Trusted authentication method for mobile office scene
Technical Field
The invention relates to the technical field of mobile office, in particular to a trusted authentication method for a mobile office scene.
Background
In a traditional office scenario, people are at a fixed station and have specific office equipment; the access device of the office application is fixed and the identity of the user is trusted; with the rapid development of the mobile internet, the office scene of people is changed, and gradually changes from the traditional office scene into a novel digital, convenient and mobile office scene; in a mobile office scene, people can remotely office by using equipment nearby through a mobile internet access company server in a non-fixed place; the method provides a guarantee for full utilization of fragmentation time and efficient communication of work content;
but this also presents a safety issue; because of the non-stationarity of the devices and networks, corporate servers must perform trusted authentication of the accessed devices; in the traditional mobile office scene, a user can only use equipment appointed by a company to perform simple message interaction and small-range office service, and cannot have sufficient rights as in the traditional office scene; this is because the lack of effective authentication of the identity of the user prevents the opening of rights; the popularity of the mobile internet makes mobile application services an important component in daily life; in the traditional mobile internet, the authentication process of the device accessing the network and the authentication process of the user logging in the application service are completely independent; the login authentication of the application program mainly uses a user name and password mode;
however, the authentication mode has potential safety hazards; if the user name and the password of the user are revealed, the data security problems such as information disclosure, malicious operation and the like can be caused, and the user name and the password are difficult to be perceived; the mobile office is used as a specific scene of the mobile internet, the current network access authentication and office application service authentication are also independently carried out, and unified consideration is not carried out; when the terminal equipment required for office is accessed to the network, the terminal equipment is authenticated by an operator, and a user needs to pass the authentication of a company server when logging in an office application program; this results in a round of authentication of the terminal device first upon network entry; then, using corresponding account numbers and passwords for different office applications to pass the authentication of the company server so as to use application services;
for companies, the companies mainly wish to improve the working efficiency of staff through efficient and controllable mobile office services, increase the yield of achievements and further obtain higher profits; however, there is a potential security risk in current networks; how to ensure the credible authentication between the terminal equipment used by the user and the company server in the mobile office scene so as to prevent the leakage of the private information of the company due to the malicious invasion of the illegal user is a problem to be solved;
therefore, we design a trusted authentication method for mobile office scenario, which is used to provide another technical scheme for the technical problems.
Disclosure of Invention
Based on the above, it is necessary to provide a trusted authentication method for a mobile office scenario in view of the above technical problems.
In order to solve the technical problems, the invention adopts the following technical scheme:
a trusted authentication method for a mobile office scene comprises the following steps:
key for session key of secure communication channel between operator and company server to-cs A representation;
when the terminal equipment is accessed to a network, identity authentication is carried out between the terminal equipment and an operator through a GBA authentication mechanism built in a super SIM card, and a session key is negotiated td-to ;
The terminal device selects a random number R 1 By means of a random number R 1 The calculation of the Inf is performed,
the SE (-) represents a symmetric encryption algorithm built in the super SIM card, the DID represents a device identifier of the terminal device, the CID represents an identifier of a company needing to be accessed in mobile office, and the App represents an application program needing to be used;
verification information V by Inf calculation 0 And generates a time stamp t 0 Will { DID, inf, V 0 ,t 0 -sending to the operator;
operator at t 1 Time of day { DID, inf, V 0 ,t 0 After } verify t 1 -t 0 Whether the time threshold value delta t is smaller or not, calculating verification information V' 0 Judging V' 0 And V is equal to 0 Whether or not to be equal to verify the integrity of the information;
after the authentication certificate AC and the reply information RInf are calculated, a time stamp t is generated 2 And verification information V 1 And will { RInf, V 1 ,t 2 Transmitting to the terminal device;
the terminal device is at t 3 Time of day { RInf, V 1 ,t 2 After } verify t 3 -t 2 Whether or not is smaller than a time threshold Deltat, calculating verification information V 1 ' verification V 1 ' and V 1 Whether or not they are equal;
terminal equipment sends { DID, R 2 The terminal device selects a random number R to the operator on behalf of having received the authentication credentials 3 And calculates M, and then the terminal device generates a time stamp t 4 Will { M, V 2 ,t 4 -sending to a corporate server;
the corporate server at t 5 Time of receipt { M, V 2 ,t 4 After } verify t 5 -t 4 Whether or not it is smaller than the time threshold Δt, and calculate V' 2 =h (M), verifying the integrity of the message;
the company server decrypts M by using the private key, and the App checks whether the requested application program service is correct or not according to the CID;
the company server will select a random number R 4 The computer RM company server generates a time stamp t 6 And return { RM, V 3 ,t 6 -a terminal device;
the terminal device is at t 7 Time of receipt { RM, V 3 ,t 6 After } verify t 7 -t 6 If the time threshold delta t is smaller than the time threshold delta t, the terminal equipment decrypts the RM by using the private key to obtain R 4 And selects a random number R 5 The authentication message AM is calculated and the terminal device generates a time stamp t 8 Will { AM, V 4 ,t 8 -sending to a corporate server;
the corporate server at t 9 Time of receipt { AM, V 4 ,t 8 Verifying t 9 -t 8 If it is less than the time threshold Δt, the corporate server calculatesObtaining the authentication credentials and the authentication signature, verifying the authenticity of the authentication signature by the company server, and computing the RAM, the company server generating a time stamp t 10 And return { RAM, V 5 ,t 10 -a terminal device;
the terminal device is at t 11 Time of receipt { RAM, V 5 ,t 10 After } verify timeliness and integrity; calculation ofWhen RAM' =ram indicates that authentication is successful and office rights have been obtained.
The invention provides the credibility of the mobile office sceneA preferred embodiment of the authentication method verifies the information V 0 The calculation formula is as follows:
V 0 =H(Inf)
where H (·) represents the hash function.
As a preferred implementation mode of the trusted authentication method of the mobile office scene, when V' 0 And V is equal to 0 Equality, through verification, the operator then uses the session key td-to Decrypting Inf and obtaining DID, CID, app, R 1 Based on the CID and the SIM card number, the operator may look up the user representation UID inside the company like the company applies for the user.
As a preferred implementation mode of the trusted authentication method of the mobile office scene provided by the invention, the calculation formula of the authentication certificate AC is as follows:
wherein, key to-cs Representing a session key between the operator and the company server, T representing the expiration date of the authentication credentials;
the operator uses the signature private key skey to The authentication signature AS is calculated for the authentication credential AC AS follows:
where S· (·) represents the signature algorithm.
As a preferred implementation manner of the trusted authentication method of the mobile office scene provided by the invention, the calculation formula of the reply information RInf is as follows:
wherein R is 2 Is a random number;
verification information V 1 The calculation formula of (2) is as follows:
V 1 =H(RInf||R 1 )。
as a preferred implementation mode of the trusted authentication method of the mobile office scene provided by the invention, the verification information V 1 The' calculation formula is as follows:
V 1 '=H(RInf||R 1 );
when V is 1 '=V 1 And the terminal equipment decrypts the RInf to check whether the authentication content is wrong or not, and acquires the expiration date of the authentication certificate.
As a preferred implementation mode of the trusted authentication method of the mobile office scene provided by the invention, the calculation formula of M is as follows:
wherein AE is · (. Cndot.) represents an asymmetric encryption algorithm, pkey td And pkey cs Public keys respectively representing the terminal device and the company server;
and calculate V 2 =H(M)。
As a preferred implementation mode of the trusted authentication method of the mobile office scene, the calculation formula of RM is as follows:
and calculate V 3 =H(RM)。
As a preferred implementation mode of the trusted authentication method of the mobile office scene provided by the invention, the authentication message AM has the following calculation formula:
and calculate V 4 =H(AM)。
As a preferred implementation mode of the trusted authentication method of the mobile office scene provided by the invention, when the authentication signature is true, the key is utilized to-cs Decrypting the authentication credentials and assigning rights of the designated office application to the terminal device;
the calculation formula of the RAM is as follows:
and calculate V 5 =H(RAM)。
It can be clearly seen that the technical problems to be solved by the present application must be solved by the above-mentioned technical solutions of the present application.
Meanwhile, through the technical scheme, the invention has at least the following beneficial effects:
the credible authentication method of the mobile office scene ensures the safety in the information transmission process by prescribing the type, the sending sequence, the encryption mode and the like of data between an authentication initiator and an authenticator, and can effectively prevent the illegal user from connecting with an office server by combining the network access authentication of terminal equipment and the user login authentication of office application by combining the related technology of a super SIM card, so that the user can realize user identity authentication by using the terminal equipment at hand when the mobile office is required, and the authentication credentials of office application service required to be applied are obtained from an operator, thereby conveniently and rapidly authenticating the company server.
Detailed Description
The present invention will be further described in detail by the following description of the embodiments, which are to be clearly understood to be a technical solution and advantages of the present invention. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present invention, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise.
It should be noted that, under the condition of no conflict, the embodiments of the present invention and the features and technical solutions in the embodiments may be combined with each other.
A trusted authentication method for a mobile office scene comprises the following steps:
the method comprises the steps of performing trusted authentication on Terminal equipment (Terminal device), an operator (Telecom operators) and a Company server (Company server).
A secure communication channel exists between the operator and the company server, and the key is used for the session key to-cs And (3) representing. Each terminal device performs identity authentication with an operator through a GBA authentication mechanism built in a super SIM card and negotiates a session key when accessing to a network td-to . When the user performs remote office, the terminal equipment performs trusted authentication with the company server with the assistance of an operator.
Process 1: the terminal device selects a random number R 1 And calculate
The SE (-) represents a symmetric encryption algorithm built in the super SIM card, the DID represents the equipment identifier of the terminal equipment, the CID represents the identifier of a company needing to be accessed by mobile office, and the App represents an application program needing to be used.
Then calculate the verification information V 0 =h (Inf), where H (·) represents a hash function. Finally generate a time stamp t 0 And will { DID, inf, V 0 ,t 0 And transmitted to the operator.
Process 2: operator at t 1 Time of day { DID, inf, V 0 ,t 0 After } it is first verified whether the timeliness t is satisfied 1 -t 0 < Δt, Δt representing the time threshold. Then calculate V' 0 =h (Inf), by judging V 0 ' and V 0 Whether equal to verify the integrity of the information. If it is verified, the operator uses the session key td-to Decrypting Inf and obtaining DID, CID, app, R 1 . Based on the CID and the SIM card number, the operator may look up the user representation UID inside the company like the company applies for the user.
Subsequently, authentication credentials are calculated
Wherein the key is to-cs Representing the session key between the operator and the corporate server, T representing the expiration date of the authentication credentials. The operator then uses the signature private key skey to Computing authentication signatures for authentication credentials ACWhere S· (·) represents the signature algorithm. Recalculating reply message->Wherein R is 2 Is a random number. Finally generate a time stamp t 2 And verification information V 1 =H(RInf||R 1 ) And will { RInf, V 1 ,t 2 And (3) sending to the terminal device.
Process 3: the terminal device is at t 3 Time of day { RInf, V 1 ,t 2 After } it is first verified whether the timeliness t is satisfied 3 -t 2 < Δt. Then calculate V 1 '=H(RInf||R 1 ) To verify integrity. If V is 1 '=V 1 And the terminal equipment decrypts the RInf to check whether the authentication content is wrong or not, and acquires the expiration date of the authentication certificate. The terminal device then transmits { DID, R 2 To the operator indicating that he has received authentication credentials. Then, the terminal device selects a random number R 3 And calculateAnd V 2 =h (M), where ae· (·) represents the asymmetric encryption algorithm, pkey td And pkey cs Representing the public keys of the terminal device and the company server, respectively. Finally, the terminal generates a time stamp t 4 Will { M, V 2 ,t 4 And transmitted to the corporate server.
Process 4: the corporate server at t 5 Time of receipt { M, V 2 ,t 4 After } verify if the timeliness t is satisfied 5 -t 4 < Δt. Then calculate V' 2 =h (M), verifying the integrity of the message. Subsequently, the company server decrypts M using the private key, and App checks whether the requested application service is correct according to the CID. If the request is correct, the company server will select a random number R 4 Calculation ofAnd V 3 =h (RM). Finally, the corporate server generates a time stamp t 6 And return { RM, V 3 ,t 6 And (3) to the terminal device.
Process 5: the terminal device is at t 7 Time of receipt { RM, V 3 ,t 6 After } timeliness and integrity are first verified. Then, the terminal device decrypts the RM using the private key to obtain R 4 And selects a random number R 5 . Computing authentication messagesR 4 And V 4 =h (AM). Finally, the terminal generates a time stamp t 8 Will { AM, V 4 ,t 8 And transmitted to the corporate server.
Process 5: the corporate server at t 9 Time of receipt { AM, V 4 ,t 8 }. After verifying timeliness and integrity, the corporate server calculatesAn authentication credential and an authentication signature are obtained. The corporate server then verifies the authenticity of the authentication signature. If the authentication signature is authentic, key is utilized to-cs Decrypting authentication credentialsAnd assigning the authority of the appointed office application to the terminal equipment. Immediately calculate +.>And V 5 =h (RAM). Finally, the corporate server generates a time stamp t 10 And return { RAM, V 5 ,t 10 And (3) to the terminal device.
Process 6: the terminal device is at t 11 Time of receipt { RAM, V 5 ,t 10 After } timeliness and integrity are first verified. Then calculateIf RAM' =ram, this indicates that authentication is successful and office rights have been obtained. The authentication process ends here.
Therefore, the security in the information transmission process can be ensured by specifying the types, the sending sequence, the encryption mode and the like of the data between the authentication initiator and the authenticator, and the network access authentication of the terminal equipment and the user login authentication of the office application are combined together by combining the related technology of the super SIM card, so that the behavior that an illegal user is connected with the office server can be effectively prevented, the user can realize the user identity authentication by using the terminal equipment nearby when the user needs to conduct mobile office, and the authentication credentials of the office application service which needs to be applied can be obtained from the operator, thereby conveniently and rapidly authenticating the company server.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and that the above embodiments and descriptions are merely illustrative of the principles of the present invention, and various changes and modifications may be made therein without departing from the spirit and scope of the invention, which is defined by the appended claims. The scope of the invention is defined by the appended claims and equivalents thereof.