corresponding public key is pk i =(U i ,θ i ), and the public key pk i is made public.
在一些实施例中,响应于计算节点端发送主凭证、系统分凭证、应用分凭证中任一凭证,获取随机数计算Yi=λi·P,δi=H3(PIDi,credi,pki,Yi),其中,其中,P为循环群的生成元,PIDi为所述计算节点端假名,credi为所述计算节点端发送的分凭证,pki为所述计算节点端的公钥,ski为所述计算节点端的私钥;设置加密签名为σi=(Yi,Φi);将(PIDi,credi,pki,σi,Ti)作为加密信息,其中Ti为所述加密信息的时间戳。In some embodiments, in response to the computing node sending any one of the main credentials, the system sub-credentials, and the application sub-credentials, a random number is obtained. Calculate Y i =λ i ·P, δ i =H 3 (PID i , cred i , pk i , Y i ), Among them, P is the generator of the cyclic group, PID i is the pseudonym of the computing node, cred i is the sub-credential sent by the computing node, pk i is the public key of the computing node, and sk i is the private key of the computing node; the encryption signature is set to σ i =(Y i ,Φ i ); (PID i ,cred i ,pk i ,σ i ,T i ) is used as the encrypted information, where T i is the timestamp of the encrypted information.
在一些实施例中,响应于用户端解密主凭证、系统分凭证、应用分凭证中任一凭证时,计算δi=H3(PIDi,credi,pki,Yi);根据所述δi,计算验证等式其中,Ui为所述计算节点端的公钥生成过程的中间值,θi为所述计算节点端的私钥生成过程的中间值;响应于确定所述验证等式能够正确证明,确定解密完成。在一些实施例中,如下述等式成立,确定所述验证等式证明正确:In some embodiments, in response to the user terminal decrypting any one of the main credential, the system sub-credential, and the application sub-credential, δ i =H 3 (PID i , cred i , pk i , Yi ) is calculated; based on the δ i , the verification equation is calculated Wherein, U i is an intermediate value of the public key generation process of the computing node end, θ i is an intermediate value of the private key generation process of the computing node end; in response to determining that the verification equation can be correctly proved, it is determined that the decryption is completed. In some embodiments, if the following equation is established, it is determined that the verification equation is proved correctly:
在一些实施例中所述计算节点端由多个计算节点组成。在一些实施例中,所述计算节点可以为区块链节点。In some embodiments, the computing node end is composed of multiple computing nodes. In some embodiments, the computing node can be a blockchain node.
在一些实施例中,所述应用分凭证根据所述主凭证获得。在另一些实施例中,所述应用分凭证根据所述主凭证和所述系统分凭证获得。所述应用分凭证与所述终端设备端的应用程序一一对应,包括该应用程序的环境信息。例如,终端设备端安装有某银行应用程序,当用户端希望获得该某银行应用程序的权限时,需要提供该应用程序的目标身份凭证。在一些实施例中,所述目标身份凭证包括主凭证、应用分凭证。在一些实施例中,所述目标身份凭证包括主凭证、系统分凭证、应用分凭证。上述应用分凭证包括该某银行应用程序的环境信息,因此与该某银行应用程序一一对应。In some embodiments, the application sub-credential is obtained based on the master credential. In other embodiments, the application sub-credential is obtained based on the master credential and the system sub-credential. The application sub-credential corresponds one-to-one with the application on the terminal device side, including the environmental information of the application. For example, a certain bank application is installed on the terminal device side. When the user side wants to obtain the permission of the certain bank application, it is necessary to provide the target identity credential of the application. In some embodiments, the target identity credential includes the master credential and the application sub-credential. In some embodiments, the target identity credential includes the master credential, the system sub-credential, and the application sub-credential. The above-mentioned application sub-credential includes the environmental information of the certain bank application, and therefore corresponds one-to-one with the certain bank application.
