TW201828131A - Method and device for registering and authenticating information comprising an authenticating server - Google Patents
Method and device for registering and authenticating information comprising an authenticating server Download PDFInfo
- Publication number
- TW201828131A TW201828131A TW106101953A TW106101953A TW201828131A TW 201828131 A TW201828131 A TW 201828131A TW 106101953 A TW106101953 A TW 106101953A TW 106101953 A TW106101953 A TW 106101953A TW 201828131 A TW201828131 A TW 201828131A
- Authority
- TW
- Taiwan
- Prior art keywords
- information
- authentication
- authenticated
- standard
- identity
- Prior art date
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本申請公開了一種資訊註冊、認證方法及裝置,所述註冊方法包括:向認證伺服器發送標準資訊註冊請求,接收認證伺服器回饋的第一認證資訊,生成標準資訊獲取請求,將標準資訊獲取請求和第一認證資訊發送至安全資訊應用,獲取安全資訊應用在對所述第一認證資訊認證通過後返回的簽名後的標準資訊以及標準資訊的身份標識,其中,所述簽名後的標準資訊是所述安全資訊應用使用第二認證資訊進行簽名的,將簽名後的標準資訊、所述標準資訊的身份標識以及所述第一認證資訊發送給所述認證伺服器,以使得所述認證伺服器在對所述第一認證資訊認證通過,且根據簽名後的標準資訊對第二認證資訊認證通過後,將所述標準資訊和所述標準資訊的身份標識進行註冊。 The present application discloses an information registration and authentication method and device. The registration method includes: sending a standard information registration request to an authentication server, receiving a first authentication information fed back by an authentication server, generating a standard information acquisition request, and acquiring standard information. The request and the first authentication information are sent to the security information application, and the obtained standard information of the signature returned by the security information application after the first authentication information is verified and the identity information of the standard information, wherein the signed standard information is obtained The security information application is signed by using the second authentication information, and the signed standard information, the identity information of the standard information, and the first authentication information are sent to the authentication server, so that the authentication server is After the first authentication information is authenticated and passed, and the second authentication information is authenticated according to the signed standard information, the device registers the standard information and the identity information of the standard information.
Description
本申請係關於電腦技術領域,尤其關於一種資訊註冊、認證方法及裝置。 This application relates to the field of computer technology, and more particularly to an information registration and authentication method and apparatus.
隨著資訊技術的發展,用戶可透過終端(如手機、平板電腦等)中安裝的服務提供者(如:軟體發展商、網站等)的應用程式(以下簡稱業務應用),便捷地獲取各類業務服務。對於業務應用中所提供的業務服務而言,某些類別的業務服務具有較高的安全級別,比如:支付業務、轉帳業務等等。安全級別較高的業務服務往往需要用戶提供相應的安全資訊(如:密碼、生物特徵資訊等),並針對用戶提供的安全資訊進行認證後,方可完成業務服務。 With the development of information technology, users can easily access various types of applications (such as software developers, websites, etc.) installed in terminals (such as mobile phones, tablets, etc.). Business services. For business services provided in business applications, certain categories of business services have a higher level of security, such as payment services, transfer services, and so on. Business services with higher security levels often require users to provide corresponding security information (such as passwords, biometric information, etc.) and authenticate the security information provided by users before completing business services.
對於上述需要用戶提供安全資訊的業務服務而言,通常會在用戶第一次使用該業務服務前,獲取用戶的安全資訊作為標準資訊(標準資訊將作為後續認證過程的認證標準),以便與後續用戶輸入的安全資訊進行比對。在獲取用戶的安全資訊的過程中,業務應用需要透過終端內的安全資訊應用(如:生物資訊管理應用,負責採集、儲存用 戶輸入的生物特徵資訊,該生物資訊管理應用由終端製造商安裝於該終端中)獲取用戶的安全資訊。 For the above-mentioned business services that require users to provide security information, the user's security information is usually obtained as standard information (the standard information will be used as the certification standard for the subsequent authentication process) before the user first uses the service service, so as to follow up. The security information entered by the user is compared. In the process of obtaining the user's security information, the business application needs to use the security information application in the terminal (for example, the bio-information management application, which is responsible for collecting and storing the biometric information input by the user, and the bio-information management application is installed by the terminal manufacturer. In the terminal, the security information of the user is obtained.
為了使得業務應用和安全資訊應用之間進行調用、資訊傳輸時更加便捷,現有技術中,終端系統(如:Android M系統)將安全資訊應用運行在一種稱為富可執行環境(Rich Execution Environment,REE)的架構中。REE具備了豐富的調用支援,使得運行在REE中的安全資訊應用可更加便捷地被不同的業務應用調用,也可以更加便捷的傳輸各業務應用所需的資訊。 In order to make the call between the business application and the security information application and the information transmission more convenient, in the prior art, the terminal system (such as the Android M system) runs the security information application in a Rich Execution Environment (Rich Execution Environment, REE) in the architecture. REE has a rich call support, making the security information application running in REE more easily called by different business applications, and more convenient to transfer the information required by each business application.
但是,REE並不屬於安全環境,在安全資訊應用與業務應用進行資訊傳輸的過程中,安全資訊容易被非法操作者在傳輸途中截取並進行篡改。尤其對於標準資訊而言,由於服務提供者在此之前並未保存過用戶提供的標準資訊,也就無法識別標準資訊的真偽,一旦標準資訊在傳輸過程中被篡改,那麼,服務提供者仍會接收被篡改後的標準資訊,並作為後續認證過程中的認證標準,顯然,這將導致非法操作者以用戶的名義獲得各類業務服務。 However, REE is not a secure environment. In the process of transmitting information between security information applications and business applications, security information is easily intercepted and tampered with by illegal operators during transmission. Especially for standard information, since the service provider has not saved the standard information provided by the user before, the authenticity of the standard information cannot be recognized. Once the standard information is tampered with during the transmission, the service provider still It will receive the falsified standard information and serve as the certification standard in the subsequent certification process. Obviously, this will result in illegal operators obtaining various business services in the name of the user.
本申請實施例提供一種資訊註冊、認證方法及裝置,用以解決現有技術中使用安全資訊進行註冊時安全性較低的問題。 The embodiment of the present application provides a method and device for registering and authenticating information, which is used to solve the problem of low security when registering using security information in the prior art.
本申請實施例提供的一種資訊註冊方法,包括:向認證伺服器發送標準資訊註冊請求; 接收所述認證伺服器回饋的第一認證資訊;生成標準資訊獲取請求,將所述標準資訊獲取請求和所述第一認證資訊發送至安全資訊應用,獲取所述安全資訊應用在對所述第一認證資訊認證通過後返回的簽名後的標準資訊以及所述標準資訊的身份標識,其中,所述簽名後的標準資訊是所述安全資訊應用使用第二認證資訊進行簽名的;將簽名後的標準資訊、所述標準資訊的身份標識以及所述第一認證資訊發送給所述認證伺服器,以使得所述認證伺服器在對所述第一認證資訊認證通過,且根據簽名後的標準資訊對第二認證資訊認證通過後,將所述標準資訊和所述標準資訊的身份標識進行註冊。 An information registration method provided by the embodiment of the present application includes: sending a standard information registration request to an authentication server; receiving first authentication information fed back by the authentication server; generating a standard information acquisition request, and acquiring the standard information acquisition request and Sending the first authentication information to the security information application, acquiring the signed standard information returned by the security information after the first authentication information is authenticated, and the identity identifier of the standard information, where the signature The subsequent standard information is that the security information application uses the second authentication information for signing; the signed standard information, the identity information of the standard information, and the first authentication information are sent to the authentication server, so that After the authentication server authenticates the first authentication information and authenticates the second authentication information according to the signed standard information, the authentication server registers the standard information and the identity information of the standard information.
本申請實施例還提供的一種資訊註冊方法,包括:接收業務應用發送的第一認證資訊和標準資訊獲取請求;對所述第一認證資訊進行認證,並在認證通過後,將使用第二認證資訊進行簽名後的標準資訊,以及所述標準資訊的身份標識返回給所述業務應用,使所述業務應用將簽名後的標準資訊以及所述標準資訊的身份標識發送給認證伺服器,以使得所述認證伺服器在對所述第一認證資訊認證通過,且根據簽名後的標準資訊對第二認證資訊認證通過後,將所述標準資訊和所述標準資訊的身份標識進行註冊。 An information registration method is further provided by the embodiment of the present application, comprising: receiving a first authentication information and a standard information obtaining request sent by a service application; authenticating the first authentication information, and using the second authentication after the authentication is passed The standard information after the information is signed, and the identity of the standard information is returned to the service application, so that the service application sends the signed standard information and the identity information of the standard information to the authentication server, so that After the authentication server authenticates the first authentication information and authenticates the second authentication information according to the signed standard information, the authentication server registers the standard information and the identity information of the standard information.
本申請實施例還提供的一種資訊註冊方法,包括: 認證伺服器接收業務應用發送的標準資訊註冊請求;根據所述標準資訊註冊請求,生成第一認證資訊並回饋給所述業務應用;接收所述業務應用發送的簽名後的標準資訊、所述標準資訊的身份標識以及所述第一認證資訊;其中,所述簽名後的標準資訊是安全資訊應用使用第二認證資訊進行簽名,並發送給所述業務應用的;對所述第一認證資訊進行認證,並根據簽名後的標準資訊對所述第二認證資訊進行認證;在對所述第一認證資訊和所述第二認證資訊認證均通過後,將所述標準資訊以及所述標準資訊的身份標識進行註冊。 An information registration method is further provided by the embodiment of the present application, comprising: the authentication server receiving a standard information registration request sent by the service application; generating the first authentication information according to the standard information registration request, and feeding back to the service application; Decoding the signed standard information sent by the service application, the identity identifier of the standard information, and the first authentication information; wherein the signed standard information is that the security information application uses the second authentication information to sign and send to Applying the first authentication information to the first authentication information, and authenticating the second authentication information according to the signed standard information; and authenticating the first authentication information and the second authentication information After passing, the standard information and the identity of the standard information are registered.
本申請實施例還提供的一種資訊認證方法,包括:向認證伺服器發送針對待認證資訊的校驗請求;接收所述認證伺服器回饋的第一認證資訊;生成待認證資訊獲取請求,將所述待認證資訊獲取請求和所述第一認證資訊發送至安全資訊應用,獲取所述安全資訊應用在對所述第一認證資訊認證通過後返回的待認證資訊以及所述待認證資訊的待認證身份標識;將所述待認證資訊、所述待認證身份標識以及所述第一認證資訊發送給所述認證伺服器,以使得所述認證伺服器對所述第一認證資訊、所述待認證身份標識以及待認證資訊進行認證,生成認證結果回饋給所述業務應用。 An information authentication method is provided by the embodiment of the present application, including: sending a verification request for the information to be authenticated to the authentication server; receiving the first authentication information that is sent back by the authentication server; and generating a request for obtaining the information to be authenticated, And the first authentication information is sent to the security information application, and the to-be-authenticated information returned by the security information application after the first authentication information is authenticated and the information to be authenticated are to be authenticated. Sending the information to be authenticated, the identity to be authenticated, and the first authentication information to the authentication server, so that the authentication server is to the first authentication information, the to-be-authenticated The identity identifier and the information to be authenticated are authenticated, and the authentication result is generated and fed back to the service application.
本申請實施例還提供的一種資訊認證方法,包括: 接收業務應用發送的、攜帶有第一認證資訊的待認證資訊獲取請求;對所述第一認證資訊進行認證,並在認證通過後,將待認證資訊以及所述待認證資訊的身份標識透過所述業務應用發送至認證伺服器,以使得所述認證伺服器對所述第一認證資訊、所述待認證身份標識以及待認證資訊進行認證,生成認證結果回饋給所述業務應用。 An information authentication method provided by the embodiment of the present application includes: receiving a to-be-authenticated information acquisition request sent by a service application and carrying the first authentication information; authenticating the first authentication information, and after the authentication is passed, The information to be authenticated and the identity of the information to be authenticated are sent to the authentication server through the service application, so that the authentication server authenticates the first authentication information, the identity to be authenticated, and the information to be authenticated. And generating an authentication result and feeding back to the business application.
本申請實施例還提供的一種資訊認證方法,包括:認證伺服器接收業務應用發送的針對待認證資訊的校驗請求;根據所述校驗請求,生成第一認證資訊並回饋給所述業務應用;接收所述業務應用發送的待認證資訊、所述待認證資訊的待認證身份標識以及所述第一認證資訊;分別對所述第一認證資訊、所述待認證身份標識以及所述待認證資訊進行認證,生成認證結果回饋給所述業務應用。 The information authentication method is further provided by the embodiment of the present application, comprising: the authentication server receiving the verification request for the information to be authenticated sent by the service application; generating the first authentication information according to the verification request, and feeding back to the service application Receiving the information to be authenticated sent by the service application, the identity to be authenticated, and the first authentication information; the first authentication information, the identity to be authenticated, and the to-be-authenticated The information is authenticated, and the authentication result is generated and fed back to the business application.
本申請實施例還提供的一種資訊註冊裝置,包括:註冊請求模組,用於向認證伺服器發送標準資訊註冊請求;接收模組,用於接收所述認證伺服器回饋的第一認證資訊;獲取模組,用於生成標準資訊獲取請求,將所述標準資訊獲取請求和所述第一認證資訊發送至安全資訊應用, 獲取所述安全資訊應用在對所述第一認證資訊認證通過後返回的簽名後的標準資訊以及所述標準資訊的身份標識,其中,所述簽名後的標準資訊是所述安全資訊應用使用第二認證資訊進行簽名的;發送模組,用於將簽名後的標準資訊、所述標準資訊的身份標識以及所述第一認證資訊發送給所述認證伺服器,以使得所述認證伺服器在對所述第一認證資訊認證通過,且根據簽名後的標準資訊對第二認證資訊認證通過後,將所述標準資訊和所述標準資訊的身份標識進行註冊。 The information registration device of the present application further includes: a registration requesting module, configured to send a standard information registration request to the authentication server; and a receiving module, configured to receive the first authentication information that is sent back by the authentication server; The obtaining module is configured to generate a standard information obtaining request, and send the standard information obtaining request and the first authentication information to the security information application, where the security information application is returned after the first authentication information is authenticated The signed standard information and the identity of the standard information, wherein the signed standard information is that the security information application uses the second authentication information for signing; the sending module is used for the signed standard The information, the identity identifier of the standard information, and the first authentication information are sent to the authentication server, so that the authentication server authenticates the first authentication information, and according to the signed standard information pair After the second authentication information is authenticated, the standard information and the identity of the standard information are registered.
本申請實施例還提供的一種資訊註冊裝置,包括:接收模組,用於接收業務應用發送的第一認證資訊和標準資訊獲取請求;簽名模組,用於對所述第一認證資訊進行認證,並在認證通過後,將使用第二認證資訊進行簽名後的標準資訊,以及所述標準資訊的身份標識返回給所述業務應用,使所述業務應用將簽名後的標準資訊以及所述標準資訊的身份標識發送給認證伺服器,以使得所述認證伺服器在對所述第一認證資訊認證通過,且根據簽名後的標準資訊對第二認證資訊認證通過後,將所述標準資訊和所述標準資訊的身份標識進行註冊。 The information registration device of the present application further includes: a receiving module, configured to receive a first authentication information and a standard information obtaining request sent by the service application; and a signature module, configured to authenticate the first authentication information And after the authentication is passed, the standard information that is signed using the second authentication information, and the identity of the standard information are returned to the business application, so that the business application applies the signed standard information and the standard. The identity of the information is sent to the authentication server, so that the authentication server authenticates the first authentication information, and after the second authentication information is authenticated according to the signed standard information, the standard information is The identity of the standard information is registered.
本申請實施例還提供的一種資訊註冊裝置,包括:註冊請求接收模組,用於接收業務應用發送的標準資訊註冊請求; 回饋模組,用於根據所述標準資訊註冊請求,生成第一認證資訊並回饋給所述業務應用;註冊資訊接收模組,用於接收所述業務應用發送的簽名後的標準資訊、所述標準資訊的身份標識以及所述第一認證資訊;其中,所述簽名後的標準資訊是安全資訊應用使用第二認證資訊進行簽名,並發送給所述業務應用的;認證模組,用於對所述第一認證資訊進行認證,並根據簽名後的標準資訊對所述第二認證資訊進行認證;註冊模組,用於在對所述第一認證資訊和所述第二認證資訊認證均通過後,將所述標準資訊以及所述標準資訊的身份標識進行註冊。 An information registration device is further provided by the embodiment of the present application, comprising: a registration request receiving module, configured to receive a standard information registration request sent by a service application; and a feedback module, configured to generate a first authentication according to the standard information registration request The information is fed back to the service application; the registration information receiving module is configured to receive the signed standard information sent by the service application, the identity identifier of the standard information, and the first authentication information; wherein the signature The standard information is that the security information application uses the second authentication information for signature and is sent to the service application; the authentication module is configured to authenticate the first authentication information, and according to the signed standard information The second authentication information is used for authentication; the registration module is configured to register the standard information and the identity information of the standard information after the first authentication information and the second authentication information are authenticated.
本申請實施例還提供的一種資訊認證裝置,包括:註冊請求模組,用於向認證伺服器發送針對待認證資訊的校驗請求;接收模組,用於接收所述認證伺服器回饋的第一認證資訊;獲取模組,用於生成待認證資訊獲取請求,將所述待認證資訊獲取請求和所述第一認證資訊發送至安全資訊應用,獲取所述安全資訊應用在對所述第一認證資訊認證通過後返回的待認證資訊以及所述待認證資訊的待認證身份標識;發送模組,用於將所述待認證資訊、所述待認證身份標識以及所述第一認證資訊發送給所述認證伺服器,以使得所述認證伺服器對所述第一認證資訊、所述待認證身份 標識以及待認證資訊進行認證,生成認證結果回饋給所述業務應用。 The information authentication device is further provided by the embodiment of the present application, comprising: a registration request module, configured to send a verification request for the information to be authenticated to the authentication server; and a receiving module, configured to receive the authentication server feedback An authentication information; an obtaining module, configured to generate a to-be-certified information acquisition request, and send the to-be-authenticated information acquisition request and the first authentication information to a security information application, and obtain the security information application in the first a to-be-authenticated information that is returned after the authentication information is authenticated and the identity to be authenticated, and a sending module, configured to send the information to be authenticated, the identity to be authenticated, and the first authentication information to The authentication server is configured to enable the authentication server to authenticate the first authentication information, the identity to be authenticated, and the information to be authenticated, and generate an authentication result to be returned to the service application.
本申請實施例還提供的一種資訊認證裝置,包括:接收模組,用於接收業務應用發送的、攜帶有第一認證資訊的待認證資訊獲取請求;簽名模組,用於對所述第一認證資訊進行認證,並在認證通過後,將待認證資訊以及所述待認證資訊的身份標識透過所述業務應用發送至認證伺服器,以使得所述認證伺服器對所述第一認證資訊、所述待認證身份標識以及待認證資訊進行認證,生成認證結果回饋給所述業務應用。 An information authentication apparatus is further provided by the embodiment of the present application, comprising: a receiving module, configured to receive a to-be-authenticated information acquisition request sent by a service application and carrying a first authentication information; and a signature module, configured to use the first The authentication information is authenticated, and after the authentication is passed, the information to be authenticated and the identity of the information to be authenticated are sent to the authentication server through the service application, so that the authentication server is configured to the first authentication information, The identity to be authenticated and the information to be authenticated are authenticated, and the authentication result is generated and fed back to the service application.
本申請實施例還提供的一種資訊認證裝置,包括:認證請求接收模組,用於接收業務應用發送的針對待認證資訊的校驗請求;回饋模組,用於根據所述校驗請求,生成第一認證資訊並回饋給所述業務應用;認證資訊接收模組,用於接收所述業務應用發送的待認證資訊、所述待認證資訊的待認證身份標識以及所述第一認證資訊;認證模組,用於分別對所述第一認證資訊、所述待認證身份標識以及所述待認證資訊進行認證,生成認證結果回饋給所述業務應用。 The information authentication device of the present application further includes: an authentication request receiving module, configured to receive a verification request for the information to be authenticated sent by the service application; and a feedback module, configured to generate, according to the verification request, The first authentication information is fed back to the service application; the authentication information receiving module is configured to receive the information to be authenticated sent by the service application, the identity to be authenticated to be authenticated, and the first authentication information; And a module, configured to respectively authenticate the first authentication information, the to-be-authenticated identity, and the information to be authenticated, and generate an authentication result to be returned to the service application.
本申請實施例提供一種資訊註冊、認證方法及裝置,當用戶在使用業務服務需要註冊標準資訊時,業務應用會向認證伺服器發起標準資訊註冊請求,並接收認證伺服器 所回饋的第一認證資訊,之後,業務應用會生成標準資訊獲取請求和第一認證資訊一併發送給安全資訊應用,在安全資訊應用針對第一認證資訊進行認證通過後,會使用自身的第二認證資訊對標準資訊進行簽名,並確定出該標準資訊的身份標識,再將簽名後的標準資訊及該標準資訊的身份標識回饋給業務應用,從而,業務應用會將安全資訊應用所回饋的,以及第一認證資訊發送給認證伺服器,以便認證伺服器進行認證後,將標準資訊及其身份標識進行註冊。從上述方式中可見,第一認證資訊作為認證伺服器的一種標識,可以使得安全資訊應用確定出標準資訊註冊者的身份;返回認證伺服器的第一認證資訊,使得認證伺服器可以確定出資訊在傳輸途中是否被篡改,而返回認證伺服器的簽名後的標準資訊,使得認證伺服器可以確定出標準資訊是否由終端內的安全資訊應用所提供,這樣的方式可以有效保障認證伺服器可以準確地識別出在傳輸途中被篡改後的標準資訊,有效提升了在註冊標準資訊時的安全性。 The embodiment of the present application provides an information registration and authentication method and device. When a user needs to register standard information when using a service service, the service application initiates a standard information registration request to the authentication server, and receives the first authentication fed back by the authentication server. After the information is generated, the business application generates a standard information acquisition request and the first authentication information and sends it to the security information application. After the security information application passes the authentication for the first authentication information, the second information is used for the standard information. Signing and determining the identity of the standard information, and then returning the signed standard information and the identity of the standard information to the business application, so that the business application will feedback the security information application, and the first authentication information After being sent to the authentication server, the authentication server is authenticated and the standard information and its identity are registered. As can be seen from the foregoing manner, the first authentication information is used as an identifier of the authentication server, so that the security information application determines the identity of the standard information registrant; and returns the first authentication information of the authentication server, so that the authentication server can determine the information. Whether or not it is tampered with during transmission, and returns the signed standard information of the authentication server, so that the authentication server can determine whether the standard information is provided by the security information application in the terminal, which can effectively ensure that the authentication server can be accurate. It identifies the standard information that has been tampered with during transmission, effectively improving the security when registering standard information.
901‧‧‧註冊請求模組 901‧‧‧Registration Request Module
902‧‧‧接收模組 902‧‧‧ receiving module
903‧‧‧獲取模組 903‧‧‧Getting module
904‧‧‧發送模組 904‧‧‧Transmission module
1001‧‧‧接收模組 1001‧‧‧ receiving module
1002‧‧‧簽名模組 1002‧‧‧Signature Module
1101‧‧‧註冊請求接收模組 1101‧‧‧Registration Request Receiver Module
1102‧‧‧回饋模組 1102‧‧‧Reward module
1103‧‧‧註冊資訊接收模組 1103‧‧‧Registered Information Receiver Module
1104‧‧‧認證模組 1104‧‧‧Certificate Module
1105‧‧‧註冊模組 1105‧‧‧ Registration Module
1201‧‧‧認證請求模組 1201‧‧‧Certification Request Module
1202‧‧‧接收模組 1202‧‧‧ receiving module
1203‧‧‧獲取模組 1203‧‧‧Get Module
1204‧‧‧發送模組 1204‧‧‧Transmission module
1301‧‧‧接收模組 1301‧‧‧ receiving module
1302‧‧‧簽名模組 1302‧‧‧Signature Module
1401‧‧‧認證請求接收模組 1401‧‧‧Certificate Request Receiver Module
1402‧‧‧回饋模組 1402‧‧‧Feedback Module
1403‧‧‧認證資訊接收模組 1403‧‧‧Certified Information Receiving Module
1404‧‧‧認證模組 1404‧‧‧Certificate Module
此處所說明的附圖用來提供對本申請的進一步理解,構成本申請的一部分,本申請的示意性實施例及其說明用於解釋本申請,並不構成對本申請的不當限定。在附圖中:圖1至圖3為本申請實施例提供的資訊註冊過程; 圖4為本申請實施例提供的在實際應用場景下的資訊註冊過程;圖5至圖7為本申請實施例提供的資訊認證過程;圖8為本申請實施例提供的在實際應用場景下的資訊認證過程;圖9至圖11為本申請實施例提供的資訊註冊裝置結構示意圖;圖12至圖14為本申請實施例提供的資訊認證裝置結構示意圖。 The drawings described herein are intended to provide a further understanding of the present application, and are intended to be a part of this application. In the drawings: FIG. 1 to FIG. 3 are the information registration process provided by the embodiment of the present application; FIG. 4 is a process of information registration in an actual application scenario according to an embodiment of the present application; FIG. The information authentication process is provided in the embodiment of the present application; FIG. 9 is a schematic structural diagram of the information registration device provided in the embodiment of the present application; FIG. 9 to FIG. A schematic diagram of the structure of the information authentication apparatus provided by the application embodiment.
為使本申請的目的、技術方案和優點更加清楚,下面將結合本申請具體實施例及相應的附圖對本申請技術方案進行清楚、完整地描述。顯然,所描述的實施例僅是本申請一部分實施例,而不是全部的實施例。基於本申請中的實施例,本領域普通技術人員在沒有做出創造性勞動前提下所獲得的所有其他實施例,都屬於本申請保護的範圍。 The technical solutions of the present application will be clearly and completely described in the following with reference to the specific embodiments of the present application and the corresponding drawings. It is apparent that the described embodiments are only a part of the embodiments of the present application, and not all of them. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without departing from the inventive scope are the scope of the present application.
如前所述,當服務提供者第一次接收到標準資訊時,由於之前並未儲存過與該標準資訊相關的安全資訊,所以,也就無法準確地確定出該標準資訊在傳輸過程中是否被篡改。而如果服務提供者與終端之間事先約定了一系列的認證資訊,並使用這些認證資訊對標準資訊進行認證,也就可以識別出標準資訊是否在傳輸過程中被篡改。正是基於此,本申請中提供了下述的資訊註冊和認證方法。 As mentioned above, when the service provider receives the standard information for the first time, since the security information related to the standard information has not been stored before, it is impossible to accurately determine whether the standard information is transmitted during the transmission. Was tampered with. If the service provider and the terminal have previously agreed on a series of authentication information and used the authentication information to authenticate the standard information, it is possible to identify whether the standard information has been tampered with during transmission. Based on this, the following information registration and authentication methods are provided in this application.
在本申請實施例中,提供了一種資訊註冊方法,如圖1所示,該方法包括如下步驟: In the embodiment of the present application, an information registration method is provided. As shown in FIG. 1 , the method includes the following steps:
S101:向認證伺服器發送標準資訊註冊請求。 S101: Send a standard information registration request to the authentication server.
在實際應用場景下,當用戶使用業務應用中提供的安全級別較高的業務服務(如:指紋支付業務)時,通常需要用戶提供相應的安全資訊(如:指紋資訊),尤其對於用戶第一次使用該業務服務的情況下,通常需要用戶輸入安全資訊作為標準資訊,用以對用戶後續使用該業務服務時輸入的安全資訊進行對比校驗。 In a practical application scenario, when a user uses a service service with a higher security level (such as a fingerprint payment service) provided by a service application, the user usually needs to provide corresponding security information (such as fingerprint information), especially for the user. In the case of using the service service, the user usually needs to input security information as standard information to compare and verify the security information input when the user subsequently uses the service service.
也就是說,在用戶第一使用該業務服務時,需要透過業務應用向相應的認證服務中註冊用戶提供的標準資訊。故在本申請實施例的上述步驟中,由運行在終端內的業務應用向認證伺服器發出標準資訊註冊請求。 That is to say, when the user first uses the service service, it is required to register the standard information provided by the user to the corresponding authentication service through the service application. Therefore, in the above steps of the embodiment of the present application, the standard application registration request is sent to the authentication server by the service application running in the terminal.
其中,本申請中所述的終端包括但不限於:手機、平板電腦、智慧手錶等移動終端,在一些場景中,也可以是電腦終端。所述的認證伺服器,可以是服務提供者後臺服務系統中用以進行安全認證的伺服器,也可以是專門用於進行安全認證的第三方伺服器。當然,這裡並不構成對本申請的限定。 The terminal described in the present application includes but is not limited to: a mobile terminal, a tablet computer, a smart watch, and the like, and in some scenarios, may also be a computer terminal. The authentication server may be a server for performing security authentication in a service provider background service system, or may be a third-party server dedicated to performing security authentication. Of course, this does not constitute a limitation on the present application.
S102:接收所述認證伺服器回饋的第一認證資訊。 S102: Receive first authentication information that is sent back by the authentication server.
所述的第一認證資訊,是由認證伺服器向發出標準資訊註冊請求的業務應用回饋的標識資訊,用以表明認證伺服器的身份。在本申請實施例的一種場景中,第一認證資訊可包括認證服務自身的證書。 The first authentication information is identification information that is returned by the authentication server to the service application that issues the standard information registration request, and is used to indicate the identity of the authentication server. In one scenario of the embodiment of the present application, the first authentication information may include a certificate of the authentication service itself.
S103:生成標準資訊獲取請求,將所述標準資訊獲取請求和所述第一認證資訊發送至安全資訊應用,獲取所述安全資訊應用在對所述第一認證資訊認證通過後返回的簽名後的標準資訊以及所述標準資訊的身份標識。 S103: Generate a standard information obtaining request, send the standard information obtaining request and the first authentication information to the security information application, and obtain the signature that the security information application returns after the first authentication information is authenticated and passed. Standard information and the identity of the standard information.
其中,所述簽名後的標準資訊是所述安全資訊應用使用第二認證資訊進行簽名的。 The standard information after the signature is that the security information application uses the second authentication information for signature.
當業務應用接收到了認證伺服器回饋的第一認證資訊後,就會生成標準資訊獲取請求,以請求終端內的安全資訊應用提供註冊所需的標準資訊。 After the service application receives the first authentication information fed back by the authentication server, a standard information acquisition request is generated to request the security information application in the terminal to provide the standard information required for registration.
需要說明的是,本申請中的安全資訊應用是運行在終端內的本地應用,用於向業務應用提供業務服務所需的安全資訊(包括標準資訊)。而安全資訊屬於用戶自身的關鍵資訊,為了防止有非法操作者向該安全資訊應用請求用戶的安全資訊,安全資訊應用將對標準資訊的用戶身份進行認證。基於此,當業務應用將標準資訊獲取請求發送至安全資訊應用時,還會將第一認證資訊也發送給安全資訊,從而,安全資訊應用將對第一認證資訊進行認證,以確定認證伺服器的身份。只有在安全資訊應用對第一認證資訊認證通過後,才會提供標準資訊。 It should be noted that the security information application in the present application is a local application running in the terminal, and is used to provide security information (including standard information) required for the business service to the business application. The security information belongs to the user's own key information. In order to prevent an illegal operator from requesting the user's security information from the security information application, the security information application will authenticate the user identity of the standard information. Based on this, when the business application sends the standard information acquisition request to the security information application, the first authentication information is also sent to the security information, so that the security information application will authenticate the first authentication information to determine the authentication server. identity of. Standard information will only be provided after the safety information application has passed the first certification information certification.
考慮到在實際應用中,由安全資訊應用所提供的標準資訊在傳輸的過程中可能被篡改,所以,在本申請中,安全資訊應用在回饋標準資訊之前,將對標準資訊進行簽名操作,用以表明該標準資訊是由該終端內的安全資訊應用所發送的。同時,也考慮到該標準資訊是用戶提供的,故 可以針對該標準資訊,確定該標準資訊的身份標識,用以表明該標準資訊是由用戶提供的。這樣一來,安全資訊應用向業務應用回饋的標準資訊,也就有了兩種標識:分別用來表明該標準資訊是由終端內的安全資訊應用發送的、且該標準資訊是由用戶提供的。 Considering that in actual applications, the standard information provided by the security information application may be tampered with during the transmission process, in this application, the security information application will sign the standard information before returning the standard information. To indicate that the standard information is sent by the security information application within the terminal. At the same time, it is also considered that the standard information is provided by the user, so the identity information of the standard information can be determined for the standard information to indicate that the standard information is provided by the user. In this way, the standard information that the security information application feeds back to the business application has two kinds of identifiers: respectively, it is used to indicate that the standard information is sent by the security information application in the terminal, and the standard information is provided by the user. .
具體而言,本申請中的安全資訊應用會使用第二認證資訊對該標準資訊進行簽名,用以表明該標準資訊是由該安全資訊應用所發送。當然,在本申請中,第二認證資訊可以是認證伺服器與終端內的安全資訊應用(或終端本身)之間預先約定的第二密鑰資訊,這裡並不做具體限定。標準資訊的身份標識也由該安全資訊應用確定,在本申請中,標準資訊的身份標識包括可以表明該標準資訊的身份密鑰資訊,該身份密鑰資訊通常與用戶的帳戶資訊相關聯。也就是說,一對身份密鑰資訊唯一對應一個帳戶資訊,這樣也就能夠表明該標準資訊屬於該用戶。當然,這裡也不做具體限定。 Specifically, the security information application in the present application uses the second authentication information to sign the standard information to indicate that the standard information is sent by the security information application. Of course, in the present application, the second authentication information may be the second key information pre-agreed between the authentication server and the security information application (or the terminal itself) in the terminal, which is not specifically limited herein. The identity of the standard information is also determined by the security information application. In the present application, the identity of the standard information includes identity key information indicating the standard information, and the identity key information is usually associated with the user's account information. That is to say, a pair of identity key information uniquely corresponds to one account information, so that it can indicate that the standard information belongs to the user. Of course, there is no specific limit here.
S104:將簽名後的標準資訊、所述標準資訊的身份標識以及所述第一認證資訊發送給所述認證伺服器,以使得所述認證伺服器在對所述第一認證資訊認證通過,且根據簽名後的標準資訊對第二認證資訊認證通過後,將所述標準資訊和所述標準資訊的身份標識進行註冊。 S104: Send the signed standard information, the identity identifier of the standard information, and the first authentication information to the authentication server, so that the authentication server authenticates the first authentication information, and After the second authentication information is authenticated according to the signed standard information, the standard information and the identity information of the standard information are registered.
當業務應用接收到安全資訊應用的回饋後,就會將安全資訊應用所回饋的簽名後的標準資訊、該標準資訊的身份標識以及由認證伺服器發送的第一認證資訊,一併發送 給認證伺服器進行認證並註冊。 After the service application receives the feedback of the security information application, the signed standard information fed back by the security information application, the identity identifier of the standard information, and the first authentication information sent by the authentication server are sent to the authentication together. The server is authenticated and registered.
認證伺服器接收到了業務應用發送的上述資訊後,就會對所接收到的資訊進行認證。如果認證通過,那麼也就表明由安全資訊應用所發送的標準資訊在傳輸途中並未被篡改,從而,認證伺服器也就可以將標準資訊及其身份標識進行註冊。註冊的標準資訊以及身份標識也就可以用來對後續用戶提供的安全資訊進行認證識別。 After receiving the above information sent by the business application, the authentication server authenticates the received information. If the authentication is passed, it means that the standard information sent by the security information application has not been tampered with during transmission, so that the authentication server can register the standard information and its identity. The registered standard information and identity can also be used to authenticate and identify the security information provided by subsequent users.
透過上述步驟,當用戶在使用業務服務需要註冊標準資訊時,業務應用會向認證伺服器發起標準資訊註冊請求,並接收認證伺服器所回饋的第一認證資訊,之後,業務應用會生成標準資訊獲取請求和第一認證資訊一併發送給安全資訊應用,在安全資訊應用針對第一認證資訊進行認證通過後,會使用自身的第二認證資訊對標準資訊進行簽名,並確定出該標準資訊的身份標識,再將簽名後的標準資訊及該標準資訊的身份標識回饋給業務應用,從而,業務應用會將安全資訊應用所回饋的,以及第一認證資訊發送給認證伺服器,以便認證伺服器進行認證後,將標準資訊及其身份標識進行註冊。從上述方式中可見,第一認證資訊作為認證伺服器的一種標識,可以使得安全資訊應用確定出標準資訊註冊者的身份;返回認證伺服器的第一認證資訊,使得認證伺服器可以確定出資訊在傳輸途中是否被篡改,而返回認證伺服器的簽名後的標準資訊,使得認證伺服器可以確定出標準資訊是否由終端內的安全資訊應用所提供,這樣的方式可以有效保障認證伺服器可以準 確地識別出在傳輸途中被篡改後的標準資訊,有效提升了在註冊標準資訊時的安全性。 Through the above steps, when the user needs to register the standard information when using the service service, the business application initiates a standard information registration request to the authentication server, and receives the first authentication information fed back by the authentication server, and then the business application generates standard information. The obtaining request and the first authentication information are sent to the security information application, and after the security information application passes the authentication for the first authentication information, the second authentication information is used to sign the standard information, and the standard information is determined. The identity identifier, and then the signed standard information and the identity information of the standard information are fed back to the business application, so that the business application sends the feedback information sent by the security information application and the first authentication information to the authentication server, so as to authenticate the server. After the certification, the standard information and its identity are registered. As can be seen from the foregoing manner, the first authentication information is used as an identifier of the authentication server, so that the security information application determines the identity of the standard information registrant; and returns the first authentication information of the authentication server, so that the authentication server can determine the information. Whether or not it is tampered with during transmission, and returns the signed standard information of the authentication server, so that the authentication server can determine whether the standard information is provided by the security information application in the terminal, which can effectively ensure that the authentication server can be accurate. It identifies the standard information that has been tampered with during transmission, effectively improving the security when registering standard information.
對於上述的第一認證資訊而言,第一認證資訊是認證伺服器的一種標識,用來標示認證伺服器的身份,具體可以將認證伺服器自身的證書作為第一認證資訊,當然,考慮到傳輸過程中的安全性,認證伺服器可以使用自身的密鑰資訊對其證書進行簽名操作。那麼,作為本申請實施例中的一種可選方式,上述步驟S102:接收所述認證伺服器回饋的第一認證資訊,具體為:接收所述認證伺服器發送的、採用該認證伺服器自身的第一加密密鑰進行簽名後的證書,並將簽名後的證書作為所述第一認證資訊。 For the first authentication information, the first authentication information is an identifier of the authentication server, which is used to indicate the identity of the authentication server. Specifically, the certificate of the authentication server itself may be used as the first authentication information, of course, considering Security during transmission, the authentication server can use its own key information to sign its certificate. Then, as an optional manner in the embodiment of the present application, the foregoing step S102 is: receiving the first authentication information that is sent back by the authentication server, specifically: receiving, by using the authentication server, the authentication server itself. The first encryption key is used to sign the signed certificate, and the signed certificate is used as the first authentication information.
此外,在實際應用中的某些場景下,認證伺服器向業務應用回饋的第一認證資訊中,還包含有挑戰碼。當業務應用向認證伺服器發送一次請求後,認證伺服器就會生成一個具有唯一性的挑戰碼,攜帶在第一認證資訊中回饋給業務應用。可以認為,一個挑戰碼就對應一次業務請求。採用挑戰碼的方式可以防止重放攻擊。 In addition, in some scenarios in the actual application, the first authentication information that the authentication server feeds back to the service application further includes a challenge code. After the service application sends a request to the authentication server, the authentication server generates a unique challenge code, which is carried in the first authentication information and fed back to the service application. It can be considered that one challenge code corresponds to one service request. The challenge code can be used to prevent replay attacks.
以上內容是基於終端內的業務應用的角度所進行的描述。而對於提供標準資訊的安全資訊應用而言,本申請實施例中還提供了一種資訊註冊過程,如圖2所示,該過程包括如下步驟: The above content is based on the description of the business application within the terminal. For the security information application that provides the standard information, the information registration process is also provided in the embodiment of the present application. As shown in FIG. 2, the process includes the following steps:
S201:接收業務應用發送的第一認證資訊和標準資訊獲取請求。 S201: Receive a first authentication information and a standard information obtaining request sent by the service application.
本實施例中的第一認證資訊和標準資訊獲取請求如前 所述。在此不再敖述。 The first authentication information and the standard information acquisition request in this embodiment are as described above. I will not repeat them here.
S202:對所述第一認證資訊進行認證,並在認證通過後,將使用第二認證資訊進行簽名後的標準資訊,以及所述標準資訊的身份標識返回給所述業務應用,使所述業務應用將簽名後的標準資訊以及所述標準資訊的身份標識發送給認證伺服器,以使得所述認證伺服器在對所述第一認證資訊認證通過,且根據簽名後的標準資訊對第二認證資訊認證通過後,將所述標準資訊和所述標準資訊的身份標識進行註冊。 S202: Authenticate the first authentication information, and after the authentication is passed, return the standard information signed by using the second authentication information, and the identity identifier of the standard information to the service application, so that the service is performed. The application sends the signed standard information and the identity of the standard information to the authentication server, so that the authentication server authenticates the first authentication information, and the second authentication is performed according to the signed standard information. After the information authentication is passed, the standard information and the identity of the standard information are registered.
當安全資訊應用接收到了業務應用發送的第一認證資訊和標準資訊獲取請求後,首先會對第一認證資訊進行認證,以便確定出標準資訊的註冊者的身份。只有在安全資訊應用確定了認證伺服器的身份後,安全資訊應用才會將用戶提供的標準資訊進行簽名,並確定出該標準資訊的身份標識,再將簽名後的標準資訊和該標準資訊的身份標識回饋給業務應用。從而,業務應用將安全資訊應用回請的一系列資訊和第一認證資訊一併發送給認證伺服器。後續由認證伺服器進行認證,並在認證通過後對標準資訊和該標準資訊的身份標識進行註冊。這裡的內容與上述方法中的過程相同,故在此不再過多贅述。 After receiving the first authentication information and the standard information obtaining request sent by the service application, the security information application first authenticates the first authentication information to determine the identity of the registrant of the standard information. Only after the security information application determines the identity of the authentication server, the security information application will sign the standard information provided by the user, and determine the identity of the standard information, and then the signed standard information and the standard information. The identity is fed back to the business application. Therefore, the business application sends the security information application back to the authentication server together with the first authentication information. The authentication is performed by the authentication server, and the standard information and the identity of the standard information are registered after the authentication is passed. The content here is the same as the process in the above method, so it will not be repeated here.
透過上述步驟,由認證伺服器提供的第一認證資訊可以標示出認證伺服器的身份,安全資訊應用對第一認證資訊的認證,可以避免非法操作者向該安全資訊應用獲取標準資訊。而安全資訊應用對用戶提供的標準資訊進行簽名 的方式,是用來表明該標準資訊是由安全資訊應用發送的,同時確定出該標準資訊的身份標識,用來表明該標準資訊由該用戶提供,顯然,安全資訊應用回饋給業務應用的標準資訊中包含了兩種標識,而如果標準資訊在傳輸過程中被篡改,那麼,標準資訊的兩種標識都將會發生改變。這樣的方式可以有效地反映出標準資訊在傳輸過程中是否被篡改,也就保證了最終認證伺服器在註冊時的安全性。 Through the above steps, the first authentication information provided by the authentication server may indicate the identity of the authentication server, and the security information application authenticates the first authentication information, so as to prevent the illegal operator from acquiring the standard information from the security information application. The manner in which the security information application signs the standard information provided by the user is used to indicate that the standard information is sent by the security information application, and the identity of the standard information is determined to indicate that the standard information is provided by the user. Obviously, the standard information that the security information application gives back to the business application contains two kinds of identifiers, and if the standard information is tampered with during the transmission, the two types of standard information will change. This way can effectively reflect whether the standard information has been tampered with during the transmission process, thus ensuring the security of the final authentication server when registering.
將使用第二認證資訊進行簽名後的標準資訊,以及所述標準資訊的身份標識返回給所述業務應用,具體為:接收用戶輸入的標準資訊,使用第二認證資訊對所述標準資訊進行簽名,並針對所述標準資訊,確定所述標準資訊的身份標識,將簽名後的標準資訊以及所述標準資訊的身份標識,返回給所述業務應用。 The standard information that is signed by using the second authentication information, and the identity of the standard information are returned to the service application, specifically: receiving standard information input by the user, and signing the standard information by using the second authentication information. And determining, according to the standard information, an identity of the standard information, and returning the signed standard information and the identity of the standard information to the service application.
如前所述,本申請中標準資訊的身份標識,具體可以包括該標準資訊的身份密鑰資訊,該身份密鑰資訊通常與用戶的帳戶資訊相關聯。在傳輸過程中,為了保證該身份密鑰資訊的安全性,在本申請實施例中的一種可選方式下,安全資訊應用也可以使用第二認證資訊對所述身份密鑰資訊(亦即,標準資訊的身份標識)進行簽名。當然,這裡並不構成對本申請的限定。 As described above, the identity of the standard information in the present application may specifically include identity key information of the standard information, and the identity key information is usually associated with the account information of the user. In an optional manner in the embodiment of the present application, the security information application may also use the second authentication information to use the identity key information (ie, The identity of the standard information is signed. Of course, this does not constitute a limitation on the present application.
同樣,正如前述,第一認證資訊可表明認證伺服器的身份,而在本申請中的一種方式下,第一認證資訊包括認證伺服器自身的證書,此時,對所述第一認證資訊進行認 證,具體為:使用與所述認證伺服器的第一加密密鑰相匹配的第一解密密鑰對所述簽名後的證書進行解密認證。 Similarly, as described above, the first authentication information may indicate the identity of the authentication server, and in one mode of the present application, the first authentication information includes the certificate of the authentication server itself, and at this time, the first authentication information is performed. The authentication is specifically: decrypting and authenticating the signed certificate by using a first decryption key that matches the first encryption key of the authentication server.
對於第二認證資訊而言,在本申請實施例中的一種方式下,所述第二認證資訊包括預先與認證伺服器約定的第二密鑰資訊,其中,所述第二密鑰資訊中包括第二加密密鑰和第二解密密鑰,在此場景下,使用第二認證資訊對所述標準資訊進行簽名,具體為:針對所述標準資訊,使用預先與認證伺服器約定的第二加密密鑰進行簽名。 For the second authentication information, in a mode in the embodiment of the present application, the second authentication information includes second key information that is agreed with the authentication server in advance, where the second key information includes a second encryption key and a second decryption key. In this scenario, the standard information is used to sign the standard information, specifically: using the second encryption agreed in advance with the authentication server for the standard information. The key is signed.
當然,在標準資訊的身份標識包括該標準資訊的身份密鑰資訊的情況下,還可以使用上述第二認證資訊對身份密鑰資訊進行簽名。這裡與上述方式中的內容類別似,故在此不再過多贅述。 Of course, in the case that the identity information of the standard information includes the identity key information of the standard information, the identity key information may also be signed using the second authentication information. This is similar to the content category in the above manner, so it will not be repeated here.
以上內容是基於運行在終端內的安全資訊應用角度的描述,而對於認證伺服器而言,本申請實施例中還提供一種資訊註冊過程,如圖3所示,具體包括以下步驟: The above content is based on the description of the security information application running in the terminal. For the authentication server, the information registration process is also provided in the embodiment of the present application. As shown in FIG. 3, the following steps are specifically included:
S301:認證伺服器接收業務應用發送的標準資訊註冊請求。 S301: The authentication server receives the standard information registration request sent by the service application.
S302:根據所述標準資訊註冊請求,生成第一認證資訊並回饋給所述業務應用。 S302: Generate first authentication information and feed back to the service application according to the standard information registration request.
S303:接收所述業務應用發送的簽名後的標準資訊、所述標準資訊的身份標識以及所述第一認證資訊;其中,所述簽名後的標準資訊是安全資訊應用使用第二認證資訊進行簽名,並發送給所述業務應用的。 S303: Receive the signed standard information sent by the service application, the identity identifier of the standard information, and the first authentication information, where the signed standard information is that the security information application uses the second authentication information to sign And sent to the business application.
S304:對所述第一認證資訊進行認證,並根據簽名後 的標準資訊對所述第二認證資訊進行認證。 S304: Perform authentication on the first authentication information, and authenticate the second authentication information according to the signed standard information.
S305:在對所述第一認證資訊和所述第二認證資訊認證均通過後,將所述標準資訊以及所述標準資訊的身份標識進行註冊。 S305: After the first authentication information and the second authentication information are authenticated, the standard information and the identity information of the standard information are registered.
與上述如圖1和圖2所示的方法相類似,認證伺服器會在接收到業務應用發送的標準資訊註冊請求後,將向業務應用回饋可表明該認證伺服器自身身份的第一認證資訊,使得業務應用向安全資訊發送標準資訊獲取請求後,安全資訊應用可以根據第一認證資訊,確定出認證伺服器的身份,從而,安全資訊應用才會向業務應用回饋使用第二認證資訊簽名後的標準資訊和該標準資訊的身份標識。當認證伺服器接收到了業務應用返回的簽名後的標準資訊和第一認證資訊後,便會對第一認證資訊進行認證,並根據簽名後的標準資訊對第二認證資訊進行認證,如果認證均通過,那麼,也就表明標準資訊在傳輸過程中並未被篡改,從而,認證伺服器會將標準資訊及其身份標識進行註冊,以便後續過程進行認證識別。 Similar to the method shown in FIG. 1 and FIG. 2 above, after receiving the standard information registration request sent by the service application, the authentication server will feed back to the service application the first authentication information indicating the identity of the authentication server. After the service application sends the standard information acquisition request to the security information, the security information application can determine the identity of the authentication server according to the first authentication information, so that the security information application can return the second authentication information signature to the service application. Standard information and the identity of the standard information. After the authentication server receives the signed standard information and the first authentication information returned by the service application, the first authentication information is authenticated, and the second authentication information is authenticated according to the signed standard information, if the authentication is Pass, then, it means that the standard information has not been tampered with during the transmission process, so the authentication server will register the standard information and its identity for subsequent identification and identification.
正如前述內容所述,認證伺服器自身的證書可有效證明該認證伺服器的身份,而為了保證安全資訊應用接收到的證書的有效性,認證伺服器通常會對其自身的證書進行簽名,從而,如果該證書在傳輸過程中被篡改,安全資訊應用就可以識別出來,故針對上述步驟S302而言,根據所述標準資訊註冊請求,生成第一認證資訊並回饋給所述業務應用,具體為:根據所述標準資訊註冊請求,調取該 認證伺服器自身的證書,使用自身的第一加密密鑰對所述證書進行簽名,作為第一認證資訊,並回饋給所述業務應用。 As described in the foregoing, the certificate of the authentication server itself can effectively prove the identity of the authentication server, and in order to ensure the validity of the certificate received by the security information application, the authentication server usually signs its own certificate, thereby If the certificate is tampered with during the transmission process, the security information application can be identified. Therefore, according to the step S302, the first authentication information is generated and fed back to the service application according to the standard information registration request, specifically And: according to the standard information registration request, the certificate of the authentication server itself is retrieved, and the certificate is signed by using the first encryption key of the authentication server as the first authentication information, and is fed back to the service application.
與前述方法中的內容相類似,在本申請實施例的一種場景下,認證伺服器還可以將挑戰碼也攜帶在第一認證資訊中,並使用自身的第一加密密鑰簽名後發送給業務應用。這裡並不構成對本申請的限定。 Similar to the content in the foregoing method, in a scenario in the embodiment of the present application, the authentication server may also carry the challenge code in the first authentication information, and use the first encryption key to sign and send the service to the service. application. This does not constitute a limitation on the present application.
當業務應用向認證伺服器返回了簽名後的標準資訊和第一認證資訊後,認證伺服器也就會對第一認證資訊進行認證,並根據簽名後的標準資訊對第二認證資訊進行認證。 After the business application returns the signed standard information and the first authentication information to the authentication server, the authentication server also authenticates the first authentication information, and authenticates the second authentication information according to the signed standard information.
具體而言,對第一認證資訊進行認證,具體包括:使用第一解密密鑰對所述第一認證資訊進行解密認證。認證伺服器將使用自身的第一解密密鑰對第一認證資訊進行解密認證,如果解密後的證書(或挑戰碼)發生了變化,那麼,就表明在傳輸的過程中極有可能被篡改,從而,認證伺服器將判定為認證不通過。而如果認證伺服器在解密後,證書(或挑戰碼)未發生變化,那麼就通過認證。 Specifically, the authenticating the first authentication information includes: performing decryption authentication on the first authentication information by using a first decryption key. The authentication server will use the first decryption key of its own to decrypt and authenticate the first authentication information. If the decrypted certificate (or challenge code) changes, it indicates that it is highly likely to be tampered with during the transmission process. Thus, the authentication server will determine that the authentication has not passed. If the authentication server does not change the certificate (or challenge code) after decryption, it passes the authentication.
對於第二認證資訊而言,與前述方法中的內容相類似,所述第二認證資訊包括預先由所述認證伺服器與所述安全資訊應用約定的第二密鑰資訊;其中,所述第二密鑰資訊包括:第二加密密鑰和第二解密密鑰。此外,簽名後的標準資訊是由所述安全應用使用第二加密密鑰進行簽名的。在這種場景下,根據簽名後的標準資訊對所述第二認 證資訊進行認證,具體為:根據預先約定的第二密鑰資訊,使用與所述安全資訊應用預先約定的第二解密密鑰,對簽名後的標準資訊進行解密,以便對所述第二認證資訊進行認證。 For the second authentication information, similar to the content in the foregoing method, the second authentication information includes second key information agreed in advance by the authentication server and the security information application; The second key information includes: a second encryption key and a second decryption key. In addition, the signed standard information is signed by the security application using a second encryption key. In this scenario, the second authentication information is authenticated according to the signed standard information, specifically: using a second decryption key pre-agreed with the security information application according to the pre-agreed second key information. Decrypting the signed standard information to authenticate the second authentication information.
如果認證伺服器使用約定的第二解密密鑰針對簽名後的標準資訊進行解密,並獲得了標準資訊,那麼,就可以認為標準資訊在傳輸的過程中並未被篡改,從而通過認證。而如果進行解密後,得到的是無法使用的資訊,則表明簽名的資訊並不是採用預先約定的第二加密密鑰進行簽名的,這就極有可能是被篡改後的資訊,從而認證不通過。 If the authentication server decrypts the signed standard information using the agreed second decryption key and obtains the standard information, then the standard information can be considered to have not been tampered with during the transmission process, thereby passing the authentication. If the information obtained after decryption is unusable, it means that the signed information is not signed by the pre-agreed second encryption key, which is most likely the information that has been tampered with, so that the authentication fails. .
只有在認證伺服器進行認證通過之後,認證伺服器才會將標準資訊和該標準資訊的身份標識進行註冊。 The authentication server registers the standard information and the identity of the standard information only after the authentication server passes the authentication.
透過上述如圖1至圖3所示的資訊註冊方法,使得認證伺服器可以有效地識別出標準資訊在傳輸過程中是否被篡改,也就保證了用戶能夠在使用業務服務時不被非法操作者所影響。 Through the above information registration method as shown in FIG. 1 to FIG. 3, the authentication server can effectively identify whether the standard information has been tampered with during the transmission process, thereby ensuring that the user can not be illegally operated when using the service service. Affected.
當然,針對上述資訊註冊方法,可適用於任意終端透過業務應用獲取業務服務的場景中,且上述的認證伺服器可以是服務提供者後臺服務系統內的具有認證功能的伺服器。而考慮到實際應用場景中,對於可提供諸如支付業務、轉帳業務等對安全級別要求較高的業務服務的服務提供者而言,通常使用一種稱為互聯網金融身份認證聯盟(Internet Finance Authentication Alliance,IFAA)的網 路身份認證架構,實現對安全級別要求較高的業務服務所需的身份認證支持。亦即,由IFAA提供認證伺服器,實現上述的註冊過程。 Certainly, the foregoing information registration method may be applicable to a scenario in which any terminal obtains a service service through a service application, and the foregoing authentication server may be a server with an authentication function in a service provider background service system. Considering the actual application scenario, for a service provider that can provide a service level that requires a higher security level, such as a payment service or a transfer service, an Internet Finance Authentication Alliance (Internet Finance Authentication Alliance) is usually used. IFAA)'s network authentication architecture enables identity authentication support for business services that require a higher level of security. That is, the authentication server is provided by IFAA to implement the above registration process.
在這樣的場景下,不同的設備製造廠商也會採用IFAA所提供的身份認證架構,在其生產的終端中提供身份認證必備的介面或服務。 In such a scenario, different device manufacturers will also adopt the identity authentication architecture provided by IFAA to provide the necessary interface or service for identity authentication in the terminals they produce.
為了清楚的闡述本申請中的上述註冊方法,現以IFAA提供的身份認證架構中進行註冊為例,進行詳細說明。 In order to clearly explain the above registration method in the present application, the registration in the identity authentication architecture provided by IFAA is taken as an example for detailed description.
如圖4所示,為本示例中終端和IFAA認證伺服器之間進行註冊的實際應用過程。其中,終端內運行有業務應用和安全資訊應用,業務應用作為某服務提供者的業務服務接入口,可為使用該終端的用戶提供各類業務服務,而安全資訊應用用於為業務應用提供所需的安全資訊(在本示例中為標準資訊)。圖4中所示的過程具體包括如下步驟: As shown in FIG. 4, the actual application process of registering between the terminal and the IFAA authentication server in this example. The service application and the security information application are running in the terminal, and the service application serves as a service service access port of a service provider, and can provide various types of service services for users who use the terminal, and the security information application is used to provide services for the service application. Security information required (standard information in this example). The process shown in FIG. 4 specifically includes the following steps:
S401:業務應用向IFAA認證伺服器發送標準資訊註冊請求。 S401: The service application sends a standard information registration request to the IFAA authentication server.
當用戶在終端中第一次使用該業務應用中的某業務服務時,就需要在IFAA認證伺服器中註冊該用戶的生物資訊,作為標準資訊。此時,業務應用就會向IFAA認證伺服器發出標準資訊註冊請求。 When a user first uses a service service in the service application in the terminal, the user's biometric information needs to be registered in the IFAA authentication server as standard information. At this point, the business application issues a standard information registration request to the IFAA authentication server.
S402:IFAA認證伺服器將簽名後的包含挑戰碼和證書的資料包回饋給業務應用。 S402: The IFAA authentication server returns the signed data package containing the challenge code and the certificate to the service application.
其中,挑戰碼可以防止重放攻擊,證書用以表明該IFAA認證伺服器自身的身份。可以認為,經過簽名後的資料包就是上述註冊方法中所述的第一認證資訊。 The challenge code can prevent replay attacks, and the certificate is used to indicate the identity of the IFAA authentication server itself. It can be considered that the signed data package is the first authentication information described in the above registration method.
另外,需要說明的是,本步驟中,IFAA認證伺服器使用IFAAS密鑰資訊對上述的資料包進行簽名,該IFAAS密鑰資訊由IFAA認證伺服器自身生成。而IFAA認證伺服器自身的證書由BIOM密鑰資訊進行簽名,BIOM密鑰資訊用於表明提供該業務服務的服務提供者的類別。 In addition, it should be noted that, in this step, the IFAA authentication server uses the IFAAS key information to sign the above data packet, and the IFAAS key information is generated by the IFAA authentication server itself. The certificate of the IFAA authentication server itself is signed by the BIOM key information, and the BIOM key information is used to indicate the category of the service provider that provides the service.
S403:業務應用生成標準資訊獲取請求,並將該標準資訊獲取請求和簽名後的資料包透過IFAAService發送給安全資訊應用。 S403: The service application generates a standard information acquisition request, and sends the standard information acquisition request and the signed data package to the security information application through the IFAAService.
其中,IFAAService是設置於終端內的IFAA身份認證架構所提供的一種服務。當然,在實際應用場景中的一種方式下,業務應用可透過IFAASDK(一種基於IFAA身份認證架構下的通信工具)調用IFAAService,這裡並不做具體限定。 Among them, IFAAService is a service provided by the IFAA identity authentication architecture set in the terminal. Of course, in one mode of the actual application scenario, the service application can invoke the IFAAService through the IFAASDK (a communication tool based on the IFAA identity authentication architecture), which is not specifically limited herein.
S404:安全資訊應用對簽名後的資料包進行認證,在認證通過後,將標準資訊進行簽名。 S404: The security information application authenticates the signed data package, and after the authentication is passed, the standard information is signed.
需要說明的是,安全資訊應用首先要對簽名後的資料包進行解密(具體可以使用IFAA密鑰資訊進行解密,這裡不作具體限定),在解密後,將認證資料包中的證書(可使用BIOM密鑰資訊對證書進行解密認證),以認證是不是IFAA將註冊標準資訊。 It should be noted that the security information application first needs to decrypt the signed data packet (specifically, the IFAA key information can be used for decryption, which is not specifically limited herein), and after decryption, the certificate in the authentication data package (the BIOM can be used) The key information decrypts the certificate to verify that the IFAA will register the standard information.
在認證通過後,安全資訊應用將獲得用戶輸入的生物資訊,作為標準資訊,並使用DA密鑰資訊對標準資訊進行簽名。其中,DA密鑰資訊用於表明該終端的身份(在一種情況下,DA密鑰資訊可表明安全資訊應用的身份,而安全應用資訊是設備製造商設置於該終端內的,所以,DA密鑰資訊也表明終端的身份)。 After the certification is passed, the security information application will obtain the biometric information input by the user as standard information and use the DA key information to sign the standard information. The DA key information is used to indicate the identity of the terminal (in one case, the DA key information may indicate the identity of the security information application, and the security application information is set by the device manufacturer in the terminal, so the DA key is The key information also indicates the identity of the terminal).
S405:根據簽名後的標準資訊,確定該標準資訊的身份密鑰資訊。 S405: Determine identity key information of the standard information according to the signed standard information.
在本示例中,標準資訊的身份密鑰資訊通常與用戶在業務應用中所使用的帳戶資訊相關聯,用以表明該標準資訊所屬的用戶。實際應用中,標準資訊的身份密鑰資訊的生成,可由IFAAService透過KeyStore(一種REE環境下的安全儲存標準調用介面)調用KeyMaster(一種安全儲存模組),並由KeyMaster生成該身份密鑰資訊。 In this example, the identity key information of the standard information is typically associated with the account information used by the user in the business application to indicate the user to which the standard information belongs. In actual application, the identity key information of the standard information is generated by IFAAService through KeyStore (a secure storage standard calling interface in the REE environment) to call KeyMaster (a secure storage module), and the key master generates the identity key information.
需要說明的是,為了保證身份密鑰資訊在傳輸過程中的安全性,安全資訊應用可以使用DA密鑰資訊對身份密鑰資訊進行簽名。 It should be noted that in order to ensure the security of the identity key information in the transmission process, the security information application can use the DA key information to sign the identity key information.
S406:安全資訊應用將終端證書、簽名後的標準資訊、簽名後的身份密鑰資訊返回給業務應用。 S406: The security information application returns the terminal certificate, the signed standard information, and the signed identity key information to the service application.
S407:透過IFAAService將終端證書、簽名後的標準資訊、簽名後的身份密鑰資訊發送給IFAA認證伺服器。 S407: Send the terminal certificate, the signed standard information, and the signed identity key information to the IFAA authentication server through the IFAAService.
需要說明的是,終端證書也稱為authenticator證書,是參與IFAA身份認證架構的設備製造商為其生產的設備中所設置的,亦即,終端證書可以表明該終端是否使用了 IFAA的身份認證架構。 It should be noted that the terminal certificate is also called an authenticator certificate, which is set in the device manufactured by the device manufacturer participating in the IFAA identity authentication architecture, that is, the terminal certificate can indicate whether the terminal uses the IFAA identity authentication architecture. .
當然,在本示例的一種方式下,同時返回IFAA認證伺服器的還有前述的挑戰碼和IFAA認證伺服器自身的證書,這樣一來,IFAA認證伺服器還可對挑戰碼和IFAA認證伺服器自身的證書進行認證。 Of course, in one of the ways of this example, the IFAA authentication server is also returned with the aforementioned challenge code and the certificate of the IFAA authentication server itself, so that the IFAA authentication server can also challenge the challenge code and the IFAA authentication server. Certify your own certificate.
S408:IFAA認證伺服器對接收到的資訊進行認證,在認證通過後,將標準資訊及其身份密鑰資訊進行註冊。 S408: The IFAA authentication server authenticates the received information, and after the authentication is passed, registers the standard information and the identity key information.
需要說明的是,IFAA認證伺服器首先將對終端證書進行認證,具體可使用IFAA密鑰資訊對接收到的資訊進行解密,並認證終端證書的合法性,通過後,將使用DA密鑰資訊對身份密鑰資訊進行解密認證,通過後,再對簽名的標準資訊使用DA密鑰資訊進行解密認證,均通過後,那麼,就可以認為標準資訊在傳輸途中未被篡改,則IFAA認證伺服器將標準資訊及其身份密鑰資訊進行註冊。 It should be noted that the IFAA authentication server first authenticates the terminal certificate. Specifically, the IFAA key information can be used to decrypt the received information, and the validity of the terminal certificate is authenticated. After passing, the DA key information pair is used. The identity key information is decrypted and authenticated. After passing, the standard information of the signature is decrypted and authenticated using the DA key information. After passing, then the standard information can be considered to have not been tampered with during transmission, and the IFAA authentication server will Standard information and its identity key information are registered.
S409:向業務應用回饋註冊結果。 S409: Reward the registration result to the business application.
透過上例可見,在實際應用場景下,可以使用多種密鑰資訊來準確確定出標準資訊在傳輸過程中是否被篡改。 As can be seen from the above example, in the actual application scenario, multiple key information can be used to accurately determine whether the standard information has been tampered with during transmission.
以上內容是標準資訊的註冊方法,在註冊了標準資訊後,用戶便可以使用相應的業務服務,當用戶使用業務服務時,就需要提供用戶的安全資訊,相應地,認證伺服器也就可以根據用戶在使用業務服務時所提供的安全資訊進行認證。故在本申請實施例中,還提供了一種資訊認證方法,如圖5所示,所述方法包括如下步驟: The above content is the registration method of standard information. After registering the standard information, the user can use the corresponding business service. When the user uses the business service, the user's security information needs to be provided. Accordingly, the authentication server can also be based on The user authenticates with the security information provided by the business service. Therefore, in the embodiment of the present application, an information authentication method is also provided. As shown in FIG. 5, the method includes the following steps:
S501:向認證伺服器發送針對待認證資訊的校驗請求。 S501: Send a verification request for the information to be authenticated to the authentication server.
當用戶使用業務應用中的業務服務(如:指紋支付業務)時,往往需要用戶提供自身的安全資訊(如:指紋資訊),與之前註冊的標準資訊進行比對。此時,業務應用將會獲取用戶的安全資訊,作為待認證資訊,後續將發送至認證伺服器中進行認證校驗。 When a user uses a business service (such as a fingerprint payment service) in a business application, the user is often required to provide his/her own security information (such as fingerprint information) to compare with the previously registered standard information. At this point, the service application will obtain the user's security information as the information to be authenticated, which will be sent to the authentication server for authentication and verification.
在上述情況下,業務應用就會向認證伺服器發送待認證資訊的校驗請求。 In the above case, the business application sends a verification request for the information to be authenticated to the authentication server.
S502:接收所述認證伺服器回饋的第一認證資訊。 S502: Receive first authentication information that is sent back by the authentication server.
與前述註冊方法中類似,第一認證資訊表明了認證伺服器的身份。在此不再過多贅述。 Similar to the aforementioned registration method, the first authentication information indicates the identity of the authentication server. I won't go into too much detail here.
S503:根據所述第一認證資訊,生成待認證資訊獲取請求發送至安全資訊應用,獲取由所述安全資訊應用提供的待認證資訊,以及所述待認證資訊的待認證身份標識。 S503: Send a to-be-authenticated information acquisition request to the security information application according to the first authentication information, obtain the to-be-authenticated information provided by the security information application, and the to-be-authenticated identity identifier of the to-be-authenticated information.
類似地,安全資訊應用將根據第一認證資訊確定出認證者的身份,在確定了認證者的身份合法後,通過認證,再將用戶提供的待認證資訊及其待認證身份標識一併返回給業務應用。 Similarly, the security information application determines the identity of the authenticator according to the first authentication information, and after determining that the identity of the authenticator is legal, the authentication and the information to be authenticated provided by the user and the identity to be authenticated are returned to the user. Business Applications.
與前述註冊方法中不同的是,對於待認證資訊而言,無需使用第二認證資訊進行簽名。 Different from the foregoing registration method, for the information to be authenticated, it is not necessary to use the second authentication information for signing.
S504:將所述待認證資訊、所述待認證身份標識以及所述第一認證資訊發送給所述認證伺服器,以使得所述認證伺服器對所述第一認證資訊、所述待認證身份標識以及 待認證資訊進行認證,生成認證結果回饋給所述業務應用。 S504: Send the to-be-authenticated information, the to-be-authenticated identity, and the first authentication information to the authentication server, so that the authentication server, the first authentication information, and the identity to be authenticated The identifier and the information to be authenticated are authenticated, and the authentication result is generated and fed back to the service application.
從上述內容中可以看出,透過第一認證資訊和待認證身份標識,可以識別出待認證資訊是否在傳輸過程中被篡改,在認證通過後,認證伺服器才會對待認證資訊進行認證。 It can be seen from the above that through the first authentication information and the identity to be authenticated, it can be identified whether the information to be authenticated has been tampered with during the transmission process, and the authentication server will authenticate the authentication information after the authentication is passed.
在本申請實施例中,還提供一種資訊認證方法,如圖6所示,該方法包括如下步驟: In the embodiment of the present application, an information authentication method is further provided. As shown in FIG. 6, the method includes the following steps:
S601:接收業務應用發送的、攜帶有第一認證資訊的待認證資訊獲取請求。 S601: Receive an information request to be authenticated that is sent by the service application and carries the first authentication information.
S602:根據攜帶有第一認證資訊的標準資訊獲取請求,將待認證資訊以及所述待認證資訊的身份標識透過所述業務應用發送至認證伺服器,以使得所述認證伺服器對所述第一認證資訊、所述待認證身份標識以及待認證資訊進行認證,生成認證結果回饋給所述業務應用。 S602: Send, according to the standard information obtaining request that carries the first authentication information, the information to be authenticated and the identity of the information to be authenticated to the authentication server by using the service application, so that the authentication server is configured to The authentication information, the identity to be authenticated, and the information to be authenticated are authenticated, and the authentication result is generated and fed back to the service application.
對於上述步驟S602,根據攜帶有第一認證資訊的標準資訊獲取請求,將待認證資訊以及所述待認證資訊的身份標識返回給所述業務應用,具體為:對所述標準資訊獲取請求中攜帶的所述第一認證資訊進行認證,在認證通過後,接收用戶輸入的待認證資訊,識別所述待認證資訊所屬的標準資訊,將與所述標準資訊相匹配的身份標準確定為該待認證資訊的待認證身份標識,將所述待認證資訊以及所述待認證資訊的待認證身份標識返回給所述業務應用。 For the above step S602, the information to be authenticated and the identity of the information to be authenticated are returned to the service application according to the standard information acquisition request that carries the first authentication information, specifically: carrying the standard information acquisition request The first authentication information is authenticated, and after the authentication is passed, the information to be authenticated input by the user is received, the standard information to which the information to be authenticated belongs is identified, and the identity standard matching the standard information is determined as the to-be-certified And the information to be authenticated and the to-be-authenticated identity of the information to be authenticated are returned to the service application.
在本申請實施例中,還提供一種資訊認證方法,如圖7所示,該方法包括如下步驟: In the embodiment of the present application, an information authentication method is further provided. As shown in FIG. 7, the method includes the following steps:
S701:認證伺服器接收業務應用發送的針對待認證資訊的校驗請求。 S701: The authentication server receives a verification request sent by the service application for the information to be authenticated.
S702:根據所述校驗請求,生成第一認證資訊並回饋給所述業務應用。 S702: Generate first authentication information and feed back to the service application according to the verification request.
S703:接收所述業務應用發送的待認證資訊、所述待認證資訊的身份標識以及所述第一認證資訊。 S703: Receive information to be authenticated sent by the service application, an identity identifier of the information to be authenticated, and the first authentication information.
S704:分別對所述第一認證資訊、所述身份標識以及所述待認證資訊進行認證,生成認證結果回饋給所述業務應用。 S704: Perform authentication on the first authentication information, the identity identifier, and the information to be authenticated, respectively, and generate an authentication result to be returned to the service application.
需要說明的是,對於上述步驟S704而言,認證伺服器將對業務應用發送的資訊分別進行認證,具體而言,分別對所述第一認證資訊、所述身份標識以及所述待認證資訊進行認證,具體為:針對所述第一認證資訊,使用自身的第一解密密鑰對所述第一認證資訊進行解密,對解密後的所述證書進行認證,對所述身份標識,根據已註冊的標準資訊的身份標識,判斷所述身份標識是否與已註冊的標識資訊的身份標識相匹配,針對所述待認證資訊,與已註冊的標準資訊進行比對認證。 It should be noted that, for the foregoing step S704, the authentication server separately authenticates the information sent by the service application, specifically, the first authentication information, the identity identifier, and the information to be authenticated, respectively. The authentication is specifically: decrypting, by using the first decryption key of the first authentication information, the first authentication information, and authenticating the decrypted certificate, and authenticating the identity identifier according to the first authentication information. The identity information of the standard information is used to determine whether the identity identifier matches the identity identifier of the registered identity information, and the authentication information is compared with the registered standard information for the information to be authenticated.
在實際應用場景中,認證伺服器在認證的過程中,如果有任一資訊的認證未通過,那麼,認證伺服器就可以回饋失敗通知,而只有當所有資訊均通過認證後,才會回饋成功通知。那麼,具體而言,生成認證結果回饋給所述業 務應用,具體為:針對所述第一認證資訊,若認證通過,則對所述待認證資訊及待認證身份標識進行認證;否則,返回認證失敗通知;針對所述身份標識,若認證通過,則對所述待認證資訊進行認證;否則,返回認證失敗通知;針對所述待認證資訊,若認證成功,則返回成功通知;否則,則返回認證失敗通知。 In the actual application scenario, if the authentication server fails to pass any authentication in the authentication process, the authentication server can return the failure notification, and only after all the information has passed the authentication, the feedback will be successful. Notice. Then, specifically, the authentication result is sent back to the service application, specifically: for the first authentication information, if the authentication is passed, the information to be authenticated and the identity to be authenticated are authenticated; otherwise, the authentication is returned. a failure notification; for the identity identifier, if the authentication is passed, the information to be authenticated is authenticated; otherwise, the authentication failure notification is returned; for the information to be authenticated, if the authentication is successful, a success notification is returned; otherwise, the return is returned. Authentication failure notification.
與上述註冊過程相對應,為了清楚的闡述本申請中的上述認證方法,現以IFAA提供的身份認證架構中進行認證為例,進行詳細說明。 Corresponding to the registration process described above, in order to clearly explain the above authentication method in the present application, the authentication is performed in the identity authentication architecture provided by IFAA as an example for detailed description.
如圖8所示,為本示例中終端和IFAA認證伺服器之間進行認證的實際應用過程。所示的過程具體包括如下步驟: As shown in FIG. 8, the actual application process of authentication between the terminal and the IFAA authentication server in this example is shown. The process shown specifically includes the following steps:
S801:業務應用向IFAA認證伺服器發送待認證資訊校驗請求。 S801: The service application sends an information verification request to be authenticated to the IFAA authentication server.
S802:IFAA認證伺服器將簽名後的包含挑戰碼和證書的資料包回饋給業務應用。 S802: The IFAA authentication server returns the signed data package containing the challenge code and the certificate to the service application.
S803:業務應用生成待認證資訊獲取請求,並將該待認證資訊獲取請求和簽名後的資料包透過IFAAService發送給安全資訊應用。 S803: The service application generates a to-be-certified information acquisition request, and sends the to-be-authenticated information acquisition request and the signed data packet to the security information application through the IFAAService.
S804:安全資訊應用對簽名後的資料包進行認證,在認證通過後,將待認證資訊使用註冊過程中的身份密鑰資訊進行簽名。 S804: The security information application authenticates the signed data packet, and after the authentication is passed, the information to be authenticated is signed by using the identity key information in the registration process.
S805:安全資訊應用將簽名後的待認證資訊返回給業務應用。 S805: The security information application returns the signed information to be authenticated to the business application.
S806:透過IFAAService將簽名後的待認證資訊發送給IFAA認證伺服器。 S806: Send the signed information to be authenticated to the IFAA authentication server through the IFAAService.
S807:IFAA認證伺服器針對接收到的簽名後的待認證資訊,使用註冊的身份密鑰資訊對簽名後的待認證資訊進行認證,通過後,將待認證資訊與已註冊標準資訊進行比對認證。 S807: The IFAA authentication server authenticates the signed information to be authenticated by using the registered identity key information for the received information to be authenticated, and then compares the information to be authenticated with the registered standard information. .
S808:向業務應用返回認證結果。 S808: Return the authentication result to the business application.
以上為本申請實施例提供的資訊傳輸方法,基於同樣的思路,本申請實施例還提供一種資訊註冊裝置,如圖9所示,所述裝置包括: The above is the information transmission method provided by the embodiment of the present application. Based on the same idea, the embodiment of the present application further provides an information registration device. As shown in FIG. 9, the device includes:
註冊請求模組901,用於向認證伺服器發送標準資訊註冊請求。 The registration request module 901 is configured to send a standard information registration request to the authentication server.
接收模組902,用於接收所述認證伺服器回饋的第一認證資訊。 The receiving module 902 is configured to receive first authentication information that is sent back by the authentication server.
獲取模組903,用於生成標準資訊獲取請求,將所述標準資訊獲取請求和所述第一認證資訊發送至安全資訊應用,獲取所述安全資訊應用在對所述第一認證資訊認證通過後返回的簽名後的標準資訊以及所述標準資訊的身份標識,其中,所述簽名後的標準資訊是所述安全資訊應用使用第二認證資訊進行簽名的。 The obtaining module 903 is configured to generate a standard information obtaining request, and send the standard information obtaining request and the first authentication information to the security information application, and obtain the security information application after the first authentication information is authenticated. Returning the signed standard information and the identity of the standard information, wherein the signed standard information is that the security information application uses the second authentication information to sign.
發送模組904,用於將簽名後的標準資訊、所述標準資訊的身份標識以及所述第一認證資訊發送給所述認證伺服器,以使得所述認證伺服器在對所述第一認證資訊認證通過,且根據簽名後的標準資訊對第二認證資訊認證通過 後,將所述標準資訊和所述標準資訊的身份標識進行註冊。 The sending module 904 is configured to send the signed standard information, the identity identifier of the standard information, and the first authentication information to the authentication server, so that the authentication server is in the first authentication After the information authentication is passed, and the second authentication information is authenticated according to the signed standard information, the standard information and the identity information of the standard information are registered.
所述接收模組902,具體用於接收所述認證伺服器發送的、採用該認證伺服器自身的第一加密密鑰進行簽名後的證書,並將簽名後的證書作為所述第一認證資訊。 The receiving module 902 is specifically configured to receive a certificate that is sent by the authentication server and is signed by using the first encryption key of the authentication server itself, and use the signed certificate as the first authentication information. .
如圖10所示,本申請實施例還提供一種資訊註冊裝置,所述裝置包括:接收模組1001,用於接收業務應用發送的第一認證資訊和標準資訊獲取請求;簽名模組1002,用於對所述第一認證資訊進行認證,並在認證通過後,將使用第二認證資訊進行簽名後的標準資訊,以及所述標準資訊的身份標識返回給所述業務應用,使所述業務應用將簽名後的標準資訊以及所述標準資訊的身份標識發送給認證伺服器,以使得所述認證伺服器在對所述第一認證資訊認證通過,且根據簽名後的標準資訊對第二認證資訊認證通過後,將所述標準資訊和所述標準資訊的身份標識進行註冊。 As shown in FIG. 10, the embodiment of the present application further provides an information registration device, where the device includes: a receiving module 1001, configured to receive a first authentication information and a standard information obtaining request sent by a service application; and a signature module 1002. After authenticating the first authentication information, and after the authentication is passed, the standard information that is signed using the second authentication information, and the identity of the standard information are returned to the service application, so that the service application is Sending the signed standard information and the identity information of the standard information to the authentication server, so that the authentication server authenticates the first authentication information, and the second authentication information is based on the signed standard information. After the certification is passed, the standard information and the identity of the standard information are registered.
所述簽名模組1002,具體用於接收用戶輸入的標準資訊,使用第二認證資訊對所述標準資訊進行簽名,並針對所述標準資訊,確定所述標準資訊的身份標識,將簽名後的標準資訊以及所述標準資訊的身份標識,返回給所述業務應用。 The signature module 1002 is specifically configured to receive standard information input by a user, use the second authentication information to sign the standard information, and determine an identity identifier of the standard information for the standard information, and sign the The standard information and the identity of the standard information are returned to the business application.
需要說明的是,所述標準資訊的身份標識,包括所述標準資訊的身份密鑰資訊,該身份密鑰資訊與所述用戶的 帳戶資訊相關聯。 It should be noted that the identity of the standard information includes identity key information of the standard information, and the identity key information is associated with the account information of the user.
在所述第一認證資訊中包括認證伺服器簽名後的證書的場景下,所述簽名模組1002,具體用於使用與所述認證伺服器的第一加密密鑰相匹配的第一解密密鑰對所述簽名後的證書進行解密認證。 In the scenario that the first authentication information includes the certificate signed by the authentication server, the signature module 1002 is specifically configured to use the first decryption key that matches the first encryption key of the authentication server. The key decrypts and authenticates the signed certificate.
所述第二認證資訊包括預先與認證伺服器約定的第二密鑰資訊,其中,所述第二密鑰資訊中包括第二加密密鑰和第二解密密鑰,所述簽名模組1002,具體用於針對所述標準資訊,使用預先與認證伺服器約定的第二加密密鑰進行簽名。 The second authentication information includes a second key information that is previously agreed with the authentication server, wherein the second key information includes a second encryption key and a second decryption key, and the signature module 1002, Specifically, for the standard information, the second encryption key agreed in advance with the authentication server is used for signature.
如圖11所示,本申請實施例還提供一種資訊註冊裝置,所述裝置包括:註冊請求接收模組1101,用於接收業務應用發送的標準資訊註冊請求;回饋模組1102,用於根據所述標準資訊註冊請求,生成第一認證資訊並回饋給所述業務應用;註冊資訊接收模組1103,用於接收所述業務應用發送的簽名後的標準資訊、所述標準資訊的身份標識以及所述第一認證資訊;其中,所述簽名後的標準資訊是安全資訊應用使用第二認證資訊進行簽名,並發送給所述業務應用的;認證模組1104,用於對所述第一認證資訊進行認證,並根據簽名後的標準資訊對所述第二認證資訊進行認證; 註冊模組1105,用於在對所述第一認證資訊和所述第二認證資訊認證均通過後,將所述標準資訊以及所述標準資訊的身份標識進行註冊。 As shown in FIG. 11 , the embodiment of the present application further provides an information registration device, where the device includes: a registration request receiving module 1101, configured to receive a standard information registration request sent by a service application; and a feedback module 1102, configured to The standard information registration request is generated, and the first authentication information is generated and fed back to the service application; the registration information receiving module 1103 is configured to receive the signed standard information sent by the service application, the identity identifier of the standard information, and the The first authentication information is described; wherein the signed standard information is that the security information application uses the second authentication information for signature and is sent to the service application; and the authentication module 1104 is configured to use the first authentication information. Performing authentication, and authenticating the second authentication information according to the signed standard information; the registration module 1105 is configured to: after the first authentication information and the second authentication information are authenticated, Standard information and the identity of the standard information are registered.
具體地,所述回饋模組1102,具體用於根據所述標準資訊註冊請求,調取該認證伺服器自身的證書,使用自身的第一加密密鑰對所述證書進行簽名,作為第一認證資訊,並回饋給所述業務應用。 Specifically, the feedback module 1102 is specifically configured to: according to the standard information registration request, retrieve the certificate of the authentication server itself, and sign the certificate by using its first encryption key, as the first authentication. Information and feedback to the business application.
所述認證模組1104,具體用於使用第一解密密鑰對所述第一認證資訊進行解密認證。 The authentication module 1104 is specifically configured to perform decryption authentication on the first authentication information by using a first decryption key.
所述第二認證資訊包括預先由所述認證伺服器與所述安全資訊應用約定的第二密鑰資訊;其中,所述第二密鑰資訊包括:第二加密密鑰和第二解密密鑰;簽名後的標準資訊是由所述安全應用使用第二加密密鑰進行簽名的。該場景下,所述認證模組1104,具體用於根據預先約定的第二密鑰資訊,使用與所述安全資訊應用預先約定的第二解密密鑰,對簽名後的標準資訊進行解密,以便對所述第二認證資訊進行認證。 The second authentication information includes second key information that is previously agreed by the authentication server and the security information application; wherein the second key information includes: a second encryption key and a second decryption key The signed standard information is signed by the security application using a second encryption key. In this scenario, the authentication module 1104 is specifically configured to decrypt the signed standard information by using a second decryption key that is pre-agreed with the security information application according to the pre-agreed second key information. The second authentication information is authenticated.
如圖12所示,本申請實施例還提供一種資訊認證裝置,所述裝置包括:認證請求模組1201,用於向認證伺服器發送針對待認證資訊的校驗請求;接收模組1202,用於接收所述認證伺服器回饋的第一認證資訊;獲取模組1203,用於生成待認證資訊獲取請求,將 所述待認證資訊獲取請求和所述第一認證資訊發送至安全資訊應用,獲取所述安全資訊應用在對所述第一認證資訊認證通過後返回的待認證資訊以及所述待認證資訊的待認證身份標識;發送模組1204,用於將所述待認證資訊、所述待認證身份標識以及所述第一認證資訊發送給所述認證伺服器,以使得所述認證伺服器對所述第一認證資訊、所述待認證身份標識以及待認證資訊進行認證,生成認證結果回饋給所述業務應用。 As shown in FIG. 12, the embodiment of the present application further provides an information authentication apparatus, where the apparatus includes: an authentication request module 1201, configured to send a verification request for information to be authenticated to an authentication server; and a receiving module 1202. Receiving the first authentication information that is sent by the authentication server; the obtaining module 1203 is configured to generate a to-be-authenticated information acquisition request, and send the to-be-authenticated information acquisition request and the first authentication information to the security information application to obtain The security information is applied to the to-be-authenticated information that is returned after the first authentication information is authenticated, and the to-be-authenticated identity to be authenticated. The sending module 1204 is configured to use the information to be authenticated and the to-be-authenticated information. The authentication identity and the first authentication information are sent to the authentication server, so that the authentication server authenticates the first authentication information, the identity to be authenticated, and the information to be authenticated, and generates an authentication result feedback. Apply to the business.
如圖13所示,本申請實施例還提供一種資訊認證裝置,所述裝置包括:接收模組1301,用於接收業務應用發送的、攜帶有第一認證資訊的待認證資訊獲取請求;簽名模組1302,用於對所述第一認證資訊進行認證,並在認證通過後,將待認證資訊以及所述待認證資訊的身份標識通過所述業務應用發送至認證伺服器,以使得所述認證伺服器對所述第一認證資訊、所述待認證身份標識以及待認證資訊進行認證,生成認證結果回饋給所述業務應用。 As shown in FIG. 13 , the embodiment of the present application further provides an information authentication apparatus, where the apparatus includes: a receiving module 1301, configured to receive a to-be-authenticated information acquisition request sent by a service application and carrying the first authentication information; The group 1302 is configured to authenticate the first authentication information, and after the authentication is passed, send the information to be authenticated and the identity of the information to be authenticated to the authentication server through the service application, so that the authentication is performed. The server authenticates the first authentication information, the identity to be authenticated, and the information to be authenticated, and generates an authentication result to be returned to the service application.
具體地,所述簽名模組1302,具體用於對所述標準資訊獲取請求中攜帶的所述第一認證資訊進行認證,在認證通過後,識別所述待認證資訊所屬的標準資訊,將與所述標準資訊相匹配的身份標準確定為該待認證資訊的待認證身份標識,將所述待認證資訊以及所述待認證資訊的待 認證身份標識返回給所述業務應用。 Specifically, the signature module 1302 is specifically configured to perform authentication on the first authentication information carried in the standard information acquisition request, and after the authentication is passed, identify the standard information to which the information to be authenticated belongs, and The identity standard that matches the standard information is determined as the identity to be authenticated of the information to be authenticated, and the information to be authenticated and the identity to be authenticated of the information to be authenticated are returned to the service application.
如圖14所示,本申請實施例還提供一種資訊認證裝置,所述裝置包括:認證請求接收模組1401,用於接收業務應用發送的針對待認證資訊的校驗請求;回饋模組1402,用於根據所述校驗請求,生成第一認證資訊並回饋給所述業務應用;認證資訊接收模組1403,用於接收所述業務應用發送的待認證資訊、所述待認證資訊的待認證身份標識以及所述第一認證資訊;認證模組1404,用於分別對所述第一認證資訊、所述待認證身份標識以及所述待認證資訊進行認證,生成認證結果回饋給所述業務應用。 As shown in FIG. 14, the embodiment of the present application further provides an information authentication apparatus, where the apparatus includes: an authentication request receiving module 1401, configured to receive a verification request for information to be authenticated sent by a service application; and a feedback module 1402, And the authentication information receiving module 1403 is configured to receive the to-be-authenticated information sent by the service application, and the to-be-authenticated information to be authenticated, according to the verification request. An identity identifier and the first authentication information; the authentication module 1404 is configured to respectively authenticate the first authentication information, the to-be-authenticated identity, and the to-be-authenticated information, and generate an authentication result to the service application. .
所述認證模組1404,具體用於針對所述第一認證資訊,使用自身的第一解密密鑰對所述第一認證資訊進行解密,對解密後的所述證書進行認證;針對所述待認證身份標識,根據已註冊的標準資訊的身份標識,判斷所述待認證身份標識是否與已註冊的標識資訊的身份標識相匹配;針對所述待認證資訊,與已註冊的標準資訊進行比對認證。 The authentication module 1404 is specifically configured to decrypt the first authentication information by using the first decryption key of the first authentication information, and authenticate the decrypted certificate; The authentication identity identifies whether the identity to be authenticated matches the identity of the registered identity information according to the identity of the registered standard information; and compares the registered information with the registered standard information Certification.
所述認證模組1404,具體用於針對所述第一認證資訊,若認證通過,則對所述待認證資訊及待認證身份標識進行認證;否則,返回認證失敗通知;針對所述身份標識,若認證通過,則對所述待認證資訊進行認證;否則, 返回認證失敗通知;針對所述待認證資訊,若認證成功,則返回成功通知;否則,則返回認證失敗通知。 The authentication module 1404 is specifically configured to: if the authentication is passed, authenticate the information to be authenticated and the identity to be authenticated; otherwise, return an authentication failure notification; for the identity identifier, If the authentication is passed, the information to be authenticated is authenticated; otherwise, the authentication failure notification is returned; if the authentication is successful, the success notification is returned; otherwise, the authentication failure notification is returned.
在一個典型的配置中,計算設備包括一個或多個處理器(CPU)、輸入/輸出介面、網路介面和記憶體。 In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, a network interface, and memory.
記憶體可能包括電腦可讀媒體中的非永久性記憶體,隨機存取記憶體(RAM)和/或非揮發性記憶體等形式,如唯讀記憶體(ROM)或快閃記憶體(flash RAM)。記憶體是電腦可讀媒體的示例。 The memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in computer readable media such as read only memory (ROM) or flash memory (flash) RAM). Memory is an example of a computer readable medium.
電腦可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可擦除可程式設計唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁片儲存或其他磁性存放裝置或任何其他非傳輸媒體,可用於儲存可以被計算設備訪問的資訊。按照本文中的界定,電腦可讀媒體不包括電腦可讀暫存媒體(transitory media),如調製的資料信號和載波。 Computer readable media including both permanent and non-permanent, removable and non-removable media can be stored by any method or technology. Information can be computer readable instructions, data structures, modules of programs, or other materials. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM). Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM only, digitally versatile A compact disc (DVD) or other optical storage, magnetic cassette, magnetic tape storage or other magnetic storage device or any other non-transportable medium can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include computer-readable transitory media, such as modulated data signals and carrier waves.
還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系 列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。 It is also to be understood that the terms "comprises" or "comprising" or "comprising" or any other variations are intended to encompass a non-exclusive inclusion, such that a process, method, article, Other elements not explicitly listed, or elements that are inherent to such a process, method, commodity, or equipment. An element defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in the process, method, item, or device including the element.
本領域技術人員應明白,本申請的實施例可提供為方法、系統或電腦程式產品。因此,本申請可採用完全硬體實施例、完全軟體實施例或結合軟體和硬體方面的實施例的形式。而且,本申請可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。 Those skilled in the art will appreciate that embodiments of the present application can be provided as a method, system, or computer program product. Thus, the present application can take the form of a fully hardware embodiment, a fully software embodiment, or an embodiment combining the software and hardware. Moreover, the present application can take the form of a computer program product implemented on one or more computer usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) containing computer usable code therein. .
以上所述僅為本申請的實施例而已,並不用於限制本申請。對於本領域技術人員來說,本申請可以有各種更改和變化。凡在本申請的精神和原理之內所作的任何修改、等同替換、改進等,均應包含在本申請的申請專利範圍的範圍之內。 The above description is only an embodiment of the present application and is not intended to limit the application. Various changes and modifications can be made to the present application by those skilled in the art. Any modifications, equivalents, improvements, etc. made within the spirit and principles of the present application are intended to be included within the scope of the appended claims.
Claims (34)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW106101953A TWI673621B (en) | 2017-01-19 | 2017-01-19 | Information registration, authentication method and device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW106101953A TWI673621B (en) | 2017-01-19 | 2017-01-19 | Information registration, authentication method and device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW201828131A true TW201828131A (en) | 2018-08-01 |
| TWI673621B TWI673621B (en) | 2019-10-01 |
Family
ID=63960546
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW106101953A TWI673621B (en) | 2017-01-19 | 2017-01-19 | Information registration, authentication method and device |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI673621B (en) |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2009050924A1 (en) * | 2007-10-19 | 2009-04-23 | Nippon Telegraph And Telephone Corporation | User authentication system and its method |
| CN103346888B (en) * | 2013-07-02 | 2016-08-10 | 山东科技大学 | A kind of remote identity authentication method based on password, smart card and biological characteristic |
| CN112134708A (en) * | 2014-04-15 | 2020-12-25 | 创新先进技术有限公司 | Authorization method, authorization request method and device |
| CN104767616B (en) * | 2015-03-06 | 2016-08-24 | 北京石盾科技有限公司 | A kind of information processing method, system and relevant device |
-
2017
- 2017-01-19 TW TW106101953A patent/TWI673621B/en not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| TWI673621B (en) | 2019-10-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11558381B2 (en) | Out-of-band authentication based on secure channel to trusted execution environment on client device | |
| EP3905078B1 (en) | Identity verification method and system therefor | |
| CN111708991B (en) | Service authorization method, device, computer equipment and storage medium | |
| AU2019101564A4 (en) | Information registration and authentication method and device | |
| US10848310B2 (en) | Method and device for identifying user identity | |
| CN113312664A (en) | User data authorization method and user data authorization system | |
| CN106161359A (en) | Method and device for authenticating user, method and device for registering wearable device | |
| TW201540040A (en) | Authorization method, method and device for requesting authorization | |
| CN112000951A (en) | Access method, device, system, electronic equipment and storage medium | |
| CN111753014B (en) | Identity authentication method and device based on block chain | |
| CN112528268B (en) | Cross-channel applet login management method and device and related equipment | |
| CN110505185A (en) | Auth method, equipment and system | |
| US20250168017A1 (en) | Method, apparatus, device and storage medium for device authentication and checking | |
| Abraham et al. | SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance. | |
| CN110457959B (en) | An information transmission method and device based on Trust application | |
| TWI546698B (en) | Login system based on servers, login authentication server, and authentication method thereof | |
| TWI673621B (en) | Information registration, authentication method and device | |
| CN115883176B (en) | Software member verification method, device and system | |
| HK1235559A1 (en) | Information registration and authentication method and device | |
| HK1235559A (en) | Information registration and authentication method and device | |
| HK1235559B (en) | Information registration and authentication method and device | |
| CN119808038A (en) | Anonymous identity authentication method, device, electronic device and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |