[go: up one dir, main page]

CN1860729A - Mail server login security authentication method and IC card authentication hardware - Google Patents

Mail server login security authentication method and IC card authentication hardware Download PDF

Info

Publication number
CN1860729A
CN1860729A CN200380110622.XA CN200380110622A CN1860729A CN 1860729 A CN1860729 A CN 1860729A CN 200380110622 A CN200380110622 A CN 200380110622A CN 1860729 A CN1860729 A CN 1860729A
Authority
CN
China
Prior art keywords
card
hardware
mail server
authentication
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200380110622.XA
Other languages
Chinese (zh)
Inventor
林晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN1860729A publication Critical patent/CN1860729A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to a Mail Server login security authentication method and IC card authentication hardware, it is to utilize an IC card to embed an identity check secret code ICCID and an international check code GLN, and put this IC card into an IC card reading device (Reader), and install on hardware compatible with USB interface of the computer or PS2 slot or having wireless communication, infrared transmission, etc., as the authentication hardware, the user can guarantee the source identifiability of the user and the confidentiality of the Mail data through the control and management comparison of the embedded program of the IC card and the security control mechanism; because the IC card and its IC card Reader are easily matched with the peripheral hardware of general computer, it can make its application more extensive, and can also be used as storage medium, so that it has the security, safety and mobility of data access.

Description

邮件伺服器登入安全认证方法及 ic卡认证硬件 技术领域 Mail server login security authentication method and IC card authentication hardware Technical field

本发明涉及一种邮件伺服器登入安全认证方法及 IC卡认证硬件, 尤 指一种利用认证硬件当做邮件伺服器登入媒介的高安全性与高价值性的 设计。 背景技术 The present invention relates to a mail server login security authentication method and IC card authentication hardware, especially a high security and high value design using authentication hardware as a mail server login medium. Background technique

在竞争激烈的全球商业环境里, e- Mail是资讯传递与商务接洽不可 或缺的主力工具,占据了高达约 70%的企业网络资源使用,且每年以 500% 的比例快速成长。 根据 CNET杂志估计, ¾J2001年底, 电子邮件帐号数目 已突破 10亿大关,若以每个电子信箱平均一天收到 20〜30封信估算,那 么每天将有数百亿封电子邮件在各种不同的网络上传输, 由此可见电子 邮件在目前网际网络中所占的重要性。 In the highly competitive global business environment, e-Mail is an indispensable main tool for information transmission and business contact, accounting for up to about 70% of enterprise network resource usage, and growing rapidly at a rate of 500% every year. According to the estimate of CNET magazine, by the end of 2001, the number of e-mail accounts has broken through the 1 billion mark. If each e-mail box receives 20-30 letters per day on average, there will be tens of billions of e-mails in different types of e-mails every day. It can be seen that e-mail plays an important role in the current Internet.

传统的邮件传送协定 (SMTP : Simpl e Mail Transfer Protocol)并 不具备使用者身份认证的功能, 此相当容易被有心人士滥用为广告邮件 或垃圾邮件的转送点。 而没有身份认证功能的邮件传送机制, 也造成系 统管理或是网络管理人员, 处理问题邮件追踪时的困难。 The traditional mail transfer protocol (SMTP: Simple Mail Transfer Protocol) does not have the function of user identity authentication, so it is quite easy to be abused by malicious people as a transfer point for advertising mail or spam. And the email transmission mechanism without identity authentication function also causes system management or network administrators to deal with difficulties when tracking problem emails.

因此大多数的邮件系统都拒绝为内部可信赖区域以外的使用者转送 邮件 (mail relay) , 但这种限制也造成了合法使用者使用上的不方便。 Therefore, most mail systems refuse to transfer mail (mail relay) for users outside the internal trusted zone, but this restriction also causes inconvenience to legitimate users.

例如出差或是下班回家之后,无法继续使用公司的邮件伺服器发信。 学生放假离开学校之后也不能使用学校的邮件主机发出信件。 For example, after going on a business trip or returning home from get off work, you cannot continue to use the company's mail server to send letters. Students cannot use the school's mail host to send letters after they leave school for the holidays.

以往要解决这个问题, 必须购买一 昂贵的商业邮件伺服器, 以便 在使用者发出信件前先进行身份的认证。 但是现在使用本发明的方法, 搭配一种使用便利的认证硬件, 通过认证硬件上设的 IC卡内嵌程序及安 控机制, 搭配 CA身分认证伺服器便能有 ¾:防护及认证, 即可达成往日商 业软件才有的身分认证功能。 To solve this problem in the past, it was necessary to purchase an expensive commercial mail server, so that the identity authentication was carried out before the user sent the letter. But now using the method of the present invention, with an easy-to-use authentication hardware, through the IC card embedded program and security control mechanism on the authentication hardware, with the CA identity authentication server, there will be ¾: protection and authentication. Achieve the identity authentication function only available in commercial software in the past.

再者一般公知, 在网络上进行任何会员制的功能, 包含登入邮件伺 服器 (Mail Server), 都是自设一组密码或由伺服器本身随机设一组密码 给使用者, 由于是在网页伺服器端进行资讯情报密码化; 即使实施密码 化, 为了防止通讯网际网络情报的外泄, 有研究设计密码化技术的程序 及逻辑, 希望在技术上能与骇客相对抗, 然而在现况上尚无法做到完全 的防止, 这明显的指出只有密码保护的电脑不够安全。 Furthermore, it is generally known that any membership-based function on the network, including logging into the mail server (Mail Server), is to set a set of passwords by oneself or set a set of passwords randomly by the server itself. For users, because the information information is encrypted on the web server side; even if the encryption is implemented, in order to prevent the leakage of communication Internet information, there is research and design of the program and logic of the encryption technology, hoping to be technically compatible with hackers However, in the current situation, complete prevention cannot be achieved, which clearly points out that only password-protected computers are not safe enough.

目前登入邮件伺服器 (Mail Server), 都只在网页上直接登录使用者 名称及密码, 若二者相符, 就能通过邮件伺服器 (Mail Server) , 用 登 录使用者的资料去进行合法使用可以执行的动作, 甚至可以查询到使用 者的一些相关机密资料, 及信件来往记录; 但以今日一般的邮件伺服器 (Mail Server)所采用的编码技术而言,单独在邮件伺服器 (Mail Server) 上做密码编解码的动作, 实在是无法确保能不被骇客破解。 今日网际网 络的无边无际, 为了便利使用及随时随地都能上网的需求, 使得使用者 可以方便的在很多地方利用不同的电脑或其他装备上网, 就很容易衍生 出密码被非法使用及无法追踪非法使用者等问题, 例如利用图书馆的公 用电脑上网, 或于网吧上网, 由于使用同一台机器的使用者众多, 若一 时疏忽, 将其使用者名称及密码遗留在登录画面中而忘记刪除的话, 便 很容易被下一个使用者盗用或被骇客利用一些简易作业系统的后门程序 等拿来破解且盗用其机密资料,进 行非合法使用者授权的非法行为, 以 致使用者的损失。 At present, to log in to the mail server (Mail Server), only the user name and password are directly registered on the webpage. If the two match, the registered user's information can be used legally through the mail server (Mail Server). The action performed can even inquire some relevant confidential information of the user and the correspondence records; It is really impossible to ensure that the password encoding and decoding can not be cracked by hackers. Today's Internet is boundless. In order to facilitate the use and be able to access the Internet anytime, anywhere, users can easily use different computers or other equipment to access the Internet in many places, and it is easy to derive illegal use of passwords and illegal tracking. Users and other issues, such as using the public computer in the library or surfing the Internet in Internet cafes, because there are many users using the same machine, if you accidentally leave their user name and password on the login screen and forget to delete it, It is easy to be misappropriated by the next user or hackers use the backdoor program of some simple operating systems to crack and steal their confidential information, and carry out illegal acts not authorized by the legitimate user, resulting in the loss of the user.

另以现行网际网络所采用的密码安全而言, 其中尤以: 《骇客以 Dictionary Attack方式破解用户密码, 假冒用户身份》 最为普遍, 一般 人家都知道, 以输入使用者 ID及密码的方式签入电脑系统, 或是登入会 员制的网站是最简单、 但却也是最不安全的方式。 In addition, in terms of the security of passwords used in the current Internet, especially: "Hackers use Dictionary Attack to crack user passwords and fake user identities" is the most common, and most people know that signing by entering the user ID and password Logging into a computer system, or logging into a membership-based website is the easiest, but also the least secure way.

其原因如下: The reasons are as follows:

1、 一般人选择密码的依据, 是以方便记忆为主, 很少人会选择一串 任意排列并夹杂英文字母及数字的密码。 著名的密码学大师 Daniel 1. The basis for most people to choose a password is to facilitate memory. Few people will choose a string of passwords that are arranged arbitrarily and mixed with English letters and numbers. The famous cryptographer Daniel

Klein声称, 以一般的字典攻击法(Dictionary Attack) , 40%电脑上的密 码可轻易被破解。 目前网络上散布着许多由学生、 系统专家及骇客所设 计的密码破解软件, 提供企业内、 外部骇客入侵的工具。 Klein claims that with a general dictionary attack (Dictionary Attack), passwords on 40% of computers can be easily cracked. At present, there are many password cracking software designed by students, system experts and hackers scattered on the Internet, providing tools for internal and external hackers to intrude.

2、 现今资讯系统日趋复杂化, 许多异质系统相互串联的结果, 导致 用户在签入不同电脑系统时, 因各作业系统的要求, 必须再次输入密码。 据专家统计,只有少数人能同时记忆三组不同且长度为八个字串的密码。 结论是, 绝大多数人会因此而将密码写下来, 放在用户认为安全方便的 地方。 很显然的, 这又提供了企业内、 外部骇客入侵的管道。 2. Today's information systems are becoming more and more complex, and many heterogeneous systems are connected in series, resulting in When the user logs in to different computer systems, due to the requirements of each operating system, the user must enter the password again. According to expert statistics, only a small number of people can memorize three sets of different passwords with a length of eight strings at the same time. The conclusion is that most people will write down their passwords because of this, and put them in a place that users think is safe and convenient. Obviously, this provides a channel for internal and external hackers to intrude.

3、 即使用户不曾触犯以上两点失误, 但是很显然的, 密码在从使用 者端传输到伺服器前, 是以明文的形态存在。 骇客可以经由网际网络或 是局域网络上任何一点, 截取密码, 然后假冒使用者 (Replay)幵始非法 入侵系统。 很多人以为租一条专线, 就可以不被骇客入侵。 这样的观念 是错的。 即使是专线, 也是经过公共交换系统做线路交换, 对于骇客入 侵系统而言, 更为方便。 因为专线一旦建立后, 资料所流动的路线就不 常会变化。 如此, 骇客更能集中资源, 专注于截取固定线路上流动的资 料。 3. Even if the user has not violated the above two mistakes, it is obvious that the password exists in the form of plain text before being transmitted from the user end to the server. Hackers can intercept passwords through the Internet or any point on the LAN, and then fake users (Replay) to start illegally intruding into the system. Many people think that renting a dedicated line will prevent them from being hacked. Such a notion is wrong. Even the dedicated line is switched through the public switching system, which is more convenient for hackers to invade the system. Because once the dedicated line is established, the route of data flow will not often change. In this way, hackers can concentrate resources and focus on intercepting data flowing on fixed lines.

再者: 《骇客也可截取点对点传输中未经加密过的资料, 并加以篡 改》,在网际网络上走的通讯协定是 TCP/IP。在两台电脑能够传输资料前, 必须先完成三段式交握(Three- way Handing Shaking) , 才能建立连线, 幵始传送资料。 这其中潜藏的问题, 却给予骇客入侵的好机会。 Furthermore: "Hackers can also intercept unencrypted data in point-to-point transmission and tamper with it", the communication protocol on the Internet is TCP/IP. Before the two computers can transmit data, they must first complete the three-way handshaking (Three-way Handing Shaking) to establish a connection and start transmitting data. This hidden problem, but gives a good opportunity for hackers to invade.

其原因如下: The reasons are as follows:

1、 为双方资料的传输是通过公众的网际网络, 而所传送的资料是以 明文的形态存在。 任何连上网际网络的电脑, 都可以对网上的资料做监 听(Sniffing;)。 如此一来, 个人隐私、 财产, 以及企业商务机密则完全 曝露在网际网络上, 根本毫无隐私、 机密可言。 1. The transmission of the information of both parties is through the public Internet, and the transmitted information exists in the form of plain text. Any computer connected to the Internet can monitor (Sniffing;) the information on the Internet. In this way, personal privacy, property, and corporate business secrets are completely exposed on the Internet, and there is no privacy or confidentiality at all.

2、有时骇客为了完全掌握上述所建立的连线,并假冒原使用者身份, 以存取远端主机上的资源与服务, 会同时假冒主机的身份, 将大量无用 的资料回传给使用者, 企图瘫疾用户端电脑系统的运算能力(Denial of Service ; DoS) 0 如此一来, 骇客不但可以假冒原使用者身份, 以存取远 端主机上的资源与服务, 任意发布、 篡改或删除资料, 让主机端的系统 管理者无法察觉。 更严重的是, 骇客以这样不着痕迹的方式删改资料, 在无法确认讯息来源 (使用者身份)的状况下, 使原使用者难以自清。 2. Sometimes, in order to fully grasp the connection established above and pretend to be the original user to access resources and services on the remote host, hackers will also fake the identity of the host and send back a large amount of useless data for use. Or, in an attempt to paralyze the computing power of the client computer system (Denial of Service; DoS) 0. In this way, the hacker can not only pretend to be the original user identity, but also access the resources and services on the remote host, and arbitrarily publish, tamper with Or delete the data so that the system administrator on the host side cannot detect it. What's more serious is that hackers delete and modify data in such a way that there is no trace, making it difficult for the original user to clear himself up under the condition that the source of the message (user identity) cannot be confirmed.

再者: 若使用者于公共场所使用公用电脑上网, 都是通过该公共场所内部 的局域网络(LAN)而连接上外部网络(Internet) , 在局域网络(LAN)上, 以 Ethernet- based IP networks为例, 所有的资料(封包)都是以广播 (Broadcasting)的方式流向局域网络内所有的 PC。 因为每一台 PC上都有 —张网络卡(Network Interface Card) , 所以可以过滤掉不是传送给自 已的封包。而这其中潜藏的问题, 却给予骇客入侵的另一大好机会, (截 取在 LAN上传输的资料)。 Furthermore: If a user uses a public computer to access the Internet in a public place, it is connected to the external network (Internet) through the local area network (LAN) inside the public place. On the local area network (LAN), take Ethernet-based IP networks as an example, All data (packets) flow to all PCs in the LAN in the form of broadcasting. Because each PC has a network card (Network Interface Card), it can filter out packets that are not sent to itself. And the hidden problem among them gives another great opportunity for hackers to intrude (interception of data transmitted on LAN).

其原因如下. - The reason for this is as follows.-

1、为所有的封包都是以广播 (Broadcasting)的方式流向局域网络内 所有的 PC, 而且是以明文的形态存在。 因此, 任何连上局域网络上都可 以扮演监听者 (Sniffer)的角色, 大方的偷看别人的资料。 1. All packets flow to all PCs in the LAN in the form of broadcasting, and exist in the form of plain text. Therefore, anyone connected to the local area network can play the role of a sniffer (Sniffer), and generously peek at other people's information.

2、 更糟糕的是, 一旦某人的密码被截取, 则很有可能被人以非法的 方式签入系统, 做一些非授权的事。 例如, 签核或签退公文、 更改会计 帐、 散布不实消息、 窃取研发资料后卖给竞争对手, 或是登入该使用者 的信箱, 截取重要邮件及篡改邮件内容等等。 2. What's worse, once someone's password is intercepted, it is very likely that someone will log into the system in an illegal way and do some unauthorized things. For example, signing or signing back official documents, changing accounting books, spreading false information, stealing research and development materials and selling them to competitors, or logging into the user's mailbox, intercepting important emails and tampering with email content, etc.

基于上述, 现行的网络密码安全漏洞相对的反映出本发明的重要性 与实质的进步性, 而现有的邮件伺服器登入的方法所存在的缺失有加以 改良的必要。 Based on the above, the current security loopholes in network passwords relatively reflect the importance and substantial progress of the present invention, and it is necessary to improve the deficiencies in the existing mail server login method.

因此, 本发明人有鉴于此, 乃特潜心研究并经过不断测试探讨, 终 于提出一种设计合理且有效改善上述缺失的一种搭配使用便利的认证硬 件, 有效防护并经由安控机制双重认证的邮件伺服器登入安全认证系统 与方法。 发明内容 Therefore, in view of this, the inventor of the present invention, after concentrating on research and continuous testing and discussion, finally proposed a kind of authentication hardware that is reasonably designed and effectively improves the above-mentioned deficiencies, and is effectively protected and double-authenticated by the security control mechanism. A mail server login security authentication system and method. Contents of the invention

本发明的目的在于解决现有的邮件服务器 (Mail Server)登入方法 其单独在邮件服务器 (Mail Server)上做密码编译码的动作, 实在是无法 确保能不被骇客破解, 只有密码登录保护的计算机不够安全的缺失。 The purpose of the present invention is to solve the existing mail server (Mail Server) login method, which performs password encoding and decoding on the mail server (Mail Server) alone. It is really impossible to ensure that it will not be cracked by hackers. Only password login protection The lack of computer security.

为此, 本发明提供的技术方案为: For this reason, the technical scheme provided by the invention is:

一种邮件伺服器登入安全认证方法, 其中: 将内置有一身份核对暗 码集成电路卡识别码 ICCID (Integrated Circuit Card Identification) 及一国际核对码全球识别码 GLN ( Global Number ) 的集成电路 IC ( Integrated Circuit ) 卡置入一 IC卡读取装置(Reader)内, 并装置于 一般相容于电脑的硬件上做为认证硬件, 该方法包含以下步骤: A mail server login security authentication method, wherein: there will be a built-in identity verification dark Put an integrated circuit IC (Integrated Circuit) card with an integrated circuit card identification code ICCID (Integrated Circuit Card Identification) and an international verification code global identification code GLN (Global Number) into an IC card reading device (Reader), and install Generally compatible with computer hardware as authentication hardware, the method includes the following steps:

步骤 a: 使用者利用装置一 IC卡和一 IC卡读取装置 (Reader)的认 证硬件登入邮件伺服器 (Mail Server) , 输入使用者所需登录的资讯, 并 按登录键 (Login) ; Step a: The user logs in to the mail server (Mail Server) by using the authentication hardware of an IC card and an IC card reader (Reader), enters the information required by the user, and presses the login button (Login);

步骤 b: 利用 IC卡内嵌程序将其登录流程导至 CA身份认证伺服器, 并将 IC卡内置的 ICCID暗码传至身份证明管理机构 CA (Certification Authority) 身份认证伺服器, 通过 CA身份认证伺服器特殊的程序来判 定认证硬件的 IC卡是否合法及审核权限, 正确则在 CA身份认证伺服器 资料库上记录其登入次数, 产生一认证硬件认证成功的凭借(Server Step b: Use the embedded program of the IC card to guide the login process to the CA identity authentication server, and transmit the ICCID password built in the IC card to the identity authentication management agency CA (Certification Authority) identity authentication server, and pass the CA identity authentication server The special program of the server is used to determine whether the IC card of the authentication hardware is legal or not, and if it is correct, it will record the number of logins on the CA identity authentication server database, and generate a certificate of successful authentication of the authentication hardware (Server

Result), 并回传解码过程中所产生的随机乱数值 (Random)至 IC卡; 步骤 c : 前述步骤正确后, IC卡利用 IC卡内嵌程序将取得的随机乱 数值 (Random)用来解码内置的 ICCID暗码, 并产生一 IC卡认证的凭借Result), and return the random random value (Random) generated during the decoding process to the IC card; Step c: After the above steps are correct, the IC card uses the IC card embedded program to obtain the random random value (Random) for decoding Built-in ICCID password, and generate an IC card authentication certificate

(Client Result) , 并将其登录流程导至邮件伺服器 (Mail Server) , 并 将 ICCID暗码、 IC卡认证的凭借 (Client Result) , 使用者输入资讯一 并传至邮件伺服器 (Mail Server) , 让邮件伺服器 (Mail Server)依其资 料库判定使用者输入的资讯是否正确, 并査询使用期限 (avail date); 步骤 d: 前述步骤正确后, 邮件伺服器 (Mail Server)将所接受的(Client Result), and guide its login process to the mail server (Mail Server), and send the ICCID password, IC card authentication by virtue of (Client Result), and user input information to the mail server (Mail Server) , Let the mail server (Mail Server) determine whether the information entered by the user is correct according to its database, and check the validity period (avail date); Step d: After the above steps are correct, the mail server (Mail Server) will accept of

ICCID暗码及 IC卡认证的凭借 (Client Result)传至 CA身份认证伺服器 以供再次解密确认认证硬件及使用者资讯的正确性。 The ICCID password and IC card authentication (Client Result) are sent to the CA identity authentication server for re-decryption to confirm the correctness of the authentication hardware and user information.

—种邮件伺服器登入安全认证的 IC卡认证硬件, 其中: 该 IC卡内 置有一身份核对暗码 ICCID及一国际核对码 GLN, 该 IC卡置入一 IC卡 读取装置 (Reader)内, 并装置于一般相容于电脑的硬件上, 做为认证硬 件;该装置 IC卡的认证硬件,可为一通用串行总线 USB(Universal Serial An IC card authentication hardware for mail server login security certification, wherein: the IC card has a built-in identity verification code ICCID and an international verification code GLN, the IC card is inserted into an IC card reading device (Reader), and installed Generally compatible with computer hardware, as authentication hardware; the authentication hardware of the device IC card can be a Universal Serial Bus USB (Universal Serial Bus)

Bus ) 介面的硬件。 Bus ) interface hardware.

其中, 该装置 IC 卡的认证硬件, 可为一通用连接端 PS2 (Public Wherein, the authentication hardware of the IC card of the device can be a universal connection terminal PS2 (Public

Switched 2) 插槽的硬件。 该装置 IC卡的认证硬件, 可为一具有无线通讯的硬件。 Switched 2) The hardware of the slot. The authentication hardware of the device IC card can be a hardware with wireless communication.

该装置 IC卡的认证硬件, 可为一 IEEE1394介面的硬件。 The authentication hardware of the device IC card can be an IEEE1394 interface hardware.

该装置 IC卡的认证硬件, 可为一 IR (红外线)介面的硬件。 The authentication hardware of the device IC card can be an IR (infrared) interface hardware.

该装置 IC卡的认证硬件, 可为一快闪存储器。 The authentication hardware of the device IC card can be a flash memory.

该装置 IC卡的认证硬件, 可为一 PCMCIA (Personal Memory Card The authentication hardware of the device IC card can be a PCMCIA (Personal Memory Card

International Association, 个人电脑存储卡国际协会) 介面装置。 International Association, Personal Computer Memory Card International Association) interface device.

该装置 IC卡的认证硬件, 可为一键盘、 或一滑鼠、 或一游戏摇杆。 该装置 IC卡的认证硬件, 可为一 Web Cam (网络摄影机)。 The authentication hardware of the device IC card can be a keyboard, or a mouse, or a joystick. The authentication hardware of the device IC card can be a Web Cam (network camera).

本发明的主要创意来自于现行网络安全漏洞百出, 对于使用者上网 安心使用其私密资料的防护性不足,于是潜心研究利用一 IC卡来搭配一 认证硬件,并与 CA身份认证服务器 (安控机制)以达到提升电子数据网络 安全传输所欲达到的五大信息安全需求, 即为: The main idea of the present invention comes from the fact that the current network security is full of loopholes, and the protection for users to use their private information safely when surfing the Internet is insufficient. Therefore, it is devoted to research and use an IC card to match an authentication hardware, and it is connected with the CA identity authentication server (security control mechanism) ) in order to achieve the five major information security requirements to be met in order to improve the security transmission of electronic data networks, namely:

(1) 资料的隐密性 ( Confidentiality ) (1) Confidentiality of information

确保资料讯息不遭第三者偷窥或窃取, 以保护数据传输资料的隐私, 可通过资料加密来完成。 To ensure that the data information is not peeped or stolen by a third party, in order to protect the privacy of the data transmission data, it can be done through data encryption.

(2) 资料的完整性 ( Integrity ) (2) Data integrity (Integrity)

确保数据传输资料讯息未遭有心人篡改, 以确保数据传输内容的正 确性, 可通过数字签章或资料加密予以保护。 To ensure that the data transmission information has not been tampered with by deliberate persons, to ensure the correctness of the data transmission content, it can be protected by digital signature or data encryption.

(3) 来源辨识性 (Authentication) (3) Source identification (Authentication)

确认数据传输讯息的来源, 以避免数据传输讯息遭到假冒, 可通过 数字签章或资料加密等方式加以防范。 Confirm the source of the data transmission message to avoid counterfeiting of the data transmission message, which can be prevented by means of digital signature or data encryption.

传送及接收讯息避免使用者事后否认曾进行数据传输, 可通过数字 签章及公开金钥基础架构来达成。 Sending and receiving messages prevents users from later denying that data transmission has occurred, which can be achieved through digital signatures and public key infrastructure.

(5) 存取控制 ( Access Control ) (5) Access Control (Access Control)

依使用者的身份, 作存取资料的控管。 此外, 并可依使用者的身份, 决定安控模块功能的执行权限。 According to the identity of the user, control the access to data. In addition, according to the identity of the user, the execution authority of the function of the security control module can be determined.

本发明所搭配的 IC卡主要是以韧体的方式烧录于芯片中, 且有储存 量大的优点, 且非一般人能自行制作编辑, 不易被仿冒盗制, 其防伪及 防止被破解的功能性强, 可有效的防止被人恶意盗用的困扰, 并搭配目 的端邮件服务器 (Mail Server)及 CA身份认证服务器端的相互加解密并 交叉比对的结果, 更能有效的让使用者悠游于安全的网络环境中, 且能 体会科技带给人类方便的美意。 The IC card used in the present invention is mainly burned in the chip in the form of firmware, and has the advantage of large storage capacity, and it is not easy for ordinary people to make and edit by themselves, and it is not easy to be counterfeited and stolen. Its anti-counterfeiting and The function of preventing being cracked is strong, which can effectively prevent the trouble of being maliciously stolen, and with the mutual encryption and decryption and cross-comparison results of the destination mail server (Mail Server) and the CA identity authentication server, it can be more effective. Users roam freely in a safe network environment, and can appreciate the convenience that technology brings to human beings.

另外, 搭配装置一 IC卡及一 IC卡读取装置 (Reader)于其内的认证 硬件, 是可为一般兼容于计算机 USB接口或 PS2插槽也或是具有无线通 讯、 红外线传输的硬件, 也可用来当做储存媒介, 例如搭配在闪存上, 而不会使得资料只能存放于固定的硬盘中, 使之更具有资料存取的保密 性、 安全性及机动性, 甚至更可广泛应用到所有兼容的外围硬件, 便能 当成合法使用的凭借, 其硬件呈现方式如同一般门禁钥匙的运用, 其使 用模式较能让一般使用者接受。 In addition, the certification hardware equipped with an IC card and an IC card reading device (Reader) can be generally compatible with a computer USB interface or PS2 slot, or have wireless communication and infrared transmission hardware. It can be used as a storage medium, for example, on a flash memory, instead of making the data only stored in a fixed hard disk, making it more confidential, safe and mobile for data access, and even more widely used in all Compatible peripheral hardware can be used as a basis for legal use, and its hardware presentation method is similar to the use of general access control keys, and its use mode is more acceptable to ordinary users.

再者, 利用本发明所采用的搭配 IC卡的认证硬件的另一附加价值系 如同个人的私钥, 其不连上邮件服务器 (Mail Server)时也可保护单机系 统, 若使用者使用公用计算机, 如办公室的计算机或学校计算机教室等 多人共享的计算机时, 也可利用本发明来设定个人档案的读取权限, 且 其解锁方式唯有通过本发明才能顺利解除锁定, 如此可方便安全且周详 的做到个人资料私密保护, 甚至也可将外围硬件的使用权限锁住而禁止 没有使用权限的人使用。 Furthermore, another added value of the authentication hardware with the IC card used in the present invention is as a personal private key, which can also protect the stand-alone system when it is not connected to the mail server (Mail Server). If the user uses a public computer For computers shared by many people, such as office computers or school computer classrooms, the present invention can also be used to set the reading authority of personal files, and the unlocking method can only be successfully unlocked through the present invention, which is convenient and safe Moreover, personal data privacy protection is meticulously achieved, and even the use authority of peripheral hardware can be locked to prohibit people without use authority from using it.

依据前述, 本发明经由上述数道加解密并编码的防护动作, 可以确 保使用者于邮件服务器 (Mail Server)认证的安全性, 并避免使用者私密 资料的泄露, 且 CA 身份认证服务器更可适当的为邮件服务器 (Mail Server)提供更安全且更优质防护的环境。 Based on the foregoing, the present invention can ensure the security of the user's authentication on the mail server (Mail Server) and avoid the leakage of the user's private information through the protection actions of the above-mentioned encryption, decryption and encoding, and the CA identity authentication server can be more appropriate Provide a more secure and better protected environment for the mail server (Mail Server).

本系统的凭证管理作业, 都由用户以浏览器上网连到邮件服务器 (Mail Server)执行相关作业, 再由认证程序送出各请求信息到凭证伺服 系统来。 用户的凭证确认及相关功能可非常容易的执行, 且 Web Server 网络服务器端认证程序系统安装简单,且本发明所搭配的 IC卡搭配于一 般计算机外设硬件容易, 应用面应泛。 The certificate management operation of this system is all performed by the user connecting to the mail server (Mail Server) through the browser to perform related operations, and then the authentication program sends each request information to the certificate server system. The user's credential confirmation and related functions can be performed very easily, and the Web Server network server-side authentication program system is easy to install, and the IC card matched with the present invention is easy to match with general computer peripheral hardware, and its application range should be extensive.

与现有一般登入邮件服务器 (Mail Server)的方法比较, 本发明利用 了一 IC卡储存使用者的私密认证资料并一身份核对暗码 ICCID, 并将此 IC卡装置于一般兼容于计算机 USB接口或 PS2插槽也或是具有无线通讯 的硬件上, 当做认证硬件, 并搭配一认证程序于邮件服务器 (Mail Server) , 在使用者利用此认证硬件登入邮件服务器 (Mail Server)时, 经由数道加解密并编码的防护动作, 以确保使用者于网站上登录认证的 安全性, 并避免使用者私密资料的泄露, 且可适当的为邮件服务器 (Mail Server)提供更安全优质防护的网络环境。 附图说明 Compared with the existing general method of logging into the mail server (Mail Server), the present invention uses an IC card to store the user's private authentication data and an identity verification password ICCID, and the The IC card device is generally compatible with the computer's USB interface or PS2 slot, or hardware with wireless communication, as authentication hardware, and an authentication program is installed on the mail server (Mail Server), and the user uses this authentication hardware to log in to the mail In the case of the server (Mail Server), through several encryption, decryption and encoding protection actions to ensure the security of the user's login authentication on the website, and to avoid the leakage of the user's private information, and can be properly used as a mail server (Mail Server) ) to provide a more secure and high-quality protected network environment. Description of drawings

图 1为本发明的步骤流程图; Fig. 1 is a flowchart of steps of the present invention;

图 2为本发明搭配的 IC卡装置于可利用的硬件示意图; FIG. 2 is a schematic diagram of the available hardware of the IC card device used in the present invention;

图 3为本发明的实体流程导向示意图; FIG. 3 is a schematic diagram of the entity process orientation of the present invention;

图 4为本发明搭配的 IC卡的应用实施例图; FIG. 4 is a diagram of an application example of an IC card matched with the present invention;

图 5为本发明搭配的 IC卡装置于 PCMCIA介面装置的整合应用实施例 图; FIG. 5 is a diagram of an embodiment of the integrated application of the IC card device matched with the PCMCIA interface device in the present invention;

图 6为本发明搭配的 IC卡装置于快闪存储器的整合应用实施例图; 图 7为本发明搭配的 IC卡装置于快闪存储器插置于电脑主机外壳的 示意图。 FIG. 6 is a diagram of an integrated application example of the IC card device in the flash memory of the present invention; FIG. 7 is a schematic diagram of the IC card device in the present invention inserted in the flash memory and inserted into the casing of the computer host.

【图号说明】 【Description of figure number】

10、 认证硬件 10. Certified hardware

20、 CA身份认证伺服器 20. CA identity authentication server

30、 IC卡 30. IC card

40、 认证硬件 40. Certified hardware

50、 认证硬件 50. Certified hardware

60、 CA身份认证伺服器 60. CA identity authentication server

70、 邮件伺服器 具体实施方式 70. Mail server specific implementation

以下配合图示对本发明的实施方式做进一步的说明后当更能明了。 图一为本发明的步骤流程图, 图中包含&、 b、 c, d四个主要步骤, 另一个正确的登入过程中包含了 step. 1到 step. 5等五个主要流程: 步骤 a: 使用者利用装置一 IC卡并一 IC卡读取装置(Reader)的认证 硬件登入邮件伺服器 (Mail Server) , 输入使用者所需登录的资讯, 并按 登录键(Login); It should be clearer after further description of the embodiments of the present invention in conjunction with the drawings below. Figure 1 is a flow chart of the steps of the present invention, which includes four main steps & , b, c, and d, and another correct login process includes five main processes such as step. 1 to step. 5: Step a: The user logs in the mail server (Mail Server) by means of an IC card and an authentication hardware of an IC card reader (Reader), inputs the information required by the user, and presses the login button (Login);

步骤 b : 利用 IC卡内嵌程序将其登录流程导至 CA身份认证伺服器, 并将 IC卡内置的比 ICCID暗码传至 CA身份认证伺服器(step. 1 ), 通过 CA身份认证伺服器特殊的程序来判定认证硬件上的 IC卡是否合法及审 核权限, 正确则在 CA身份认证伺服器资料库上记录其登入次数, 产生一 认证硬件认证成功的凭借(Server Result), 并回传解码过程中所产生的 随机乱数值(Random)至 IC卡 ( step. 2 ) ; Step b: Use the embedded program of the IC card to guide the login process to the CA identity authentication server, and pass the ICCID password built into the IC card to the CA identity authentication server (step. 1), and pass the CA identity authentication server special The program to determine whether the IC card on the authentication hardware is legal and the audit authority, if it is correct, it will record the number of logins on the CA identity authentication server database, generate a certificate of successful authentication of the authentication hardware (Server Result), and return the decoding process Generated random random value (Random) to the IC card (step. 2);

步骤 c: 前述步骤正确后, IC卡利用 IC卡内嵌程序将取得的随机乱 数值 (Random)用来解码内置的 ICCID暗码, 并产生一 IC卡认证的凭借 (Client Result) ( step. 3 ) , 并将其登录流程导至邮件伺服器(Mail Server) , 并将 ICCID暗码、 工 C卡认证的凭借(Client Result) , 使用者 输入资讯一并传至邮件伺服器(Mail Server) , 让邮件伺服器(Mail Server)依其资料库判定使用者输入的资讯是否正确, 并查询使用期限 (avail date); Step c: After the above steps are correct, the IC card uses the built-in program of the IC card to use the obtained random value (Random) to decode the built-in ICCID password, and generate an IC card authentication (Client Result) ( step. 3 ) , and guide its login process to the mail server (Mail Server), and send the ICCID password, IC card authentication (Client Result), and user input information to the mail server (Mail Server), so that the mail The server (Mail Server) judges whether the information entered by the user is correct according to its database, and inquires about the availability date;

步骤 d: 前述步骤正确后, 邮件伺服器 (Mail Server)将所接受的 ICCID暗码及 IC卡认证的凭借 (Client Result)传至 CA身份认证伺服器 以供再次解密确认认证硬件及使用者资讯的正确性 (step. 4)。 Step d: After the above steps are correct, the mail server (Mail Server) will send the accepted ICCID password and IC card authentication (Client Result) to the CA identity authentication server for decryption again to confirm the authentication hardware and user information Correctness (step. 4).

兹将以上步骤做一详细说明如下: The above steps are described in detail as follows:

首先步骤 a是指: 使用者通过一 IC卡内置一身份核对暗码 ICCID及 —国际核对码 GLN, 将此 IC卡置入一 IC卡读取装置 (Reader)内, 并装 置于一般相容于电脑 USB介面或 PS2插槽也或是具有无线通讯、 红外线 传输等等的硬件上, 当做认证硬件, 并利用此认证硬件登入邮件伺服器 (Mail Server)登录模式, 登录其使用者名称(Usemame)及密码 (Password)后按登录键(Login)。 The first step a refers to: the user uses an IC card with an identity verification password ICCID and an international verification code GLN, inserts the IC card into an IC card reader (Reader), and installs it on a computer that is generally compatible. USB interface or PS2 slot or hardware with wireless communication, infrared transmission, etc., as authentication hardware, and use this authentication hardware to log in to the mail server (Mail Server) login mode, and log in its user name (Usemame) and After the password (Password), press the login button (Login).

步骤 b 是指:在使用者输入其使用者名称 (Username)及密码 (Password)后, 通过 IC卡内嵌程序先将其登录流程导至 CA身份认证伺 服器进行加解密动作, 通过特殊的流程先解密 ICCID暗码的值, 并借其 比对 CA身份认证资料库, 相对应 ICCID暗码且授权通过 (Validate=Y) 的 EKI后, 先行解密得 KI, 且产生一随机乱数值 (Random)并以 ΚΙ加密 的结果存于 CA身份认证伺服器的资料库中,该加密后的结果即为认证硬 件认证成功的凭借(Server Result), 并可用以记录该便用者使用此 i人证 硬件登入的次数, 确认该认证硬件的合法性及该暗码 ICCID是否有登录 该网站的权限, 及所被授予的权限多大, 在硬件认证通过后, CA身份认 证伺服器会将所产生的随机乱数值 (Random)值传送回 IC卡, 当做 KEY, 用来供邮件伺服器 (Mail Server)端通过第二步认证流程后和 CA身份认 证伺服器交叉比对用; 而若此认证硬件上的 IC卡内设的 ICCID暗码在比 对结果中末授权通过 (Validated末开卡), 则系统会告知使用者端硬件 认证失败, 而失去通关登录的资格。 此为第一步的认证流程。 Step b refers to: After the user enters his user name (Username) and password (Password), first guide his login process to the CA identity authentication server through the embedded program of the IC card. The server performs encryption and decryption actions, first decrypts the value of the ICCID password through a special process, and compares it with the CA identity authentication database. After the EKI corresponding to the ICCID password and authorized (Validate=Y), first decrypts to obtain the KI. And generate a random random value (Random) and store it in the database of the CA identity authentication server with the result encrypted by K1, the result after the encryption is the success of the authentication hardware authentication (Server Result), and can be used to record the The number of times the user uses the i-certification hardware to log in, confirm the legitimacy of the authentication hardware and whether the password ICCID has the authority to log in to the website, and how much authority is granted. After the hardware authentication is passed, the CA identity authentication server The device will send the generated random value (Random) back to the IC card as KEY, which is used for cross-comparison with the CA identity authentication server after the mail server (Mail Server) passes the second-step authentication process; And if the ICCID password built in the IC card on the authentication hardware is not authorized in the comparison result (Validated and the card is not opened), the system will inform the user that the hardware authentication failed, and lose the qualification for customs clearance and login. This is the first step in the certification process.

步骤 c 是指:第一步的认证流程成功, 一般应用网站伺服器(AP Server)会先接收 IC卡上由 CA身份认证伺服器所传送过来的 KEY值, ICCID 暗码, 使用者输入的使用者名称(Username)和键入的密码 (Password), 再将其流程导至邮件伺服器 (Mail Server)进行比对使用者 姓名(Username)和密码(Password)是否正确, 并核对该使用者的有效使 用期限是否过期。 , Step c means: the first step of the authentication process is successful, the general application website server (AP Server) will first receive the KEY value, ICCID password, and user input from the IC card sent by the CA identity authentication server. Name (Username) and the typed password (Password), and then guide its process to the mail server (Mail Server) to compare the user name (Username) and password (Password) are correct, and check the effective use of the user Whether the period has expired. ,

步骤 d是指:步骤 c若经比对无误,则将 KEY值及 ICCID暗码传回 CA 身份认证伺服器进行加解密,通过特殊的流程先解密出 ICCID暗码的值, 并借其比对 CA 身份认证资料库, 相对应 ICCID 暗码且授权通过 (Validated)的 EKI后,并用 KEY值去对 EKI值解密,比对是否和 Server Result相符, 若相符, 则第二步认证通过, 若使用者经交叉比对确定是 合法的使用者, 则才能以合法使用权限通过登录入口, 继续导入下一步 的 Web Page并将 CA身份认证伺服器上加解密出的 Server Result清空, 以使得使用者下次登录时可以产生新的 Server Result并供暂存, 若比 对结果不相符, 则告知邮件伺服器 (Mail Server)认证硬件 ICCID暗码错 误, 认证失败, 失去通关登录的资格, 此为第二步认证流程。 Step d means: if the comparison in step c is correct, then send the KEY value and ICCID password back to the CA identity authentication server for encryption and decryption, first decrypt the value of the ICCID password through a special process, and use it to compare the CA identity The authentication database corresponds to the ICCID password and the authorized (Validated) EKI, and uses the KEY value to decrypt the EKI value, and compares whether it matches the Server Result. If it matches, the second step of authentication is passed. If the user passes the cross After comparing and confirming that the user is a legitimate user, he can pass through the login portal with legal authority, continue to import the next Web Page and clear the Server Result encrypted and decrypted on the CA identity authentication server, so that the next time the user logs in A new Server Result can be generated and temporarily stored. If the comparison results do not match, the mail server (Mail Server) will be notified that the authentication hardware ICCID password is wrong, the authentication fails, and the qualification for customs clearance and login will be lost. This is the second step of the authentication process.

再请叁考图 2, 为本发明装置于可利用的硬件示意图。 IC卡 30主要是以韧体的方式烧录于芯片中, 且有储存量大的优点, 且非一般人能自行制作编辑, 不易被仿冒盗制, 其防伪及防止被破解的 功能性强, 可有效的防止被人恶意盗用的困扰, 并搭配目的端邮件伺服 器 (Mail Server)及 CA身份认证伺服器端的相互加解密并交叉比对的结 果, 更能有效的让使用者悠游于安全的网络环境中。 Please refer to FIG. 2 again, which is a schematic diagram of the available hardware installed in the present invention. The IC card 30 is mainly burned into the chip in the form of firmware, and has the advantage of a large storage capacity, and it is not easy for ordinary people to make and edit by themselves, and is not easy to be counterfeited and stolen. It has strong anti-counterfeiting and anti-cracking functions, and can Effectively prevent the trouble of malicious theft, and cooperate with the mutual encryption and decryption and cross-comparison results of the destination mail server (Mail Server) and CA identity authentication server, it can more effectively allow users to roam in a safe network Environment.

且搭配 IC卡 30的认证硬件 40,可为一般相容于电脑 USB介面或 PS2 插槽也或是具有无线通讯的硬件, 也可用来当做储存媒介, 例如搭酉己在 快闪存储器上, 使之更具有资料存取的保密性及安全性, 其未来的发展 性甚广。 And the certification hardware 40 with the IC card 30 can be generally compatible with a computer USB interface or PS2 slot or hardware with wireless communication, and can also be used as a storage medium, such as being mounted on a flash memory, so that It also has the confidentiality and security of data access, and its future development is very wide.

图 3 为本发明的实体流程导向示意图, 图中显示本发明实际运作时 的流程导向, 从使用者登录到正式登录完成共经过 8个路由, 请叁考图 示, 路由 1为使用者利用一认证硬件 (装置 IC卡) 50装置于欲收取邮件 的电脑上登入邮件伺服器 (Mail Server) 70 登录其使用者资料, 路由 2 贝 lj为 Member Login视窗, 使用者在输人 Username禾口 Password之后, 按 登录键 (Login) , 触动路由 3, IC 卡内嵌程序便会先将其登录流程导至 CA身份认证伺服器 60进行加解密动作, 而路由 3为本发明的认证流程 1 (Winsock),在认证流程 (Winsock)里通过特殊的流程先解密出 ICCID暗 码的值, 并借其比对 CA身份认证资料库,相对应 ICCID暗码且授权通过 (Validated)的 EKI后, 先行解密得 KI, 且产生一随机乱数值 (Random) 并以 KI加密的结果存于 CA身份认证伺服器的资料库中, 该加密后的结 果即为认证硬件认证成功的凭借(Server Result), 并可用以记录该使用 者使用此认证硬件登入的次数,确认该认证硬件的合法性及该暗码 ICCID 是否有登录该网站的权限, 及所被授予的权限多人, 在硬件认证完成后, 紧接着触动路由 4, 将 CA身份认证伺服器所产生的随机乱数值 (Random) 传送回 IC卡, 当 IC卡接收到此随机乱数值 (Random)后, IC卡内嵌程序 会先将内置的 ICCID暗码先行解密而得一 KI值 (此处的 Π值并未审核 其是否为授权通过的认证硬件, 审核权和比对权是在 CA 身份认证^]服 器), 再借以和所接收的随机乱数值 (Random)进行加密而产生一 IC卡认 证的凭借 (Client Result) , 用来供一般应用网站伺服器 (Ap Server)端 进行第二步认证流程时和 CA身份认证伺服器交叉比对用;而若此认证硬 件上的 IC卡内设的 ICCID暗码在比对结果中末授权通过 (Validate二 N未 开卡), 则系统会告知使用者端硬件认证失败, 而失去通关登录的资格。 Fig. 3 is a schematic diagram of the physical process guidance of the present invention, which shows the process guidance of the present invention in actual operation. From user login to official login, a total of 8 routes have been passed. Please refer to the diagram. Route 1 is for users to use Authenticating hardware (device IC card) 50 is installed on the computer that wants to receive mails and logs into the mail server (Mail Server) 70 to log in its user data, and the routing 2 window is the Member Login window, after the user enters the Username and Password , press the login key (Login), touch the route 3, the IC card embedded program will first lead its login process to the CA identity authentication server 60 for encryption and decryption, and the route 3 is the authentication process 1 (Winsock) of the present invention In the authentication process (Winsock), the value of the ICCID password is first decrypted through a special process, and compared with the CA identity authentication database, after the EKI corresponding to the ICCID password and authorized (Validated), the KI is decrypted first, And generate a random random value (Random) and store the result encrypted with KI in the database of the CA identity authentication server. The number of times the user has used this authentication hardware to log in, confirm the legitimacy of the authentication hardware and whether the password ICCID has the authority to log in to the website, and how many people have been granted the authority. After the hardware authentication is completed, then touch the router 4, Send the random random value (Random) generated by the CA identity authentication server back to the IC card. When the IC card receives the random random value (Random), the embedded program of the IC card will first decrypt the built-in ICCID password first. A KI value (the Π value here does not verify whether it is authorized and passed authentication hardware, the audit right and comparison right are in the CA identity authentication server), and then use it with the received random random value (Random) Encrypt to generate an IC card authentication (Client Result), which is used for general application website server (Ap Server) When performing the second step of the authentication process, it is used for cross-comparison with the CA identity authentication server; and if the ICCID password set in the IC card on the authentication hardware is not authorized in the comparison result (Validate 2 N card is not opened), then The system will inform the user that the hardware authentication has failed, and the user will lose the qualification for customs clearance and login.

而若第一步的认证流程成功的话, 将会触动路由 5, 将流程导向邮件 伺服器 (Mail Server) 70, 而该邮件伺服器 (Mail Server) 70会先接收 IX 卡上的 ICCID暗码、 IC卡认证的凭借(Client Result) , 使用者输入的 使用者名称(Username)和键入的密码(Password) ,此时邮件伺服器 (Mai 1 Server) 70 会先通过其本身资料库进行比对使用者名称 (Username)和密 码 (Password)是否正确, 并核对该使用者的有效使用期限是否过期, 若 经比对无误, 再触动路由 6进行认证流程, 将 ICCID暗码及 IC卡认证的 凭借 (Cl ient Result)传回 CA身份认证伺服器进行交叉比对, 通过特殊 的流程先解密出 ICCID暗码的值, 并借其比对 CA身份认证资料库, 找 相对应 ICCID暗码且授权通过 (Validate二 Y)的认证硬件认证成功的凭借 (Server Result)后, 比对认证硬件认证成功的凭借(Server Result)是 否和 IC卡认证的凭借 (Client Result)相符, 若相符, 则第二步认证通 过, 触动路由 7, 若使用者经交叉此对确定是合法的使用者, 则才能以 合法使用权限通过登录入口, 合法通过邮件伺服器 (Mail Server) 70 收发邮件并进行存取邮件资料的动作,并将 CA身份认证伺服器上加解密 出的 Server Result清空,此为最后步骤,路由八;而若比对结果不相符, 则告知邮件伺服器 (Mail Server) 70认证硬件 ICCID暗码错误, 认证矢 败, 失去通关登录的资格。 And if the authentication process of the first step is successful, the routing 5 will be triggered, and the process will be directed to the mail server (Mail Server) 70, and the mail server (Mail Server) 70 will first receive the ICCID password and IC on the IX card. Relying on the card authentication (Client Result), the user name (Username) entered by the user and the password (Password) typed in, at this time the mail server (Mai 1 Server) 70 will first compare the user through its own database Name (Username) and password (Password) are correct, and check whether the valid period of use of the user has expired, if the comparison is correct, then touch the route 6 to carry out the authentication process, and pass the ICCID password and IC card authentication (Client Result) is sent back to the CA identity authentication server for cross-comparison, first decrypt the value of the ICCID password through a special process, and use it to compare the CA identity authentication database, find the corresponding ICCID password and pass the authorization (Validate 2 Y) After verifying the success of the authentication hardware authentication (Server Result), compare whether the authentication hardware authentication success (Server Result) is consistent with the IC card authentication (Client Result), if they match, the second step of authentication is passed, and the routing is triggered 7. If the user is determined to be a legal user by crossing the pair, he can pass the login portal with legal use authority, legally send and receive mail through the mail server (Mail Server) 70 and perform the action of accessing mail data, and the CA The Server Result encrypted and decrypted on the identity authentication server is cleared, this is the last step, route 8; and if the comparison result does not match, the mail server (Mail Server) will be notified 70 The authentication hardware ICCID password is wrong, the authentication will fail, lost Qualifications for customs clearance and login.

图 4为本发明利用一 IC卡内置一身份核对暗码 ICCID及一国际核对- 暗码 GLN, 并将此 IC卡装置于一般相容的电脑 USB介面或 PS2插槽也或 是具有无线通讯、红外线传输等等的硬件上, 当做认证硬件的实施例图, 由图中实施例 A小图可清楚看出,本发明的 IC卡也可装置于键盘化(Ke Board) 之上, 而进行硬件控管使用权限的用途, 而 IC卡内嵌程序会在 电脑桌面上显示一个键盘 (Key Board)被锁定的画面, 在使用者通过相同 的电脑使用时, 在进入作业系统后, 便无法触动键盘, 唯有当使用者点 触键盘(Key Board)锁定画面, 才会跳出一个解锁讯息供使用者输入解锁 密码, 若使用者无使用权限, 则无法使用电脑;而实施例 B小图, 为本发 明的 IC卡装置于滑鼠之上, 同样的, 也可进行滑鼠硬件控管使用权限的 用途, 再者如实施例 C小图, 本发明的 IC卡装置于游戏摇杆上, 实施例 D小图, 本发明的 IC卡装置于 Web Cam (网络摄影机)上, 都可进行周边 硬件控管使用权限的用途通过本发明实施例的应用, 更可做到安全防护 机制全面扩充至极点。 Fig. 4 is that the present invention utilizes an IC card with a built-in identity verification password ICCID and an international verification-password GLN, and installs the IC card in a generally compatible computer USB interface or PS2 slot or has wireless communication and infrared transmission On other hardware, as an embodiment diagram of the authentication hardware, it can be clearly seen from the small diagram of Embodiment A in the figure that the IC card of the present invention can also be installed on the keyboard (Ke Board) to perform hardware control The purpose of using the authorization, and the IC card embedded program will display a locked keyboard (Key Board) screen on the computer desktop. When the user uses the same computer, after entering the operating system, the keyboard cannot be touched. Only when the user touches the keyboard (Key Board) to lock the screen, an unlock message will pop up for the user to input to unlock Password, if the user does not have access rights, the computer cannot be used; and the small picture of embodiment B is that the IC card of the present invention is installed on the mouse, and similarly, the mouse hardware can also be used to control the access rights. Furthermore, as in the small picture of embodiment C, the IC card of the present invention is installed on the joystick, and in the small picture of embodiment D, the IC card of the present invention is installed on a Web Cam (network camera), both of which can be used for peripheral hardware control The usage of the authority can fully expand the security protection mechanism to the extreme through the application of the embodiment of the present invention.

再如图 5所示, 为本发明搭配的 IC卡装置于 PCMCIA介面装置的整 合应用实施例图, 通过此实施例, 更可让本发明的应用更具亲合性与广 泛实施性。 As shown in FIG. 5, it is a diagram of an integrated application embodiment of the IC card device matched with the PCMCIA interface device of the present invention. Through this embodiment, the application of the present invention can be more compatible and widely implemented.

更如图 6所示, 本发明装置于快闪存储器的整合应用实施例图, 本 发明搭配 IC卡装置于快闪存储器上,不会使得资料只能存放于固定的硬 盘中, 使之更具有资料存取的保密性、 安全性及机动性, 带来更方便的 需求与方便性。 As shown in Figure 6, the embodiment diagram of the integrated application of the device on the flash memory of the present invention, the present invention is equipped with an IC card on the flash memory, so that the data can only be stored in a fixed hard disk, making it more efficient. The confidentiality, security and mobility of data access bring more convenient needs and convenience.

另如图 7则是本发明搭配的 IC卡装置于快闪存储器插置于电脑主机 外壳的示意图, 将利用搭配本发明的 USB介面的认证硬件插入电脑主机 外壳的 USB插槽中, 便可进行前述所有步骤。 Another figure 7 is a schematic diagram of the matching IC card device of the present invention inserted into the shell of the computer mainframe in the flash memory, inserting the authentication hardware matching the USB interface of the present invention into the USB slot of the shell of the computer mainframe, and then the All the previous steps.

综上所述, 本发明所提供的邮件伺服器 (Mail Server)登入安全认证 系统与方法, 能取代现有的邮件伺服器 (Mail Server)登入模式, 其是利 用了一 IC卡内置一身份核对暗码 ICCID及一国际核对暗码 GLN, 并将此 IC卡装置于一般相容于电脑 USB介面或 PS2插槽也或是具有无线通讯、 红外线传输的硬件上, 当做认证硬件, 在使用者利用此认证硬件做登录 动作时, 经由数道加解密和目的端及认证端伺服器的交叉比对系统。 可 有效确认使用者的合法性; 再者,利用本发明所采用的搭酉 ΰ IC卡的认证 硬件的另一附加价值是如同个人的私钥, 具有高防护性及高安全性的优 越功能, 具应用层面广泛及高安全性特点, 且为前所未有的设计, 确实 已符合发明专利的申请要件, 恳请当局详加审査, 并惠赐准予专利, 以 嘉惠民生利国利民, 实感德便。 In summary, the mail server (Mail Server) login security authentication system and method provided by the present invention can replace the existing mail server (Mail Server) login mode, which utilizes an IC card with a built-in identity check The password ICCID and an international verification password GLN, and the IC card is generally compatible with the computer USB interface or PS2 slot, or hardware with wireless communication and infrared transmission, as authentication hardware, when the user uses this authentication When the hardware performs the login action, it goes through several encryption and decryption processes and a cross-comparison system between the destination and authentication server. Can effectively confirm the legitimacy of the user; Moreover, another added value of the authentication hardware using the IC card used in the present invention is that it is like a personal private key, which has the superior function of high protection and high security. It has the characteristics of wide application and high safety, and it is an unprecedented design. It has indeed met the requirements for the application of invention patents. I urge the authorities to review it carefully and grant the patent to benefit the people and the country. I really appreciate it. convenient.

然而, 以上所叙述的技术、 图说、 程序或控制等方法, 仅仅是本发 明较佳实施例之一而已; 举凡依本发明申请专利范围的技术所作的均等 变化或修饰或撷取部分功能的雷同制作, 皆应仍属本发明专利权所涵盖 的范围; 当不能依此限定本发明实施的范围。 However, the techniques, diagrams, programs or control methods described above are only one of the preferred embodiments of the present invention; Changes, modifications, or identical productions of partial functions should still fall within the scope covered by the patent right of the present invention; however, the scope of implementation of the present invention cannot be limited accordingly.

Claims (10)

  1. Claims
    1st, a kind of mail servo accessing safety authentication method, it is characterised in that:The IC-card for being built-in with the international check code GLN of an identification checkup private mark ICCID and one is inserted in an IC-card reading device, and is installed on and is typically compatible on the hardware of computer as certification hardware, the method includes the steps of:Step a:User logins the information logged in needed for mail server, input user using the certification hardware of the IC-card of device one and an IC-card reading device, and by login button;
    Step b:Its login process is directed at CA authentication servomechanisms using IC-card embedded program, and the ICCID private marks built in IC-card are reached into CA authentication servomechanisms, by the special program of CA authentication servomechanisms come the IC-card for judging certification hardware it is whether legal and examination & verification authority, it is correct then record it in CA authentication servomechanism data bank and login number of times, produce a certification hardware identification successfully to rely on, and return random tongue L numerical value produced in decoding process to ic cards;
    Step c:After abovementioned steps are correct, the random random number value of acquirement is used for decoding built-in ICCID private marks by IC-card using IC-card embedded program, and produce relying on for an IC-card certification, and its login process is directed at mail server, and rely on ICCID private marks, IC-card certification, user's input information reaches mail server in the lump, allows mail server to judge whether the information of user's input is correct according to its data bank, and inquire about useful life;
    Step d:After abovementioned steps are correct, the ICCID private marks and relying on for IC card certifications that mail server ^ is received reach CA authentications servomechanism to decrypt the correctness of confirmation certification hardware and user's information again.
    2nd, the IC-card certification hardware of a kind of mail server sign on, secure authentication, it is characterised in that:The IC-card is built-in with the international check code GLN of an identification checkup private mark ICCID and one, and the IC-card is inserted in an IC-card reading device, and is installed on and is typically compatible on the hardware of computer, as certification hardware;The certification hardware of the device IC-card, can be the hardware of a USB interface.
    3rd, the IC-card certification hardware of mail server sign on, secure authentication as claimed in claim 2, it is characterised in that:The certification hardware of the device IC-card, can be the hardware of a PS2 slots.
    4th, the IC-card certification hardware of mail server sign on, secure authentication as claimed in claim 2, it is characterised in that:The certification hardware of the device IC-card, can be a hardware with wireless telecommunications.
    5th, the IC-card certification hardware of mail server sign on, secure authentication as claimed in claim 2, It is characterized in that:The certification hardware of the device IC-card, can be the hardware of an IEEE1394 interfaces.
    6th, the IC-card certification hardware of mail server sign on, secure authentication as claimed in claim 2, it is characterised in that:The certification hardware of the device IC-card, can be the hardware of an IR infrared ray interfaces.
    7th, the IC-card certification hardware of mail server sign on, secure authentication as claimed in claim 2, it is characterised in that:The certification hardware of the device IC-card, can be a flash memory.
    8th, the IC-card certification hardware of mail server sign on, secure authentication as claimed in claim 2, it is characterised in that:The certification hardware of the device IC-card, can be a PCMCIA interfare devices.
    9th, the IC-card certification hardware of mail server sign on, secure authentication as claimed in claim 2, it is characterised in that:The certification hardware of the device IC-card, can be a keyboard or a slide-mouse or a joystick.
    10th, the IC-card certification hardware of mail server sign on, secure authentication as claimed in claim 2, it is characterised in that:The certification hardware of the device IC-card, can be a Web Cam network cameras.
CN200380110622.XA 2003-10-29 2003-10-29 Mail server login security authentication method and IC card authentication hardware Pending CN1860729A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2003/000912 WO2005041480A1 (en) 2003-10-29 2003-10-29 A method of mail server landing security certification and ic card certification hardware

Publications (1)

Publication Number Publication Date
CN1860729A true CN1860729A (en) 2006-11-08

Family

ID=34468820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200380110622.XA Pending CN1860729A (en) 2003-10-29 2003-10-29 Mail server login security authentication method and IC card authentication hardware

Country Status (3)

Country Link
CN (1) CN1860729A (en)
AU (1) AU2003277472A1 (en)
WO (1) WO2005041480A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2214911C (en) * 1996-09-11 2001-12-25 Nippon Telegraph And Telephone Corporation Contents transmission control method with user authentication functions and recording medium with the method recorded thereon
KR100213188B1 (en) * 1996-10-05 1999-08-02 윤종용 Apparatus and method for user authentication
JPH1115927A (en) * 1997-06-24 1999-01-22 Hitachi Ltd IC card system
CN1141653C (en) * 2000-07-20 2004-03-10 成都久力信息技术有限公司 Computer applycation layer network safety control and management system and relative program method thereof
CN2489384Y (en) * 2001-07-31 2002-05-01 台均实业有限公司 Computer keyboard with card reader

Also Published As

Publication number Publication date
AU2003277472A1 (en) 2005-05-11
WO2005041480A1 (en) 2005-05-06

Similar Documents

Publication Publication Date Title
JP6606156B2 (en) Data security service
US6138239A (en) Method and system for authenticating and utilizing secure resources in a computer system
US7613919B2 (en) Single-use password authentication
US7100048B1 (en) Encrypted internet and intranet communication device
CN101192926B (en) Account protection method and system
CA2491628A1 (en) Biometric private key infrastructure
AU2753402A (en) Methods and arrangements for protecting information in forwarded authentication messages
US7076062B1 (en) Methods and arrangements for using a signature generating device for encryption-based authentication
CN110650021A (en) Authentication terminal network real-name authentication method and system
US20050066199A1 (en) Identification process of application of data storage and identification hardware with IC card
US20150121504A1 (en) Identification process of application of data storage and identification hardware with ic card
TWI328956B (en)
US20100058453A1 (en) Identification process of application of data storage and identification hardware with ic card
Kent Evaluating certification authority security
CN112347440A (en) User access authority separate-setting system of industrial control equipment and use method thereof
CN100477594C (en) Internet clearance safety authentication method
US20050066161A1 (en) Mail sever security login identification system and method with IC card identification hardware device
CN100469012C (en) Data storage application authentication method
JP2006074487A (en) Authentication management method and authentication management system
CN1860729A (en) Mail server login security authentication method and IC card authentication hardware
Nagar et al. A secure authenticate framework for cloud computing environment
CN1612149A (en) Mail server login security authentication method and IC card authentication hardware
CN1612117A (en) Security Authentication Method for Internet Customs Clearance and IC Card Authentication Hardware
TW200539045A (en) Data storage application, IC card, fingerprint scanner authentication hardware and process flow method
WO2006039832A1 (en) Authentication method for storage and application of data, ic card, fingerprint scanner

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication