Disclosure of Invention
The invention aims to overcome the defects and provide a dynamic identity authentication method, which adopts a widely used mobile phone as an identity token, can effectively prevent illegal login by peeping or guessing an authentication password and also can effectively prevent illegal login by intercepting and capturing transmission data, can greatly improve the safety of a system, does not need wireless network transmission for the dynamic password in the authentication process, and ensures the real-time property of authentication. The invention also aims to provide an implementation system of the method.
The invention discloses a dynamic identity authentication method for a mobile phone token, which is realized by utilizing a computer technology and a mobile communication technology and comprises the following steps:
(1) the user inputs user information at the user terminal and sends an identity authentication request to the identity authentication server;
(2) after receiving the authentication request, the identity authentication server firstly verifies the validity of the user information. If the user is a legal user, the identity authentication server generates and temporarily stores a server-side dynamic identity authentication password, and prompts the user to input a user-side dynamic identity authentication password at the user terminal;
(3) the user inputs an application module starting password in the mobile phone token and passes the identity authentication of the mobile phone token end;
(4) the user generates a user side dynamic identity authentication password through the mobile phone token and informs the user through the mobile phone;
(5) the user inputs the informed user-side dynamic identity authentication password through the user terminal and transmits the password to the identity authentication server to wait for identity authentication;
(6) if the user-side dynamic identity authentication password received by the identity authentication server is consistent with the server-side dynamic identity authentication password, passing the identity authentication; otherwise, the authentication is not passed.
When the step (2) is carried out, if a legal user finds that the own account is locked, the legal user can apply for unlocking through the mobile phone token, and the steps are as follows:
1) a user inputs a mobile phone token client application module starting password and passes the identity authentication of a mobile phone token end;
2) a user sends an 'application account unlocking request' message to an authentication server through a mobile phone token;
3) the authentication server receives the information of the 'application account unlocking request' and then verifies the validity of the information;
4) the authentication server sets a 'user state' field of the user to be in an unlocking state in a user information database, and then sends 'application account unlocking response' information to the user;
5) the mobile phone token receives the information of 'application account unlocking response' and prompts the user that the unlocking is successful.
When the step (3) is performed, if the user finds that the dynamic identity authentication service is not started, the dynamic identity authentication service should be started, and the steps are as follows:
1) a user inputs a mobile phone token client application module starting password and passes the identity authentication of a mobile phone token end;
2) a user sends a request for opening dynamic identity authentication service to an authentication server through a mobile phone token;
3) the authentication server receives the information of 'starting dynamic identity authentication service request' and then verifies the validity of the information;
4) the authentication server marks the authentication mode of the user as a dynamic identity authentication mode in a user database, and then sends 'start dynamic identity authentication service response' information to the mobile phone token;
5) and the mobile token receives the response information of starting the dynamic identity authentication service and prompts that the dynamic identity authentication service is started.
In the process of identity authentication, if a legal user finds that the legal user can not pass the authentication after passing correct operation, the user can use a mobile token to request system synchronization, and the steps are as follows:
1) a user inputs a mobile phone token client application module starting password and passes the identity authentication of a mobile phone token end;
2) a user sends information of applying for a system synchronization request to an authentication server through a mobile phone token;
3) the authentication server receives the information of applying for the system synchronization request and then verifies the validity of the information;
4) the authentication server takes out the current working password of the server from the user database;
5) the authentication server generates 'application system synchronous response' information, writes the current working password of the server into a 'server side information' field in the information, and then sends response information to the user;
6) and after receiving the information of applying for system synchronous response, the mobile token extracts the current working password in the information, and sets the current working password at the mobile token end as the extracted current working password in the information to complete system synchronization.
In the process of identity authentication, if the dynamic identity authentication service is to be cancelled, the steps are as follows:
1) a user inputs a mobile phone token client application module starting password and passes the identity authentication of a mobile phone token end;
2) a user sends a request for canceling the dynamic identity authentication service to an authentication server through a mobile phone token;
3) the authentication server receives the information of canceling the dynamic identity authentication service request and then verifies the validity of the information;
4) the authentication server marks the authentication mode of the user as a fixed password identity authentication mode in a user information database, and then sends 'cancel dynamic identity authentication service response' information to the mobile phone token;
5) the mobile phone token receives the information of canceling the dynamic identity authentication service response and prompts that the dynamic identity authentication service is canceled.
In the process of identity authentication, if the dynamic identity authentication process is to be stopped, the steps are as follows:
1) the user inputs a preset stopping instruction of the mobile phone token, and the token system stops the authentication process;
2) the user inputs and transmits a request for stopping the dynamic identity authentication service to the identity authentication server through the user terminal;
3) and after receiving the request for stopping the dynamic identity authentication service, the authentication server stops the authentication process of the server side.
When the step (3) is carried out, if a legal user finds that the own mobile phone token is locked, the legal user can apply for unlocking through the mobile phone token, and the steps are as follows:
1) a user inputs a mobile phone token registration password and passes the authorization authentication of a mobile phone token end;
2) the mobile phone token sets the 'user state' field in the mobile phone token to be in an unlocking state, and then informs the user of 'unlocking response' information through the mobile phone.
A system for realizing the method comprises a user terminal, a user information server, an authentication server and a mobile token; wherein,
the user terminal is used for inputting user information and is communicated with the identity authentication server through a network;
the user information server is used for storing a table set according to the identity authentication protocol, providing each user information required in the authentication process and receiving the operation of the authentication server;
the authentication server is responsible for receiving and completing a service request of a user, and is provided with an authentication server side service module, a password generation module and a communication module; the authentication server side service module is used for network transmission control, authentication system security protocol processing, information transmission encryption and decryption, user information access and dynamic password acquisition and temporary storage; the password generation module is responsible for generating a server-side dynamic identity authentication password and is communicated with the authentication server through a server bus; the communication module is responsible for sending and receiving information of the authentication server end and is an intermediary for communication between the mobile phone token and the authentication server;
the mobile phone token is a user mobile phone with a dynamic identity authentication client application module arranged in an SIM card of the mobile phone, the dynamic identity authentication client application module and a password generation module in an authentication server use the same dynamic password generation algorithm and the same current working password, and independently generate a synchronous dynamic identity authentication password.
The authentication server side service module comprises a user information management module, a dynamic password access module, a protocol processing module, a core management module, an encryption module and a network transmission module;
the user information management module is responsible for completing user information management commands of the core management module, including establishing a new account, modifying existing account information, deleting overdue account information, locking or unlocking a user account and controlling user access authority;
the dynamic password access module is an access module of the password generation module, receives the user key information provided by the core management module, generates a dynamic password in the authentication process, and sends the dynamic password to the core management module for temporary storage;
the protocol processing module is a service processing end of a dynamic identity authentication system security protocol and is used for receiving security protocol information provided by the core management module and returning a processing result to the core management module;
the encryption module is used for completing an information encryption and decryption request of the core management module;
the network transmission module is used for completing information transmission and receiving tasks of the server side, processing an information transmission request of the core management module and sending different types of information to different communication networks;
the core management module is responsible for coordinating the interrelationship and information transfer among the modules.
The dynamic identity authentication client application module in the mobile phone token comprises a dynamic password generator, a memory, a password comparator and a controller;
the memory is used for storing a user ID, a user identity card number, a registration password Pr and an encryption key Ke, and is responsible for storing a current working password Ks for generating a dynamic identity authentication password, a starting password (or a mobile phone token password) Pt of the client application module and the number Nt of times of continuously and wrongly inputting a token access password on the token; it is connected with a dynamic password generator, a password comparator and a controller;
the dynamic password generator is used for generating a current authentication password of the user by the current working password Ks, the password corresponds to the authentication password of the server, and the authentication password is informed to the user through an output device of the mobile phone;
the password comparator is used for judging whether the mobile phone user is legal or not;
the controller is used for controlling the coordination work of the modules.
The invention is different from the invention ' method for ensuring the safety of money payment by adding a paging system on the internet and a response system ' (99123882.6) and ' a dynamic password wireless transmission method ' (99116517.9) ' and is characterized in that the user side of the invention adopts a widely used mobile phone as a token, and dynamic identity authentication passwords are independently generated at a mobile phone token end and an identity authentication server end respectively, so that the invention does not need to rely on wireless network transmission, ensures the real-time property of authentication, and the outside cannot intercept the passwords at all, thereby greatly improving the safety of the system. In addition, the user is not required to pay extra communication cost in the authentication process, so that the use cost of the dynamic identity authentication service is greatly reduced compared with the two inventions.
Detailed Description
The present invention will be further described in detail below with reference to the drawings by taking a bank system as an example.
Description of the System architecture
Fig. 1 is an overall configuration diagram of an authentication system, and includes a user terminal 6, a user information server 1, an authentication server 2, and a mobile token 5. The user information server 1 is a data server in the system, and uses an oracle9i database system in which a table set according to an authentication protocol is stored to provide information of each user required in the authentication process. It includes the following fields: identity card number, user ID, registration password Pr, encryption and decryption key Ke, current working password Ks (the same as the current working password stored in the mobile phone token), sign that the account number is being used (to prevent competitive attack), mobile phone number, etc. The user information server 1 receives an operation (query and modification of user information) request of the authentication server 2, which uses the OLEDB data interface. The authentication Server 2 is a Server side of the whole authentication system and is responsible for receiving and completing service requests of users. The authentication server is provided with a service module, a password generation module 3 and a communication module 4 of the authentication server side. The password generation module 3 is responsible for generating a dynamic identity authentication password of the server side, is a hardware implementation of a dynamic electronic password generation algorithm, and communicates with the authentication server 2 by using a server bus. The communication module 4 uses the COM port to communicate with the authentication server 2, the mobile token 5 is a user mobile phone which can complete the function of the authentication token, and the SIM card is provided with a JAVA program running environment. The application module of the dynamic identity authentication client is an embedded application module developed by using JAVA language, and is written into the SIM card of the mobile token 5 through the SIM card writing device TY 311. The application module of the dynamic identity authentication client in the mobile token 5 and the password generation module 3 in the authentication server use the same dynamic password generation algorithm and independently generate synchronous dynamic identity authentication passwords. A user terminal 6, such as an ATM terminal, communicates with the authentication server 2 via the bank intranet 7. And during authentication, the user submits a user-side dynamic identity authentication password generated by the mobile phone token to the authentication server, and the authentication server compares the user-side dynamic identity authentication password with a server-side dynamic identity authentication password generated by the authentication server and judges whether the user passes the identity authentication or not according to a comparison result.
Fig. 2 is a diagram of an authentication server side service module structure. The authentication Server side service module is Server side software of the authentication system and mainly completes functions of network transmission control, authentication system security protocol processing, information transmission encryption and decryption, user information access, dynamic password acquisition and temporary storage and the like. The authentication server side service module comprises a user information access module 8, a dynamic password access module 9, a protocol processing module 10, a core management module 11, an encryption module 12 and a network transmission module 13. The user information access module 8 is an access module of the back-end user information server, and is responsible for completing user information management commands of the core management module 11, including establishing a new account, modifying existing account information, deleting outdated account information, locking or unlocking a user account, controlling user access rights, and the like. The dynamic password access module 9 is an access module of a dynamic password generation module in the authentication service, and receives the user key information provided by the core management module 11, generates a dynamic password in the authentication process, and sends the dynamic password to the core management module 11 for temporary storage. The protocol processing module 10 is a Server processing end of the security protocol of the dynamic identity authentication system, and receives the security protocol information provided by the core management module 11 and returns the processing result to the core management module 11. The core management module 11 is the core of the whole authentication server software and is responsible for coordinating the interrelation and information transfer between other modules. The encryption module 12 mainly completes the information encryption and decryption request of the core management module 11. The network transmission module 13 mainly completes the information transmission task of the server side, and receives the information of the bank private network and the information of the communication module in the authentication server. It also processes the information transmission request of the core management module and sends different types of information to different communication networks.
Fig. 3 is a mobile phone token implementation diagram, 22 is a structure diagram of a SIM card part in a mobile phone token, and 23 is a structure diagram of an interface part of a mobile phone. The dynamic authentication client application module in the handset token comprises a dynamic password generator 14, a memory 15, a password comparator 16 and a controller 17. The memory 15 is used for storing a user ID, a user identification number, a registration password Pr, an encryption key and a decryption key Ke, and is responsible for storing a current working password Ks (the same as the current working password stored in the server) for generating a current dynamic identity authentication password, a start password (or a mobile phone token password) Pt of the client application module, and the number Nt of times of continuously and erroneously inputting a token access password on the token. The encryption key Ke and the current working password Ks are distributed for the user mobile phone token by the authentication server when the user applies for service; the start password (or handset token password) Pt of the client application module is provided by the user and written to the SIM card. The memory 15 is connected to the dynamic password generator 14, the password comparator 16 and the controller 17. The dynamic password generator 14 is used to generate the current user authentication password from the current working password Ks, and may be a stream password algorithm such as RC4, which corresponds to the server authentication password. The dynamic password generator 14 is connected to the display 20 through the display interface 18 of the mobile phone, and displays the generated password on the display screen. The password comparator 16 is used to determine whether the user of the mobile phone is legitimate and is connected to the keypad 21 through the keypad interface 19 so that the password entered by the user through the keypad is compared with the start password (or token password) Pt of the client application. The controller 17 is used for controlling the coordination of the modules.
Second, authentication process
As shown in fig. 4, the authentication process includes the steps of:
(1) a user inserts a bank card into an ATM terminal, submits user information and sends an identity authentication request to an identity authentication server;
(2) after receiving the authentication request, the identity authentication server firstly verifies the validity of the user information. If the user is a legal user (the user information is stored in the user information database), the identity authentication server generates and temporarily stores a server-side dynamic identity authentication password, and prompts the user to input a user-side dynamic identity authentication password at the user terminal. The detailed processing procedure of this step is as follows:
and (2.1) after receiving the authentication request, a network transmission module in the identity authentication server submits a user request to a core management module.
(2.2) the core management module inquires the user information database through the user information access module, if the user information database does not contain the user information, the core management module generates an error message and transmits the error message to the ATM terminal through the network transmission module, and the terminal prompts the user after receiving the message: the user information is wrong. If the user information database has the user information, the user information management module returns the user information of the user to the core management module, and checks the value of the Identification _ Mode field in the user information database (the field value is 0 to indicate that the user uses static password authentication, and 1 to indicate that the user uses dynamic password authentication).
(2.3) if the Identification _ Mode is 1, the core management module queries a Lock _ State field of the user (the field value is 0, which indicates that the user is locked, and 1 indicates that the user is locked), if the Lock _ State is 1, the core management module sends information to the ATM terminal to prompt that the user is locked, and exits the authentication process, otherwise, the core management module transmits the current working password of the user to the dynamic password access module, the dynamic password generation module generates the dynamic authentication password of the user according to the current working password and returns the dynamic authentication password to the core management module, and the core management module temporarily stores the dynamic authentication password of the user and sends information to the ATM terminal to prompt that the user inputs the dynamic authentication password of the user terminal.
If the legal user finds that the own account is locked, the legal user can apply for unlocking through the mobile phone token, and the specific process of unlocking is shown in a user application unlocking part of a dynamic identity authentication security protocol.
(3) And the user generates a user side dynamic identity authentication password through the mobile phone token and displays the user side dynamic identity authentication password on a mobile phone screen.
It must be emphasized that the user must complete both the "initialization of the mobile token" and the "opening of the dynamic authentication service" before using the dynamic authentication service provided by the bank. The details of the two processes are shown in the two parts of 'mobile token initialization' and 'dynamic identity authentication service starting' of the dynamic identity authentication security protocol.
(4) The user inputs the user dynamic identity authentication password displayed on the mobile phone screen through the user terminal and transmits the password to the identity authentication server to wait for identity authentication.
(5) If the user-side dynamic identity authentication password received by the identity authentication server is consistent with the server-side dynamic identity authentication password, passing the identity authentication; otherwise, the authentication is not passed. The detailed procedure for this step is as follows:
(5.1) the core management module of the authentication server obtains a user side dynamic identity authentication password submitted by the user from a network transmission module;
(5.2) the core management module compares the user-side dynamic identity authentication password with the temporarily-stored server-side dynamic identity authentication password, if the user-side dynamic identity authentication password and the temporarily-stored server-side dynamic identity authentication password are consistent, the core management module sends information to the ATM terminal through the network transmission module to prompt that the user authentication is successful, otherwise, the core management module modifies the user information in the user information database through the user information network module, adds 1 to a WrongPSW _ Count field in the user information (when the WrongPSW _ Count reaches a critical value, the user is locked), and sends row information to the ATM terminal through the network transmission module to request the user to restart the authentication process;
it must be pointed out that if a legal user finds that the system cannot pass the authentication after passing the correct operation, the user can request the system synchronization by using the mobile phone token, and the synchronization process is shown in the 'user applies for the system synchronization' part of the dynamic identity authentication security protocol.
Dynamic identity authentication security protocol
The invention discloses a dynamic identity authentication method based on a mobile phone token mode, which is an authentication method based on a synchronous dynamic identity authentication password. The dynamic identity authentication security protocol is a support protocol of a dynamic identity authentication method based on a mobile phone token mode. The method is an interactive protocol based on short messages, defines an interactive flow between a mobile token and an authentication server, an interactive information format and a safety mechanism (comprising an interactive information encryption method, an encryption key management method and an interactive information authentication method) for guaranteeing the safety of an interactive process. The security protocol not only provides a system synchronization function of the mobile token and the authentication server side for the user, but also supports the functions that the user can use the mobile token to complete the starting of the dynamic identity authentication service, the unlocking of the user, the cancellation of the dynamic identity authentication service by the user and the like. The basic principles of the security protocol are detailed below in terms of protocol procedures, security mechanisms, and information formats.
Protocol process
1. Mobile token initialization
The initialization process of the mobile phone token is divided into two links of client application module writing and client application module initialization. The client application module writing means that the JAVA-based embedded dynamic authentication client application module is written in the SIM card of the user mobile phone by using the SIM card writing device TY 311. The initialization of the client application module is mainly to set parameters of the client application module in the SIM card, including setting parameters of user identity information, information encryption and decryption keys, an application module starting password of the client, a current working password, a user registration password and the like. The starting password and the registration password of the application module of the client are selected by the user and can be modified at any time. And the application module starting password of the client is used for ensuring that only a legal mobile token user can use the mobile token to complete the dynamic identity authentication process. The registration password is used for ensuring that only a legal user can use the mobile phone token to complete the functions of unlocking and canceling the dynamic identity authentication service; the current working password and the information encryption and decryption keys are divided into a current working password of a token end of the mobile phone and a current working password of an authentication server end, the current working password and the information encryption and decryption keys of the authentication server end are also part of user information, and the two ends of the authentication server end are provided with the same current working password and the same information encryption and decryption keys. During initialization, the random number generator respectively generates an initial current working password and information encryption and decryption keys, and sets the current working password, the information encryption and decryption keys in the mobile phone token and the current working password, the information encryption and decryption keys at the authentication server end as the initial current working password and the information encryption and decryption keys.
2. User initiated dynamic identity authentication service
The process that the user starts the dynamic identity authentication service refers to that the user uses the mobile token to send a request for starting the dynamic identity authentication service to the authentication server, the authentication server firstly verifies the legality of the user information of the user and carries out corresponding processing after receiving the request, and then sends a response for starting the dynamic identity authentication service to the user. The detailed process is as follows:
1) a user inputs a mobile phone token client application module starting password (set during mobile phone token initialization), and the password passes the identity authentication of a mobile phone token end;
2) a user sends a request for opening dynamic identity authentication service to an authentication server through a mobile phone token;
3) the authentication server receives the information of 'starting dynamic identity authentication service request', and then verifies the validity of the information (the user ID and the registration password in the verification information are determined when the mobile phone of the user is initialized);
4) the authentication server marks the authentication mode of the user as a dynamic identity authentication mode in a user information base, and then sends 'start dynamic identity authentication service response' information to the mobile phone token;
5) and the mobile token receives the response information of starting the dynamic identity authentication service and prompts that the dynamic identity authentication service is started.
The processing procedure of the mobile phone token end and the authentication server end when the user starts the dynamic identity authentication service is shown in fig. 5.
3. User application system synchronization
As mentioned previously, the key to enabling a user to authenticate with an authentication server is that the handset token and the authentication server maintain system synchronization. However, due to the abnormal condition that the two ends are not synchronized (for example, the power of the mobile phone is suddenly cut off in the user authentication process), the system synchronization state of the two ends needs to be recovered through the "user applies for system synchronization" executing the dynamic identity authentication security protocol. The detailed process is as follows:
1) a user inputs a mobile phone token client application module starting password and passes the identity authentication of a mobile phone token end;
2) a user sends information of applying for a system synchronization request to an authentication server through a mobile phone token;
3) the authentication server receives the information of applying for the system synchronization request and then verifies the validity of the information (the user ID and the registration password in the verification information are determined when the mobile phone of the user is initialized);
4) the authentication server takes out the current working password of the server from the user information base;
5) the authentication server generates 'application system synchronous response' information, writes the current working password of the server into a 'server side information' field in the information, and then sends response information to the user;
6) and after receiving the 'application system synchronous response' information, the mobile token extracts the current working password in the information, and sets the current working password of the dynamic electronic password at the mobile token end as the current working password extracted from the information, thereby completing system synchronization.
The processing procedure of the mobile phone token end and the authentication server end when the user applies for system synchronization is shown in fig. 6.
4. User application for unlocking
If the user finds that the account of the user is locked by the bank, the user can apply for unlocking through the mobile phone token. The detailed process is as follows:
1) a user inputs a mobile phone token client application module starting password and passes the identity authentication of a mobile phone token end;
2) a user sends an 'application account unlocking request' message to an authentication server through a mobile phone token;
3) the authentication server receives the information of the 'application account unlocking request', and then verifies the validity of the information (the user ID and the registration password in the verification information are determined when the mobile phone of the user is initialized);
4) the authentication server sets a 'user state' field of the user to be in an unlocking state in a user information database, and then sends 'application account unlocking response' information to the user;
5) the mobile phone token receives the information of 'application account unlocking response' and prompts the user that the unlocking is successful.
The processing procedure of the mobile phone token end and the authentication server end when the user applies for unlocking is shown in fig. 7.
If a legal user finds that the own mobile phone token is locked, the user can apply for unlocking through the mobile phone token, and the steps are as follows:
1) the user inputs a mobile phone token registration password (generally, the password is longer than the starting password), and the authentication is carried out through the authorization identity of the mobile phone token end;
2) the mobile phone token sets the 'user state' field in the mobile phone token to be in an unlocking state, and then informs the user of 'unlocking response' information through the mobile phone.
5. User cancellation of dynamic identity authentication service
The user can not only start the dynamic identity authentication service through the mobile phone token, but also cancel the dynamic identity authentication service through the mobile phone token. The detailed process is as follows:
1) a user inputs a mobile phone token client application module starting password and passes the identity authentication of a mobile phone token end;
2) a user sends a request for canceling the dynamic identity authentication service to an authentication server through a mobile phone token;
3) the authentication server receives the information of canceling the dynamic identity authentication service request and then verifies the validity of the information (the user ID and the registration password in the verification information are determined when the mobile phone of the user is initialized);
4) the authentication server marks the authentication mode of the user as a fixed password identity authentication mode in a user information base, and then sends 'cancel dynamic identity authentication service response' information to the mobile phone token;
5) the mobile phone token receives the information of canceling the dynamic identity authentication service response and prompts that the dynamic identity authentication service is canceled.
The processing procedure of the mobile phone token side and the authentication server side when the user cancels the dynamic identity authentication service is shown in fig. 8.
6. User termination of dynamic identity authentication service
In the process of identity authentication, if the dynamic identity authentication process is to be stopped, the steps are as follows:
1) the user inputs a preset stopping instruction of the mobile phone token, and the token system stops the authentication process;
2) the user inputs and transmits a request for stopping the dynamic identity authentication service to the identity authentication server through the user terminal;
3) and after receiving the request for stopping the dynamic identity authentication service, the authentication server stops the authentication process of the server side.
Security mechanism for (II) security protocol
The security protocol encrypts and decrypts the interactive information according to an Encryption key, a decryption key and a block cipher algorithm such as DES (data Encryption Standard).
The protocol not only defines the encryption and decryption methods of the interactive information, but also specifies the management details of the corresponding encryption and decryption keys. The protocol specifies: writing encryption and decryption keys when the mobile phone token is initialized; the encryption and decryption key updating method based on the information use times is used, namely an information counter is maintained at a user mobile phone end, the number of request information sent by a mobile phone token is counted, when the counter reaches a threshold value, the mobile phone token automatically sets a key updating marker bit in interactive information, an authentication server carries new information encryption and decryption keys in response information after receiving the information, and the mobile phone token starts to use the new keys to encrypt and decrypt the information after receiving the new keys.
(III) safety protocol information format
The protocol information format is shown in figure 9. The information is divided into two types of service request information and service response information, and each information is divided into two parts, namely a header and an information body. The specific format is described as follows:
(1) protocol header
Version: a version number of the protocol;
head length: the length of the protocol header;
service party ID: using the unique ID to identify each service party providing the dynamic authentication service;
total length: the total length of the information, this field is set because the expansion of the body of information is considered later;
(2) service request information body
Service type: the 1 st bit indicates the information type; the 2bit indicates whether the client requests the information encryption key to be updated or whether a key carrying the update exists in the response information; 3-8 bits are information type bits;
verification code: information is verified using byte summation;
sequence number: identifying each request message to prevent replay attack;
user ID: a user authentication account number;
registration code: the initialization of the user mobile phone token is the generation of private data of the user. The server confirms the user identity by using the user ID and the user verification code;
(3) service response body
Service type: the same as above;
verification code: the same as above;
sequence number: copying the serial number in the request to ensure the one-to-one correspondence between the response and the request;
the new key is as follows: carrying protocol information to encrypt a new key;
service side information: response information returned to the user by the service party, such as the current working password of the algorithm;