相关技术中,在对用户进行身份认证或验证时,时常需要用户向不同第三方提供全部数据信息以获得不同应用程序的权限,当所述第三方不可信或遭到攻击时,用户数据也因此产生泄露。由此,申请人提出本申请的技术方案,利用目标身份凭证获取目标应用程序的权限。由于所述目标身份凭证包括主凭证、系统分凭证和应用分凭证,当需要获取不同应用程序的权限时,只需要替换不同的应用分凭证即可,无需每次都提供全部用户信息获取权限。在凭证发放和验证过程中,每次也只需必要用户信息即可。通过上述方法减少了用户信息泄露的可能性,从而提高用户信息数据安全性。In the related art, when authenticating or verifying a user, the user is often required to provide all data information to different third parties in order to obtain permissions for different applications. When the third party is untrustworthy or attacked, user data is leaked. Therefore, the applicant proposes the technical solution of the present application, which uses the target identity credential to obtain the permissions of the target application. Since the target identity credential includes the main credential, the system sub-credential and the application sub-credential, when it is necessary to obtain permissions for different applications, it is only necessary to replace different application sub-credentials, without providing all user information to obtain permissions each time. In the process of credential issuance and verification, only necessary user information is required each time. The above method reduces the possibility of user information leakage, thereby improving the security of user information data.
在一些实施例中,所述用户端根据所述目标身份凭证,通过密文加密算法计算得到所述目标身份凭证对应的目标密文,并在发送所述目标身份凭证以及开放权限请求时,同时发送所述目标密文至所述终端设备端。In some embodiments, the user end calculates the target ciphertext corresponding to the target identity credential through a ciphertext encryption algorithm based on the target identity credential, and sends the target ciphertext to the terminal device end at the same time as sending the target identity credential and the open permission request.
基于属性的加密(attribute-based ecryption,ABE)根据属性加密消息,无需关注数据拥有者的身份,只有符合属性要求的访问者才能解密密文,保证了数据的机密性。此外,ABE中的访问者密钥与随机多项式或随机数相关,不同访问者的密钥无法联合,防止访问者合谋攻击。其中,基于密文策略的属性加密(Ciphertext-Policy Attribute-BasedEncryption,CP-ABE)访问者的私钥与一系列属性相关,只有访问者的属性符合密文的访问结构才能解密此密文。在本申请中,申请人通过基于密文策略的属性加密对所述目标身份凭证进行加密,进一步地减少用户信息泄露的可能性。Attribute-based encryption (ABE) encrypts messages according to attributes, without paying attention to the identity of the data owner. Only visitors who meet the attribute requirements can decrypt the ciphertext, ensuring the confidentiality of the data. In addition, the visitor key in ABE is related to a random polynomial or random number, and the keys of different visitors cannot be combined to prevent visitor collusion attacks. Among them, the private key of the visitor in Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is related to a series of attributes, and only the visitor's attributes that meet the access structure of the ciphertext can decrypt the ciphertext. In this application, the applicant encrypts the target identity credentials through attribute encryption based on ciphertext policy, further reducing the possibility of user information leakage.
在一些实施例中,所述目标密文的生成过程具体包括:首先对所述目标身份凭证中的每个凭证指定一个访问结构 并设置一个上的多项式 其中,表示m个多项式相乘,其中,X表示变量,表示常数,b1是哈希函数H1的密钥,表示循环群中若干点Ait相乘,其中Ait所对应的属性值vit需属于用户属性列表LT,即vit∈LT,ci为多项式系数。多项式的阶m=numu;选取秘密数ku∈GT作为分凭证fu的对称加密密钥,选取随机值并计算 计算1≤i≤n时的响应于确定则否则Ci,2,t从群G中随机选取,设置分凭证fu的密文:Cu={Cu,-1,Cu,0,Cu,1,Cu,2},其中并组合分凭证密文得到目标身份凭证的密文报C={C1,C2,···,Cu,···,CN};最后利用哈希函数h2计算属性为LT的用户端标签其中 是属性身份为LT的应用程序可以查询的分凭证集,组合所有的为 计算并将Γ、γ、C、A、存储在本地。In some embodiments, the process of generating the target ciphertext specifically includes: first, specifying an access structure for each credential in the target identity credential And set a Polynomials on in, Represents m polynomials Multiply, where X represents the variable, represents a constant, b1 is the key of the hash function H1 , It represents the multiplication of several points A it in the cyclic group, where the attribute value vit corresponding to A it must belong to the user attribute list L T , that is, vit∈L T , and ci is the polynomial coefficient. The order of the polynomial m=num u ; select the secret number k u ∈G T as the symmetric encryption key of the sub-voucher f u , and select the random value And calculate Calculate when 1≤i≤n In response to determining but Otherwise, Ci ,2,t is randomly selected from group G and the ciphertext of sub-voucher f u is set to: Cu = {Cu ,-1 , Cu,0 , Cu,1 ,Cu ,2 }, where Combine the sub-credential ciphertexts to obtain the target identity credential ciphertext message C = {C 1 ,C 2 ,···,C u ,···, CN }; finally, use the hash function h 2 to calculate the user-side tag with the attribute LT in It is a set of sub-credentials that can be queried by applications with attribute identity LT , combining all for calculate And Γ, γ, C, A, Stored locally.
在一些实施例中,上述内容中的G,GT,q,g,e(·,·),Ppub,H,Y1,Y2属于系统公共参数。在一些实施例中,所述系统公共参数的获取方式如下:选择两个阶为素数q的乘法循环群G,GT,其中,q≥2λ,G的生成元为g:选择一双线性映射e(·,·):G×G→GT,6个单向防碰撞Hash函数: 其中,H1,H2,H3的密钥分别为Hash函数集为H={H1,H2,H3,h1,h2,h3};选择计算Y1=e(g,g),Ppub=gs;为每个atti随机选取一系列值计算其中,1≤i≤n,1≤t≤ni,所述系统公共参数为 In some embodiments, G, GT , q, g, e (·, ·), Ppub , H, Y 1 , Y 2 are system public parameters. In some embodiments, the system public parameters are obtained as follows: select two multiplication cyclic groups G, GT of prime order q, where q≥2λ , and the generator of G is g: select a bilinear mapping e(·,·): G×G→ GT , and 6 one-way anti-collision hash functions: Among them, the keys of H 1 , H 2 , and H 3 are The set of hash functions is H = {H 1 ,H 2 ,H 3 ,h 1 ,h 2 ,h 3 }; select Calculate Y 1 = e(g,g), P pub = g s ; randomly select a series of values for each att i calculate Among them, 1≤i≤n,1≤t≤n i , the common parameters of the system are
在一些实施例中,所述终端设备端根据所述开放权限请求,发送所述目标身份凭证、所述目标密文及所述验证请求至所述计算节点端。In some embodiments, the terminal device sends the target identity credential, the target ciphertext and the verification request to the computing node according to the open permission request.
步骤S102:所述终端设备端发送所述目标身份凭证及验证请求至所述计算节点端。Step S102: The terminal device sends the target identity certificate and verification request to the computing node.
在一些实施例中,用户端响应于接收到计算节点端发送的消息时,首先确定时间戳Ti是否在合法范围内,如果在合法范围内,就继续验证签名的合法性。验证方法具体如下:计算δi=H3(PIDi,credi,pki,Yi);通过验证等式 来验证凭证credi的合法性。正确性的证明: In some embodiments, when the user terminal receives a message sent by the computing node terminal, it first determines whether the timestamp Ti is within the legal range. If it is within the legal range, it continues to verify the legitimacy of the signature. The verification method is as follows: Calculate δ i =H 3 (PID i ,cred i ,pk i ,Y i ); By verifying the equation To verify the legitimacy of the credential cred i . Proof of correctness:
如果上述等式成立,则凭证credi验证成功。 If the above equation holds true, the credential cred i is successfully verified.
在一些实施例中,所述终端设备端根据所述开放权限请求,发送所述目标身份凭证、目标密文及验证请求至所述计算节点端。In some embodiments, the terminal device sends the target identity credentials, target ciphertext and verification request to the computing node according to the open permission request.
步骤S103:所述计算节点端响应于确定根据所述验证请求所述目标身份凭证验证通过,发送正反馈信息至所述终端设备端。Step S103: In response to determining that the target identity credential is verified according to the verification request, the computing node sends positive feedback information to the terminal device.
在一些实施例中,所述计算节点端,通过秘钥加密算法,计算得到所述目标身份凭证的私钥;判断所述秘钥是否能够解密所述目标密文,确定所述目标身份凭证是否验证通过。In some embodiments, the computing node calculates the private key of the target identity credential through a secret key encryption algorithm; determines whether the secret key can decrypt the target ciphertext, and determines whether the target identity credential is verified.
在一些实施例中,所述私钥的生成方法如下:输入系统公共参数GP,主密钥Msk,身份属性列表L=[L1,L2,···,Ln],响应于确定1≤i≤n,区块链节点选取随机数计算对每个Li=viti,区块链节点计算D1={D1i};对于整个身份属性列表L,计算节点端计算Qs=h1(L),并得到私钥skL={D0,D1,D2},其中,α和s为预定的系统主密钥元素,ui为所述目标身份凭证的第i个属性值,iti为所述身份属性列表的第i个身份属性。In some embodiments, the method for generating the private key is as follows: input the system public parameter GP, the master key M sk , the identity attribute list L = [L 1 , L 2 , . . . , L n ], in response to determining 1 ≤ i ≤ n, the blockchain node selects a random number calculate For each Li = viti, the blockchain node calculates D 1 = {D 1i }; for the entire identity attribute list L, the computing node calculates Q s = h 1 (L), And obtain the private key sk L ={D 0 ,D 1 ,D 2 }, wherein α and s are predetermined system master key elements, ui is the i-th attribute value of the target identity credential, and iti is the i-th identity attribute of the identity attribute list.
在一些实施例中,所述主密钥的计算方式与上述计算系统全局参数的方法相似,其公式为: In some embodiments, the master key is calculated in a similar manner to the above-mentioned method for calculating the system global parameter, and the formula is:
步骤S104:所述终端设备端根据所述正反馈信息向所述用户端开放所述目标应用程序的权限。Step S104: the terminal device opens the permission of the target application to the user terminal according to the positive feedback information.
需要说明的是,本申请实施例的方法可以由单个设备执行,例如一台计算机或服务器等。本实施例的方法也可以应用于分布式场景下,由多台设备相互配合来完成。在这种分布式场景的情况下,这多台设备中的一台设备可以只执行本申请实施例的方法中的某一个或多个步骤,这多台设备相互之间会进行交互以完成所述的方法。It should be noted that the method of the embodiment of the present application can be performed by a single device, such as a computer or server. The method of this embodiment can also be applied to a distributed scenario and completed by multiple devices cooperating with each other. In the case of such a distributed scenario, one of the multiple devices can only perform one or more steps in the method of the embodiment of the present application, and the multiple devices will interact with each other to complete the described method.
需要说明的是,上述对本申请的一些实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于上述实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。It should be noted that the above describes some embodiments of the present application. Other embodiments are within the scope of the appended claims. In some cases, the actions or steps recorded in the claims can be performed in an order different from that in the above embodiments and still achieve the desired results. In addition, the processes depicted in the accompanying drawings do not necessarily require the specific order or continuous order shown to achieve the desired results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
基于同一发明构思,与上述任意实施例方法相对应的,本申请还提供了一种身份验证系统。Based on the same inventive concept, corresponding to any of the above-mentioned embodiment methods, the present application also provides an identity authentication system.
参考图3,所述身份验证系统,包括:计算节点端13、用户端11、终端设备端12;所述终端设备端12安装有至少一个应用程序;所述计算节点端13、所述用户端11和所述终端设备端12通信连接;Referring to FIG3 , the identity authentication system includes: a computing
所述用户端11被配置为发送目标身份凭证及开放权限请求至所述终端设备端12;The
所述终端设备端12被配置发送所述目标身份凭证及验证请求至所述计算节点端13;The terminal device end 12 is configured to send the target identity credential and the verification request to the
所述计算节点端13被配置响应于确定根据所述验证请求所述目标身份凭证验证通过,发送正反馈信息至所述终端设备端12;The computing
所述终端设备端12被配置根据所述正反馈信息向所述用户端11开放所述目标应用程序的权限。The terminal device 12 is configured to open permissions of the target application to the
为了描述的方便,描述以上装置时以功能分为各种模块分别描述。当然,在实施本申请时可以把各模块的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, the above device is described in terms of functions divided into various modules. Of course, when implementing the present application, the functions of each module can be implemented in the same or multiple software and/or hardware.
上述实施例的装置用于实现前述任一实施例中相应的身份验证方法,并且具有相应的方法实施例的有益效果,在此不再赘述。The device of the above embodiment is used to implement the corresponding identity authentication method in any of the above embodiments, and has the beneficial effects of the corresponding method embodiment, which will not be repeated here.
所属领域的普通技术人员应当理解:以上任何实施例的讨论仅为示例性的,并非旨在暗示本申请的范围(包括权利要求)被限于这些例子;在本申请的思路下,以上实施例或者不同实施例中的技术特征之间也可以进行组合,步骤可以以任意顺序实现,并存在如上所述的本申请实施例的不同方面的许多其它变化,为了简明它们没有在细节中提供。Those skilled in the art should understand that the discussion of any of the above embodiments is merely illustrative and is not intended to imply that the scope of the present application (including the claims) is limited to these examples. In line with the concept of the present application, the technical features in the above embodiments or different embodiments may be combined, the steps may be implemented in any order, and there are many other variations of the different aspects of the embodiments of the present application as described above, which are not provided in detail for the sake of simplicity.
另外,为简化说明和讨论,并且为了不会使本申请实施例难以理解,在所提供的附图中可以示出或可以不示出与集成电路(IC)芯片和其它部件的公知的电源/接地连接。此外,可以以框图的形式示出装置,以便避免使本申请实施例难以理解,并且这也考虑了以下事实,即关于这些框图装置的实施方式的细节是高度取决于将要实施本申请实施例的平台的(即,这些细节应当完全处于本领域技术人员的理解范围内)。在阐述了具体细节(例如,电路)以描述本申请的示例性实施例的情况下,对本领域技术人员来说显而易见的是,可以在没有这些具体细节的情况下或者这些具体细节有变化的情况下实施本申请实施例。因此,这些描述应被认为是说明性的而不是限制性的。In addition, to simplify the description and discussion, and in order not to make the embodiments of the present application difficult to understand, the known power supply/ground connection with the integrated circuit (IC) chip and other components may or may not be shown in the provided drawings. In addition, the device can be shown in the form of a block diagram to avoid making the embodiments of the present application difficult to understand, and this also takes into account the fact that the details of the implementation of these block diagram devices are highly dependent on the platform to be implemented in the embodiments of the present application (that is, these details should be fully within the scope of understanding of those skilled in the art). In the case of elaborating specific details (e.g., circuits) to describe exemplary embodiments of the present application, it is obvious to those skilled in the art that the embodiments of the present application can be implemented without these specific details or when these specific details are changed. Therefore, these descriptions should be considered to be illustrative rather than restrictive.
尽管已经结合了本申请的具体实施例对本申请进行了描述,但是根据前面的描述,这些实施例的很多替换、修改和变型对本领域普通技术人员来说将是显而易见的。例如,其它存储器架构(例如,动态RAM(DRAM))可以使用所讨论的实施例。Although the present application has been described in conjunction with specific embodiments of the present application, many replacements, modifications and variations of these embodiments will be apparent to those skilled in the art from the foregoing description. For example, other memory architectures (e.g., dynamic RAM (DRAM)) may use the embodiments discussed.
本申请实施例旨在涵盖落入所附权利要求的宽泛范围之内的所有这样的替换、修改和变型。因此,凡在本申请实施例的精神和原则之内,所做的任何省略、修改、等同替换、改进等,均应包含在本申请的保护范围之内。The embodiments of the present application are intended to cover all such substitutions, modifications and variations that fall within the broad scope of the appended claims. Therefore, any omissions, modifications, equivalent substitutions, improvements, etc. made within the spirit and principles of the embodiments of the present application should be included in the scope of protection of the present application.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310071637.9A CN116188007B (en) | 2023-01-13 | 2023-01-13 | Authentication method and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310071637.9A CN116188007B (en) | 2023-01-13 | 2023-01-13 | Authentication method and system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN116188007A true CN116188007A (en) | 2023-05-30 |
| CN116188007B CN116188007B (en) | 2024-06-14 |
Family
ID=86443770
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202310071637.9A Active CN116188007B (en) | 2023-01-13 | 2023-01-13 | Authentication method and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN116188007B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119766643A (en) * | 2024-12-26 | 2025-04-04 | 北京深盾科技股份有限公司 | Binding method, system, device and storage medium |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020087805A1 (en) * | 2018-11-02 | 2020-05-07 | 中国科学院沈阳自动化研究所 | Trusted authentication method employing two cryptographic values and chaotic encryption in measurement and control network |
| CN112926092A (en) * | 2021-03-30 | 2021-06-08 | 支付宝(杭州)信息技术有限公司 | Privacy-protecting identity information storage and identity authentication method and device |
| CN113098838A (en) * | 2021-02-21 | 2021-07-09 | 西安电子科技大学 | Trusted distributed identity authentication method, system, storage medium and application |
| CN115022039A (en) * | 2022-06-02 | 2022-09-06 | 中国工商银行股份有限公司 | Information processing method, apparatus, device, storage medium, and computer program product |
-
2023
- 2023-01-13 CN CN202310071637.9A patent/CN116188007B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020087805A1 (en) * | 2018-11-02 | 2020-05-07 | 中国科学院沈阳自动化研究所 | Trusted authentication method employing two cryptographic values and chaotic encryption in measurement and control network |
| CN113098838A (en) * | 2021-02-21 | 2021-07-09 | 西安电子科技大学 | Trusted distributed identity authentication method, system, storage medium and application |
| CN112926092A (en) * | 2021-03-30 | 2021-06-08 | 支付宝(杭州)信息技术有限公司 | Privacy-protecting identity information storage and identity authentication method and device |
| CN115022039A (en) * | 2022-06-02 | 2022-09-06 | 中国工商银行股份有限公司 | Information processing method, apparatus, device, storage medium, and computer program product |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119766643A (en) * | 2024-12-26 | 2025-04-04 | 北京深盾科技股份有限公司 | Binding method, system, device and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN116188007B (en) | 2024-06-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110832519B (en) | Improve the integrity of communications between blockchain networks and external data sources | |
| US12423684B2 (en) | Digital signature generation using a cold wallet | |
| US9065637B2 (en) | System and method for securing private keys issued from distributed private key generator (D-PKG) nodes | |
| US11405365B2 (en) | Method and apparatus for effecting a data-based activity | |
| US11374910B2 (en) | Method and apparatus for effecting a data-based activity | |
| CN103856477A (en) | Trusted computing system, corresponding attestation method and corresponding devices | |
| US11637817B2 (en) | Method and apparatus for effecting a data-based activity | |
| CN115913513B (en) | Distributed trusted data transaction method, system and device supporting privacy protection | |
| CN108551435A (en) | A kind of Verifiable Encryptosystem group signature method with anonymity | |
| CN117692227A (en) | Private data safe sharing method based on blockchain | |
| CN114553557B (en) | Key calling method, device, computer equipment and storage medium | |
| CN114978549A (en) | SM2 digital signature generation method and system for signer to control signature making data | |
| CN115865356A (en) | A method and system for safe and controllable use of ECDSA signature private key | |
| CN116188007B (en) | Authentication method and system | |
| CN117118759B (en) | Method for reliable use of user control server terminal key | |
| CN117081752B (en) | A data security sharing method and system based on blockchain | |
| CN115314207B (en) | Safe and controllable using method and system for SM2 signature production data | |
| CN118523945A (en) | Security portable anonymous credential method oriented to universal platform | |
| US12542683B2 (en) | Authentication using group signatures of user devices | |
| CN116647390A (en) | A time-limited group signature method with double privacy | |
| Mishra et al. | Authenticated content distribution framework for digital rights management systems with smart card revocation | |
| CN115150062A (en) | SM9 digital signature generation method and system with signature making data controlled safely | |
| CN119603046B (en) | Block chain identity anonymizing method capable of being managed by multiple parties | |
| CN114005190B (en) | Face recognition method for class attendance system | |
| Takahashi et al. | DAA-Based Emergency Medical Data Access Control on Public Blockchain |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |