TWI579728B - Online certificate verification server and method for online certificate verification - Google Patents
Online certificate verification server and method for online certificate verification Download PDFInfo
- Publication number
- TWI579728B TWI579728B TW105134407A TW105134407A TWI579728B TW I579728 B TWI579728 B TW I579728B TW 105134407 A TW105134407 A TW 105134407A TW 105134407 A TW105134407 A TW 105134407A TW I579728 B TWI579728 B TW I579728B
- Authority
- TW
- Taiwan
- Prior art keywords
- authentication
- user
- browser
- server
- request
- Prior art date
Links
Landscapes
- Information Transfer Between Computers (AREA)
Description
本發明係關於一種線上認證技術,詳而言之,係關於一種可跳脫釣魚流程或避免中間人竊聽之線上認證伺服器以及線上認證方法。 The present invention relates to an online authentication technology, in particular, to an online authentication server that can skip the fishing process or avoid middleman eavesdropping and an online authentication method.
隨著網際網路與資訊裝置的普及化,透過網路提供之服務型態也愈來愈多樣化,使用者可透過如個人電腦、筆記型電腦、智慧手機,由網路取得多樣化的資訊服務。舉例來說,使用者可利用電腦經由網路下載軟體、進行線上購物,甚至在手機銀行軟體上進行轉帳或股票買賣。 With the popularity of the Internet and information devices, the types of services provided through the Internet are becoming more diverse. Users can obtain diverse information from the Internet through personal computers, laptops, and smart phones. service. For example, users can use a computer to download software via the Internet, make online purchases, and even transfer money or buy or sell stocks on mobile banking software.
透過網路取得多樣化服務固然方便且有效率,但一直存在資安疑慮,使用者的相關資訊容易被非法截取、複製、破壞、篡改或盜用,當然也包括使用者之資訊裝置受到病毒或其他惡意程式的攻擊。近幾年來,網路詐騙橫行,各種模仿真實官方網站的釣魚網站林立,詐騙者常利用高度仿真之釣魚網站讓使用者誤以為連線至真實的官方網站,進而竊取使用者之帳號與密碼,甚至是關鍵之認證資訊。 It is convenient and efficient to obtain diversified services through the Internet. However, there have always been doubts about the users. The relevant information of users is easily intercepted, copied, destroyed, tampered with or stolen. Of course, the information devices of users are subject to viruses or other information. Attack by a malicious program. In recent years, online scams have been rampant, and various phishing websites that imitate real official websites are often used. Scammers often use highly simulated phishing websites to make users mistakenly think that they are connected to the real official website, thereby stealing the user's account and password. Even the key certification information.
為解決此類釣魚網站詐騙的問題,以往已提出許多解 決技術方案,像是於使用者瀏覽器上安裝附加套件,以於使用者誤連線至釣魚網站時,由瀏覽器提出此為釣魚網站之警告,避免使用者進行後續操作。然此方法需於瀏覽器端安裝客置化軟體,並需建置且需時常維護用於比對那些網址為釣魚網站之資料庫。 In order to solve the problem of such phishing website fraud, many solutions have been proposed in the past. The technical solution, such as installing an additional suite on the user's browser, is used by the browser to warn the phishing website when the user mistakenly connects to the phishing website to prevent the user from performing subsequent operations. However, this method requires the installation of the guest software on the browser side, and needs to be built and needs to be maintained frequently for comparing the databases whose websites are phishing websites.
然而並非所有使用者都有權限或高度資安觀念,故會影響使用者安裝此類客置化軟體於瀏覽器內之願意,倘若懷疑其可信任性而放棄安裝,則可能造成更嚴重的中間人攻擊(Man-in-the-Middle)或中介攻擊(Man-in-the-Browser),危害度更甚於僅竊取帳號和密碼之釣魚網站。故此方案在推廣時常遭逢相當阻力,也難以全面普及。 However, not all users have the right or high security concept, which will affect the user's willingness to install such a customized software in the browser. If you suspect the trustworthiness and give up the installation, it may cause a more serious middle. Man-in-the-Middle or Man-in-the-Browser is more harmful than phishing websites that only steal accounts and passwords. Therefore, this program often encounters considerable resistance during promotion, and it is difficult to fully popularize it.
另外,也有方法致力於釣魚網站的預防搜尋與識別技術,利用搜尋引擎可預先索引以及快取網站內容之機制,提前識別網站是否為詐騙網站。日後使用者搜尋網頁時,可予以排除、過濾、避免列出此釣魚網站,或在搜尋結果上加以標記提醒,以避免使用者連上詐騙網站或釣魚網站。此方法雖然有效,但僅限於網頁搜尋,是難以避免其他方式的詐騙手段,例如:詐騙者利用偽造的電子郵件、或是日益普及之即時通訊軟體傳遞釣魚網站的網址,進而誘騙使用者點擊或連線至惡意網站,故此方法將無法有效的解決問題。 In addition, there are ways to prevent the search and identification technology of phishing websites, and use the mechanism that the search engine can pre-index and cache the content of the website to identify in advance whether the website is a fraudulent website. In the future, when users search the webpage, they can be excluded, filtered, avoid listing the phishing website, or mark the search results to prevent users from connecting to fraudulent websites or phishing websites. Although effective, this method is limited to web search. It is difficult to avoid other ways of fraud. For example, fraudsters use fake emails or increasingly popular instant messaging software to pass the URL of a phishing website, thereby tricking users into clicking or Connecting to a malicious website, this method will not solve the problem effectively.
為了避免釣魚網站有機會騙取使用者之認證資訊,或避免連線資訊封包遭截取,許多網站採用SSL憑證加密傳遞連線資訊,或是採用二階段驗證(Two-factor authentication),也就是除了輸入帳號密碼外,需額外輸入一組動態產生之動態密碼(One Time Password,OTP),又稱一次性密碼,期待藉此降低帳號密碼流出的風險,因為就算帳號密碼遭竊取,但因動態密碼難以預測或無法重複使用,故可有效保護使用者。 In order to prevent phishing websites from having the opportunity to defraud users of authentication information, or to avoid interception of connection information packets, many websites use SSL credentials to encrypt connection information or use two-stage verification (Two-factor). Authentication), in addition to entering the account password, you need to enter a set of dynamically generated One Time Password (OTP), also known as one-time password, expecting to reduce the risk of account password outflow, because even if the account password is Stealing, but because the dynamic password is difficult to predict or can not be reused, it can effectively protect users.
然而前述方法雖大幅降低帳號密碼流出後之風險,但若使用者一開始即連線至詐騙網站或釣魚網站,在使用者不察下,可能一併將帳號、密碼及動態密碼輸入至釣魚網站,此導致動態密碼之保護機制形同虛設,詐騙者在取得使用者之帳號、密碼與動態密碼後,即可轉送至真實官方網站,並進行例如轉帳、變更帳號密碼、變更資料等特權存取,如第1圖所示。 However, although the foregoing method greatly reduces the risk of the account password flowing out, if the user connects to the fraud website or the phishing website from the beginning, the user may not enter it, and may input the account number, password and dynamic password to the phishing website. This causes the protection mechanism of the dynamic password to be ineffective. After obtaining the user's account number, password and dynamic password, the scammer can transfer it to the real official website, and perform privileged access such as transfer, change of account password, change of data, etc., such as Figure 1 shows.
鑒於上述動態密碼遭竊之風險,故有將動態密碼透過第二通道回傳之技術方案,藉此降低使用者誤將關鍵之重要資訊輸入於原先請求登入之網站(第一通道),以避免動態密碼遭竊。如第2圖所示,於異質通道(第二通道)上傳送或回傳動態密碼之方式,可有效避免有心人士於相同通道上(例如使用網路竊聽技術,於電腦上安裝鍵盤側錄程式等)竊取動態密碼等資訊,可大幅提高竊取關鍵資訊之難度。 In view of the risk of the above-mentioned dynamic password being stolen, there is a technical solution for transmitting the dynamic password through the second channel, thereby reducing the user's mistakenly inputting important important information into the website (first channel) originally requested to be logged in to avoid The dynamic password was stolen. As shown in Figure 2, the method of transmitting or returning a dynamic password on a heterogeneous channel (second channel) can effectively prevent people who are interested in installing the keyboard side program on the same channel (for example, using network eavesdropping technology). Etc.) stealing information such as dynamic passwords can greatly increase the difficulty of stealing critical information.
雖有上述解決技術方案,但若使用者一開始即連接到釣魚網站,則仍有資料遭竊的可能。如第3圖所示,主要在於釣魚網站之仿客戶端模擬程式,可模擬成真實使用者與官方網站進行互動,並從中竄改真實使用者提交之相關 資訊,其中,待使用者主動於第二通道回傳認證資訊後,仿客戶端模擬程式接獲官方網站的驗證成功之訊息後,旋即介入流程,回覆真實使用者偽造的執行成功訊息或系統維護中等錯誤訊息,而釣魚網站同時間持續與官方網站進行互動,進行特權存取(例如變更資料、進行轉帳等),待真實使用者發現異狀時,權益早已遭受損失。 Although the above solution is available, if the user connects to the phishing website from the beginning, there is still the possibility of data being stolen. As shown in Figure 3, the main example is the imitation client simulation program of the phishing website, which can simulate the interaction between the real user and the official website, and tamper with the actual user submission. Information, in which after the user takes the initiative to return the authentication information in the second channel, the client simulation program receives the successful verification message from the official website, and immediately intervenes in the process to reply to the real user forged execution success message or system maintenance. A medium error message, while the phishing website continues to interact with the official website at the same time for privileged access (such as changing data, transferring funds, etc.), and the rights have already suffered losses when the real user finds a strange.
異質通道傳送動態密碼之方式雖好,但仍有其風險,特別是一旦使用者連線到釣魚網站且未能察覺時,此時釣魚網站形同一隱形中間人裝置,存在於使用者與官方網站之間,監控著一切往來的資訊,進而竄改使用者資料或執行服務,因為上述方案中,官方網站無法確保與之連線者,是否為真正的使用者或者是中間人裝置。 Although the heterogeneous channel transmits the dynamic password in a good way, it still has its risk, especially when the user connects to the phishing website and is not aware of it. At this time, the phishing website is in the same invisible middleman device and exists on the user and the official website. In the meantime, it monitors all the information, and then tampers with the user's data or performs the service. Because of the above scheme, the official website cannot ensure that the connected person is a real user or a middleman device.
鑑於上述技術方案皆存在無法克服之問題,因此,找出一種安全線上認證機制,特別是,在使用者已連接至釣魚網站下,如何讓使用者可跳脫既有連線,避免釣魚網站有機會偽裝為真實使用者,進而導致後續傷害,遂成為本領域技術人員的重要課題。 In view of the above technical solutions, there are insurmountable problems. Therefore, find a secure online authentication mechanism. In particular, how to allow users to jump off existing connections and avoid phishing websites when users are connected to phishing websites. The opportunity to disguise as a real user, which in turn leads to subsequent injuries, has become an important issue for those skilled in the art.
鑒於前述習知技術之缺點,本發明之目的係提出一種線上認證伺服器以及線上認證方法,利用認證簡碼讓使用者端之瀏覽器,由當前瀏覽之頁面中斷並開啟新連線,把瀏覽頁面導向專屬認證等候頁面,藉此脫離已連線釣魚網站之風險。 In view of the shortcomings of the prior art, the object of the present invention is to provide an online authentication server and an online authentication method, which utilizes the authentication short code to enable the browser of the user terminal to be interrupted by the currently browsed page and open a new connection to browse. The page leads to the exclusive certification waiting page, thereby taking the risk of disconnecting the connected phishing website.
為達成前述目的及其他目的,本發明提出一種線上認 證方法,係包含下列步驟:由使用者透過使用者端之瀏覽器傳送服務請求至服務伺服器;經由該服務伺服器傳送認證請求至認證伺服器;令該認證伺服器依據該認證請求取得該使用者所指定之認證裝置,並傳送認證簡碼至該使用者端,俾供該瀏覽器藉由該認證簡碼重新連線至該認證伺服器指定之網頁介面,以要求該使用者使用該認證裝置執行二階段認證;經由該認證伺服器傳送簽章驗證請求至該認證裝置,並在該認證伺服器接收該認證裝置回傳之數位簽章後,查核該數位簽章後結束該二階段認證;於該數位簽章為正確時,該認證伺服器發送轉址通知至該瀏覽器,以再次轉導該瀏覽器至該服務伺服器並要求連線,或於該數位簽章為不正確時,中斷認證流程;以及該服務伺服器於收到該要求連線時向該認證伺服器確認該二階段認證之結果,進而允許該瀏覽器所提出之服務請求。 In order to achieve the foregoing and other objects, the present invention proposes an online recognition The method includes the following steps: the user transmits a service request to the service server through the browser of the user terminal; transmits an authentication request to the authentication server via the service server; and causes the authentication server to obtain the authentication request according to the authentication request The authentication device specified by the user, and transmitting the authentication short code to the user terminal, for the browser to reconnect to the webpage specified by the authentication server by the authentication short code, so that the user is required to use the authentication device The authentication device performs two-stage authentication; transmits a signature verification request to the authentication device via the authentication server, and after the authentication server receives the digital signature returned by the authentication device, checks the digital signature and ends the second phase Authentication; when the digital signature is correct, the authentication server sends a forwarding notification to the browser to redirect the browser to the service server again and request connection, or the digital signature is incorrect Interrupting the authentication process; and the service server confirms the result of the two-stage authentication to the authentication server upon receiving the request connection, thereby allowing the The proposed service's browser requests.
於一實施例中,該認證裝置回傳該數位簽章係包括該認證裝置直接回傳該數位簽章至該認證伺服器,或是經由該服務伺服器轉傳至該認證伺服器。 In an embodiment, the authenticating device returns the digital signature including the authenticating device directly transmitting the digital signature to the authentication server, or transferring the authentication signature to the authentication server.
於另一實施例中,傳送該認證簡碼至該使用者端係傳送該認證簡碼至該認證裝置,供該使用者輸入該認證簡碼至該瀏覽器之網址列以令該瀏覽器重新連線,或是傳送該認證簡碼至該瀏覽器,以供該使用者點擊該認證簡碼而使該瀏覽器重新連線。 In another embodiment, the authentication short code is transmitted to the user end to transmit the authentication short code to the authentication device, and the user inputs the authentication short code to the browser address list to re-create the browser. Connect, or send the authentication shortcode to the browser for the user to click on the authentication shortcode to reconnect the browser.
於又一實施例中,該瀏覽器與該認證裝置係使用不同通道進行傳輸。 In yet another embodiment, the browser and the authentication device transmit using different channels.
於又再一實施例中,於該使用者透過該瀏覽器傳送該服務請求至該服務伺服器之前,更包括於該認證伺服器中設定用於認證之該認證裝置或設定該瀏覽器可接收該認證伺服器之推播。 In still another embodiment, before the user transmits the service request to the service server through the browser, the method further includes setting, by the authentication server, the authentication device for authentication or setting the browser to receive The push of the authentication server.
本發明更提出一種線上認證伺服器,係於使用者透過使用者端之瀏覽器向服務伺服器提出服務請求時,執行該使用者之身份認證,該線上認證伺服器包括:處理模組,係接收來自服務伺服器之認證請求,以依據該認證請求由預存之對照表取得該使用者所指定之認證裝置;簡碼產生模組,係產生認證簡碼以傳送該認證簡碼至該使用者端,使該瀏覽器藉由該認證簡碼重新連線至指定之網頁介面,以要求該使用者使用該認證裝置執行二階段認證;動態密碼模組,係執行二階段認證,包括傳送簽章驗證請求至該認證裝置,以及接收該認證裝置回傳之數位簽章以查核該數位簽章;以及通知模組,係傳送轉址通知至該瀏覽器以再次轉導該瀏覽器至該服務伺服器,其中,於該服務伺服器向該認證伺服器確認該數位簽章之認證結果後,允許該瀏覽器所提出之服務請求。 The invention further provides an online authentication server, which is configured to perform identity authentication of the user when the user makes a service request to the service server through the browser of the user end, and the online authentication server includes: a processing module, Receiving an authentication request from the service server to obtain an authentication device specified by the user from the pre-stored comparison table according to the authentication request; the short code generation module generates an authentication short code to transmit the authentication short code to the user Ending, the browser reconnects to the designated web interface by the authentication short code to request the user to perform the two-stage authentication using the authentication device; the dynamic password module performs the two-stage authentication, including transmitting the signature Verifying the request to the authentication device, and receiving the digital signature returned by the authentication device to check the digital signature; and notifying the module to transmit the forwarding notification to the browser to redirect the browser to the service server again And after the service server confirms the authentication result of the digital signature to the authentication server, the service requested by the browser is allowed. .
綜上所述,本發明之線上認證伺服器以及線上認證方法,主要在認證階段,透過傳送認證簡碼,讓使用者重新連線至認證介面,在此情況下,即脫離原本釣魚網站連線,並進一步執行後續認證程序,故即便因連上釣魚網站而可能讓帳號密碼遭竊,但仍透過此機制,脫離與隱形中間人裝置的連線,避免在未知情況下,替隱形中間人裝置完成 認證,導致整個資訊完整外流。易言之,本發明可有效地於使用者誤連釣魚網站的情況下跳脫或終止詐騙流程,即透過認證簡碼重新連線至認證介面,可脫離既有連線的可能詐騙風險,並可繼續完成後續的認證流程,或是在認證流程中,因發現隱形中間人裝置而察覺有異,進而識破遭釣魚手法而終止認證流程。 In summary, the online authentication server and the online authentication method of the present invention mainly transmit the authentication short code to the user to re-connect to the authentication interface in the authentication phase. In this case, the original phishing website is disconnected. And further implement the follow-up certification process, so even if the account password is stolen due to the connection to the phishing website, the mechanism is used to disconnect from the invisible intermediary device to avoid the invisible intermediary device in the unknown situation. carry out Certification leads to complete outflow of the entire information. In other words, the present invention can effectively disconnect or terminate the fraud process when the user accidentally connects to the phishing website, that is, re-connect to the authentication interface through the authentication short code, and the risk of possible fraud of the existing connection can be removed. The subsequent certification process can be continued, or in the authentication process, the invisible middleman device is perceived to be different, and the phishing method is terminated to end the authentication process.
5‧‧‧認證伺服器 5‧‧‧Authentication server
51‧‧‧處理模組 51‧‧‧Processing module
52‧‧‧簡碼產生模組 52‧‧‧ Shortcode generation module
53‧‧‧動態密碼模組 53‧‧‧Dynamic crypto module
54‧‧‧通知模組 54‧‧‧Notification module
100‧‧‧瀏覽器 100‧‧‧ browser
200‧‧‧服務伺服器 200‧‧‧Service Server
300‧‧‧認證裝置 300‧‧‧Authorized device
S41~S46‧‧‧步驟 S41~S46‧‧‧Steps
S601~S603‧‧‧流程 S601~S603‧‧‧ Process
S701~S707、S704-1、S704-2、S706’‧‧‧流程 S701~S707, S704-1, S704-2, S706'‧‧‧ Process
S801~S807、S804-1、S804-2、S806’‧‧‧流程 S801~S807, S804-1, S804-2, S806'‧‧‧ flow
S901~S907、S904-1、S904-2、S901’‧‧‧流程 S901~S907, S904-1, S904-2, S901'‧‧‧ flow
S1001~S1007、S1001’‧‧‧流程 S1001~S1007, S1001'‧‧‧ flow
第1圖係現有技術中動態密碼進行認證的可能缺陷之時序圖;第2圖係現有技術中於異質通道下動態密碼進行認證之時序圖;第3圖係現有技術中於異質通道下動態密碼進行認證的可能缺陷之時序圖;第4圖係本發明之線上認證方法之步驟圖;第5圖係本發明之線上認證伺服器之架構示意圖;第6圖係本發明之線上認證方法第一實施態樣之前置階段之流程圖;第7圖係本發明之線上認證方法第一實施態樣之認證階段之流程圖;第8圖係本發明之線上認證方法第二實施態樣之認證階段之流程圖;第9圖係本發明於誤連釣魚網站下第一實施態樣之時序圖;以及第10圖係本發明於誤連釣魚網站下第二實施態樣之 時序圖。 1 is a timing diagram of possible defects in dynamic password authentication in the prior art; FIG. 2 is a timing diagram of dynamic password authentication in a heterogeneous channel in the prior art; and FIG. 3 is a dynamic password in a heterogeneous channel in the prior art. A timing diagram of possible defects for authentication; FIG. 4 is a step diagram of an online authentication method of the present invention; FIG. 5 is a schematic diagram of an architecture of an online authentication server of the present invention; and FIG. 6 is a first method of online authentication of the present invention. A flowchart of a pre-stage of the implementation aspect; FIG. 7 is a flowchart of an authentication phase of the first embodiment of the online authentication method of the present invention; and FIG. 8 is a certification of the second embodiment of the online authentication method of the present invention a flowchart of the stage; FIG. 9 is a timing diagram of the first embodiment of the present invention on the misconnected phishing website; and FIG. 10 is a second embodiment of the present invention under the misconnection phishing website. Timing diagram.
以下係藉由特定的實施例說明本發明之實施方式,熟悉此技術之人士可由本說明書所揭示之內容輕易地瞭解本發明之其他特點與功效。本發明亦可藉由其他不同的具體實施例加以施行或應用。 The embodiments of the present invention are described below by way of specific examples, and those skilled in the art can readily understand other features and functions of the present invention from the disclosure herein. The invention may also be embodied or applied by other different embodiments.
請參閱第4圖,係說明本發明之線上認證方法之步驟圖。當使用者透過瀏覽器發出服務請求時,後端服務伺服器需要認證伺服器協助確認使用者身份,此時為了避免使用者已連線釣魚網站且釣魚網站成為服務伺服器與使用者端的隱形中間人,故本發明提出認證過程中,中斷原本連結,產生一個新連結,故可有效避免後續傷害,本發明之線上認證方法包括下列步驟。 Referring to Figure 4, there is shown a step diagram of the online authentication method of the present invention. When the user sends a service request through the browser, the backend service server needs the authentication server to assist in confirming the identity of the user. In this case, in order to prevent the user from connecting to the phishing website and the phishing website becomes the invisible middle of the service server and the user end. Therefore, the present invention proposes that during the authentication process, the original link is interrupted, and a new link is generated, so that subsequent damage can be effectively avoided. The online authentication method of the present invention includes the following steps.
於步驟S41中,係由使用者透過使用者端之瀏覽器傳送服務請求至服務伺服器。詳言之,此步驟係使用者透過其電子裝置之瀏覽器發送服務請求至服務提供端之服務伺服器,例如銀行網站。 In step S41, the user transmits a service request to the service server through the browser of the user end. In detail, this step is a process in which a user sends a service request through a browser of his electronic device to a service server of the service provider, such as a bank website.
於步驟S42中,係經由該服務伺服器傳送認證請求至認證伺服器。於本步驟中,服務提供端之服務伺服器無法確保使用者是否為合法使用者,故轉而請求認證服務提供端要求協助確認使用者是否合法,此時傳送認證請求至認證服務提供端之認證伺服器,此認證請求將包含該名使用者於服務請求中所輸入之資訊,例如帳號、電話、身份別等。 In step S42, an authentication request is transmitted to the authentication server via the service server. In this step, the service server of the service provider cannot ensure whether the user is a legitimate user, so the requesting authentication service provider requests assistance to confirm whether the user is legal. At this time, the authentication request is transmitted to the authentication service provider. The server, this authentication request will contain the information entered by the user in the service request, such as account number, phone number, identity, and so on.
於步驟S43中,係令該認證伺服器依據該認證請求取得該使用者所指定之認證裝置,並傳送認證簡碼至使用者端,俾供該瀏覽器藉由該認證簡碼重新連線至該認證伺服器指定之網頁介面,以要求該使用者使用該認證裝置執行二階段認證。詳言之,認證伺服器內會存儲使用者相關資料,例如一對照表,記載使用者身份與其對應之認證裝置,例如手機,對照表可能記載人名為王小明,其用於認證手機號碼為0912345678,故認證伺服器可依據認證請求之內容可取得使用者所指定之認證裝置。 In step S43, the authentication server is configured to obtain the authentication device specified by the user according to the authentication request, and send the authentication short code to the user end, and the browser is reconnected to the browser by the authentication short code to The authentication server specifies a web interface to require the user to perform the two-stage authentication using the authentication device. In detail, the authentication server stores user-related data, such as a comparison table, which records the identity of the user and its corresponding authentication device, such as a mobile phone. The reference table may record the name of the person named Wang Xiaoming, which is used to authenticate the mobile phone number as 0912345678. Therefore, the authentication server can obtain the authentication device specified by the user according to the content of the authentication request.
接著,認證伺服器產生認證簡碼以傳送認證簡碼至使用者端,使用者可將此認證簡碼輸入至瀏覽器之網址列,以令瀏覽器重新連線至認證伺服器指定之網頁介面,此網頁介面即導引使用者使用其認證裝置執行二階段認證。 Then, the authentication server generates an authentication short code to transmit the authentication short code to the user end, and the user can input the authentication short code into the address bar of the browser to reconnect the browser to the web interface specified by the authentication server. This web interface guides the user to perform two-stage authentication using their authentication device.
於一實施方案中,傳送認證簡碼至使用者端可為傳送認證簡碼至使用者之認證裝置,使用者由其認證裝置取得認證簡碼後,可將認證簡碼輸入至該瀏覽器之網址列以令瀏覽器重新連線。 In an embodiment, the authentication short code is transmitted to the user end to be an authentication device for transmitting the authentication short code to the user. After the user obtains the authentication short code by the authentication device, the authentication short code may be input to the browser. The URL is listed to reconnect the browser.
於另一實施方案中,傳送認證簡碼至使用者端也可為傳送認證簡碼至使用者其電子裝置之瀏覽器,例如透過推播方式,使用者可直接點擊認證簡碼以使瀏覽器重新連線。 In another embodiment, the transmission authentication short code to the user end may also be a browser for transmitting the authentication short code to the user's electronic device, for example, by pushing the user, the user may directly click the authentication short code to make the browser Reconnect.
於步驟S44中,係經由該認證伺服器傳送簽章驗證請求至該認證裝置,並在該認證伺服器接收該認證裝置回傳之數位簽章後,查核該數位簽章後結束該二階段認證。於本步驟中,在執行二階段認證時,認證伺服器發送一簽章 驗證請求至使用者之認證裝置,若使用者確認此次認證與其有關,則可在接到簽章驗證請求後再回傳一數位簽章,倘若認證伺服器查核該數位簽章無誤後,即完成此次二階段認證,易言之,使用者已通過身份驗證。 In step S44, the signature verification request is transmitted to the authentication device via the authentication server, and after the authentication server receives the digital signature returned by the authentication device, after checking the digital signature, the second-stage authentication is terminated. . In this step, when performing the two-stage authentication, the authentication server sends a signature. To verify the request to the user's authentication device, if the user confirms that the authentication is related to it, the user may return a digital signature after receiving the signature verification request, if the authentication server checks that the digital signature is correct, After completing the second-stage certification, it is easy to say that the user has been authenticated.
於一實施方案中,認證裝置回傳數位簽章可為認證裝置直接回傳數位簽章至認證伺服器。於另一實施方案中,回傳數位簽章還可經由服務伺服器後轉傳至認證伺服器。 In an embodiment, the authentication device returns the digital signature to directly return the digital signature to the authentication server for the authentication device. In another embodiment, the return digital signature can also be forwarded to the authentication server via the service server.
為了確保傳輸通道中的封包被攔截,於本發明中,瀏覽器與認證裝置係使用不同通道進行傳輸,舉例來說,瀏覽器可能透過一般網路封包傳遞,而認證裝置可能為手機,故可採用簡訊執行資料傳輸,故資料竊盜者將不易在異質通道中擷取所有資訊,舉例來說,瀏覽器封包傳遞可在第一通道,而認證裝置資料傳輸可在第二通道。 In order to ensure that the packets in the transmission channel are intercepted, in the present invention, the browser and the authentication device use different channels for transmission. For example, the browser may be transmitted through a general network packet, and the authentication device may be a mobile phone. By using the SMS to perform data transmission, the data thief will not be able to extract all the information in the heterogeneous channel. For example, the browser packet transmission can be in the first channel, and the authentication device data transmission can be in the second channel.
於步驟S45中,係於該數位簽章為正確時,該認證伺服器發送轉址通知至該瀏覽器,以再次轉導該瀏覽器至該服務伺服器並要求連線,或於該數位簽章為不正確時,中斷認證流程。此步驟係說明,當數位簽章為正確時,即該使用者為合法使用者,則由認證伺服器發送轉址通知至使用者之瀏覽器,亦即讓使用者之瀏覽器向認證伺服器發出連線請求。 In step S45, when the digital signature is correct, the authentication server sends a forwarding notification to the browser to redirect the browser to the service server and request connection, or the digital signature. When the chapter is incorrect, the authentication process is interrupted. This step indicates that when the digital signature is correct, that is, the user is a legitimate user, the authentication server sends a forwarding notification to the user's browser, that is, the user's browser is sent to the authentication server. Issue a connection request.
反之,若經認證伺服器查核後,該數位簽章有誤,則中斷認證流程,結束該次二階段認證,亦即認證伺服器認為使用者不為合法使用者,故後續服務伺服器將會收得該使用者不合法之訊息。 On the other hand, if the digital signature is incorrect after checking by the authentication server, the authentication process is interrupted, and the second-stage authentication is terminated. That is, the authentication server considers that the user is not a legitimate user, so the subsequent service server will Receive the message that the user is not legal.
於步驟S46中,係該服務伺服器於收到該要求連線時向該認證伺服器確認該二階段認證之結果,進而允許該瀏覽器所提出之服務請求。於此步驟中,服務伺服器再次向認證伺服器確認該使用者之認證結果,且在認證伺服器回應該此二階段認證完成下,允許瀏覽器連線並執行其提出之服務請求。 In step S46, the service server confirms the result of the two-stage authentication to the authentication server upon receiving the request connection, thereby allowing the service request submitted by the browser. In this step, the service server confirms the authentication result of the user to the authentication server again, and allows the browser to connect and execute the service request made by the authentication server after the completion of the two-stage authentication.
另外,於線上認證方法中,在使用者透過瀏覽器發出服務請求之前,更包括使用者可經由瀏覽器於認證伺服器中設定用於認證之認證裝置,或者是設定其瀏覽器可接收認證伺服器之推播。此為整個線上認證方法的前置設定,若未有上述設定,則無法進行兩階段認證。 In addition, in the online authentication method, before the user sends a service request through the browser, the user may further set the authentication device for authentication in the authentication server via the browser, or set the browser to receive the authentication server. The push of the device. This is the pre-setting of the entire online authentication method. If the above settings are not available, the two-stage authentication cannot be performed.
透過上述步驟,將認證流程中止並於可信賴之第二通道傳遞此次認證之後續入口,且再結合認證裝置之數位簽章的認證機制,將可有效解決使用者誤連釣魚網站所導致之認證資訊遭竊風險,並且可排除中間人竊聽與竄改的機會,大幅增進使用者認證與後續服務之安全性。 Through the above steps, the certification process is suspended and the subsequent entry of the certification is transmitted in the trusted second channel, and combined with the authentication mechanism of the digital signature of the authentication device, the user can be effectively solved by the misconnection of the phishing website. The risk of authentication information being stolen, and the opportunity for middleman eavesdropping and tampering can be ruled out, greatly improving the security of user authentication and follow-up services.
請參閱第5圖,係說明本發明之線上認證伺服器之架構示意圖。如圖所示,線上認證伺服器5於使用者透過瀏覽器100向服務伺服器200提出服務請求時,執行該使用者之身份認證,其中,線上認證伺服器5包括:處理模組51、簡碼產生模組52、動態密碼模組53以及通知模組54。 Please refer to FIG. 5, which is a schematic diagram showing the architecture of the online authentication server of the present invention. As shown in the figure, the online authentication server 5 performs the identity authentication of the user when the user makes a service request to the service server 200 through the browser 100. The online authentication server 5 includes: a processing module 51, and a simple The code generation module 52, the dynamic password module 53, and the notification module 54.
處理模組51接收來自服務伺服器200之認證請求,以依據該認證請求由預存之對照表取得該使用者所指定之認證裝置300。服務伺服器200可例如銀行網站或服務提供 網站,使用者透過其電子裝置之瀏覽器100發送服務請求至服務提供端之服務伺服器200,要求連線登入並執行服務。 The processing module 51 receives the authentication request from the service server 200 to obtain the authentication device 300 designated by the user from the pre-stored comparison table according to the authentication request. The service server 200 can be provided, for example, on a bank website or service. The website, through which the user sends a service request to the service server 200 of the service provider through the browser 100 of the electronic device, requires the connection to log in and execute the service.
另外,線上認證伺服器5內會存儲使用者相關資料,例如對照表,記載使用者與其認證裝置之間的關聯性。另外,瀏覽器與認證裝置係使用不同通道進行傳輸。 In addition, the online authentication server 5 stores user-related data, such as a comparison table, and describes the relationship between the user and the authentication device. In addition, the browser and the authentication device use different channels for transmission.
簡碼產生模組52產生認證簡碼以傳送認證簡碼至使用者端,使瀏覽器100藉由該認證簡碼重新連線至指定之網頁介面,以要求該使用者使用該認證裝置300執行二階段認證。認證簡碼可供使用者重新連線至線上認證伺服器5指定之網頁介面,此可中斷原本連線,對於已連結上釣魚網站而進行認證者,可協助其脫離在釣魚網站為隱形中間人情況下的後續程序,該指定之網頁介面即告知使用者將執行二階段認證。 The short code generation module 52 generates an authentication short code to transmit the authentication short code to the user end, so that the browser 100 reconnects to the specified webpage interface by the authentication short code, so that the user is required to perform the verification using the authentication apparatus 300. Two-stage certification. The authentication short code can be re-wired to the web interface specified by the online authentication server 5, which can interrupt the original connection. For those who have been authenticated by the phishing website, they can help them to be invisible in the phishing website. In the case of a follow-up procedure, the specified web interface informs the user that the second-stage certification will be performed.
關於認證簡碼至使用者端的方法可有兩種,第一種方法為傳送認證簡碼至使用者之認證裝置,以供使用者輸入認證簡碼至瀏覽器之網址列而使瀏覽器重新連線;另外,第二種方法為傳送認證簡碼至瀏覽器,例如透過推播,以供使用者點擊該認證簡碼而使瀏覽器重新連線。 There are two methods for authenticating the shortcode to the user. The first method is to transmit the authentication shortcode to the user's authentication device, so that the user can input the authentication shortcode to the browser's address bar to reconnect the browser. In addition, the second method is to transmit the authentication short code to the browser, for example, by pushing the video, so that the user can click the authentication short code to reconnect the browser.
由上可知,簡碼產生模組52於服務伺服器200提出服務請求之前,更預先設定該認證簡碼由該認證裝置300接收或透過推播方式由該瀏覽器100接收。 As can be seen from the above, the short code generation module 52 pre-sets that the authentication short code is received by the authentication device 300 or received by the browser 100 through the push mode before the service server 200 makes a service request.
動態密碼模組53執行二階段認證,包括傳送簽章驗證請求至該認證裝置300,以及接收該認證裝置300回傳之 數位簽章以查核該數位簽章。在執行二階段認證時,動態密碼模組53發送一簽章驗證請求至使用者之認證裝置300,若使用者確認此次認證無誤,則可回傳一數位簽章,倘若線上認證伺服器5查核該數位簽章無誤後,即完成此次二階段認證,易言之,使用者已通過身份驗證,反之則中斷認證流程。 The dynamic cryptographic module 53 performs two-stage authentication, including transmitting a signature verification request to the authentication device 300, and receiving the return of the authentication device 300. A digital signature to check the digital signature. When performing the two-stage authentication, the dynamic password module 53 sends a signature verification request to the user's authentication device 300. If the user confirms that the authentication is correct, a digital signature can be returned, provided that the online authentication server 5 After checking that the digital signature is correct, the second-stage certification is completed. In other words, the user has passed the authentication, and vice versa, the authentication process is interrupted.
認證裝置300回傳數位簽章的方式亦可有兩種,第一種為認證裝置300直接回傳數位簽章至線上認證伺服器5,另一種則為回傳數位簽章還可經由服務伺服器200後轉傳至線上認證伺服器5。 There are two ways for the authentication device 300 to return the digital signature. The first one is that the authentication device 300 directly returns the digital signature to the online authentication server 5, and the other is that the digital signature is returned and the service servo is also available. The device 200 is then transferred to the online authentication server 5.
通知模組54傳送轉址通知至瀏覽器100以再次轉導該瀏覽器100至服務伺服器200,其中,於服務伺服器200向線上認證伺服器5確認數位簽章之認證結果後,允許該瀏覽器100所提出之服務請求。當數位簽章為正確時,通知模組54發送轉址通知至使用者之瀏覽器100,亦即讓使用者之瀏覽器100向服務伺服器200發出連線請求,此時,服務伺服器200再次向線上認證伺服器5確認該使用者之認證結果,且在線上認證伺服器5回應該此二階段認證完成下,允許瀏覽器100連線並執行其提出之服務請求。 The notification module 54 transmits the forwarding notification to the browser 100 to redirect the browser 100 to the service server 200 again, wherein the service server 200 allows the online authentication server 5 to confirm the authentication result of the digital signature. The service request made by the browser 100. When the digital signature is correct, the notification module 54 sends the forwarding notification to the user's browser 100, that is, the user's browser 100 sends a connection request to the service server 200. At this time, the service server 200 The authentication result of the user is confirmed again to the online authentication server 5, and the online authentication server 5 responds to the completion of the two-stage authentication, allowing the browser 100 to connect and execute its requested service request.
由上可知,本發明提出使用認證簡碼之手段,可使認證流程中止並於可信賴之第二通道傳遞此次認證之後續入口,配合數位簽章之認證機制,將有效解決使用者誤連釣魚網站所導致之認證資訊遭竊風險,以及排除中間人竊聽與竄改的機會。 It can be seen from the above that the present invention proposes to use the method of authenticating the short code, so that the authentication process can be suspended and the subsequent entry of the authentication can be transmitted in the trusted second channel, and the authentication mechanism of the digital signature will effectively solve the user's misconnection. The risk of pirating authentication information caused by phishing websites and the opportunity to exclude middlemen from eavesdropping and tampering.
為了進一步說明本發明所提出之一種跳脫釣魚流程與中間人竊聽的線上認證方法,下面將透過流程圖和時序圖,配合實際操作情況加以說明。此方法中涉及使用者端瀏覽器(B1)、第二通道行動裝置(M1)、認證需求端應用伺服器(R1)、認證服務提供端應用伺服器(P1),且此線上認證方法包含前置作業階段以及認證流程階段,下面將詳述不同態樣以及各階段的處理流程。 In order to further illustrate the online authentication method for the phishing process and the middleman eavesdropping proposed by the present invention, the following will be explained through the flow chart and the timing chart in conjunction with the actual operation. The method includes a user browser (B1), a second channel mobile device (M1), an authentication demand application server (R1), and an authentication service provider application server (P1), and the online authentication method includes the former In the operation phase and the certification process phase, the different aspects and the processing flow of each phase will be detailed below.
請參閱第6圖,係說明本發明之線上認證方法第一實施態樣之前置階段之流程圖。 Please refer to FIG. 6, which is a flow chart showing the pre-stage of the first embodiment of the online authentication method of the present invention.
於流程S601中,使用者在進行認證前,需先使用瀏覽器(B1)連線至認證服務提供端應用伺服器(P1),註冊一個可供識別之唯一使用者帳號。 In the process S601, before the user performs the authentication, the user must first use the browser (B1) to connect to the authentication service provider application server (P1) to register a unique user account that can be identified.
於流程S602中,於認證服務提供端應用伺服器(P1)綁定/初始化至少一組第二通道行動裝置(M1),其中,該第二通道行動裝置(M1)需符合認證服務提供端之認證,並可儲存至少一組私密金鑰,日後可供產生電子簽章用,該第二通道行動裝置(M1)也需具備通訊能力可接受或發送訊息,例如可為手機。 In the process S602, the authentication service provider application server (P1) binds/initializes at least one set of second channel mobile devices (M1), wherein the second channel mobile device (M1) needs to comply with the authentication service provider. Authentication, and can store at least one set of private keys, which can be used for electronic signatures in the future. The second channel mobile device (M1) also needs to have communication capability to receive or send a message, such as a mobile phone.
於流程S603中,使用者需使用瀏覽器(B1)預先連線至認證需求端應用伺服器(R1),並經由該認證需求端應用伺服器(R1)轉導至認證服務提供端應用伺服器(P1),選定至少一組日後適用於驗證之第二通道行動裝置(M1)。 In the process S603, the user needs to use the browser (B1) to pre-wire to the authentication demand application server (R1), and transfer to the authentication service provider application server via the authentication demand application server (R1). (P1), select at least one set of second-channel mobile devices (M1) that are suitable for verification in the future.
經上述流程,即可完成線上認證方法的前置設定,該些設定是為了後續認證時,可快速找出對應該使用者之認 證裝置,這裡所述認證裝置即第二通道行動裝置(M1)。 Through the above process, the pre-setting of the online authentication method can be completed, and the settings are for the subsequent authentication, and the user can be quickly identified. The authentication device, here the authentication device, is the second channel mobile device (M1).
接著請參閱第7圖,係說明本發明之線上認證方法第一實施態樣之認證階段之流程圖,亦即,在通過上述前置設定等流程後,接著可由使用者提出認證。 Referring to FIG. 7, a flowchart of the authentication phase of the first embodiment of the online authentication method of the present invention is illustrated, that is, after passing through the foregoing pre-settings and the like, the user can then submit the authentication.
於流程S701中,使用者使用瀏覽器(B1)連線至認證需求端應用伺服(R1)欲進行特權操作,例如登入、轉帳等。 In the process S701, the user connects to the authentication request application servo (R1) using the browser (B1) to perform privileged operations, such as login, transfer, and the like.
於流程S702中,認證需求端應用伺服器(R1)接獲請求後,向認證服務提供端應用伺服器(P1)提出使用者認證請求。 In the process S702, after the authentication request end application server (R1) receives the request, the authentication service provider application server (P1) submits a user authentication request.
於流程S703中,認證服務提供端應用伺服器(P1)接獲認證請求後,依傳入之參數判斷出該使用者預先綁定之認證裝置,並產生用於本次認證之特定時間內為唯一認證簡碼(下稱簡碼),並將該簡碼傳送至使用者預先綁定之第二通道行動裝置(M1)。 In the process S703, after the authentication service provider application server (P1) receives the authentication request, it determines the authentication device pre-bound by the user according to the parameter passed in, and generates a specific time for the current authentication. A unique authentication short code (hereinafter referred to as a short code), and the short code is transmitted to the second channel mobile device (M1) pre-bound by the user.
於流程S704中,使用者讀取第二通道行動裝置(M1)所接收之簡碼,並將簡碼輸入瀏覽器(B1)之網址列,此動作將使瀏覽器(B1)離開原先訪問之頁面,並連線至認證服務提供端應用伺服器(P1)所指定之網頁介面。另外,前述指定之網頁上會提示使用者需使用第二通道行動裝置(M1)進行二階段驗證,並開始進入倒數等待,等候使用者進行下一步動作。如圖中流程S704-1。 In the process S704, the user reads the short code received by the second channel mobile device (M1), and inputs the short code into the address bar of the browser (B1). This action will cause the browser (B1) to leave the original access. The page is wired to the web interface specified by the authentication service provider application server (P1). In addition, the designated web page prompts the user to use the second channel mobile device (M1) for two-stage verification, and starts to enter the countdown wait, waiting for the user to perform the next action. As shown in the flow of S704-1.
於流程S705中,認證服務提供端應用伺服器(P1)接獲前一個流程之請求後,會再依該次認證階段資訊,發送簽章驗證請求至使用者預先綁定的第二通道行動裝置(M1), 並於第二通道行動裝置(M1)上提示使用者是否同意進行該筆簽章驗證。 In the process S705, after the authentication service provider application server (P1) receives the request of the previous process, it sends the signature verification request to the second channel mobile device pre-bound by the user according to the information of the authentication phase. (M1), And prompting the user on the second channel mobile device (M1) whether to agree to the signature verification.
於流程S706中,使用者檢視第二通道行動裝置(M1)上所提示之訊息後,如同意放行該筆認證,則使用第二通道行動裝置(M1)上所提供之功能,進行本次認證挑戰資訊的簽章,並將此數位簽章回傳至認證服務提供端應用伺服器(P1)。 In the process S706, after the user views the message presented on the second channel mobile device (M1), if the user agrees to release the authentication, the user provides the authentication using the function provided on the second channel mobile device (M1). Challenge the signing of the information and return the digital signature to the authentication service provider application server (P1).
另外,亦可將此數位簽章經由認證需求端應用伺服器(R1)轉回傳至認證服務提供端應用伺服器(P1),如圖中流程S706’所示。當然,流程S706和流程S706’擇一即可。 Alternatively, the digital signature may be transferred back to the authentication service provider application server (P1) via the authentication demand application server (R1), as shown in flow S706' in the figure. Of course, the process S706 and the process S706' can be selected.
接著如流程S704-2所示,認證服務提供端應用伺服器(P1)在收到本次認證回傳之簽章後,查核該簽章是否正確。假如正確,則停止S704-1之等待迴圈,並送出轉址通知給使用者端瀏覽器(B1),將頁面轉導至認證需求端應用伺服器(R1),反之,若簽章不正確,則中斷認證流程。 Then, as shown in the process S704-2, the authentication service provider application server (P1) checks whether the signature is correct after receiving the signature of the authentication return. If it is correct, stop the waiting loop of S704-1, and send the forwarding notification to the user browser (B1), and forward the page to the authentication request application server (R1). Otherwise, if the signature is incorrect. , the authentication process is interrupted.
於流程S707中,認證需求端應用伺服器(R1)於收到使用者端瀏覽器(B1)所發出之S704-2的請求後,隨即再向認證服務提供端應用伺服器(P1)重複確認使用者是否已通過認證。假如正確,則允許S704-2的存取,若錯誤,則拒絕使用者連線。 In the process S707, after the authentication request end application server (R1) receives the request of S704-2 sent by the user browser (B1), it then repeats the confirmation to the authentication service provider application server (P1). Whether the user has passed the certification. If it is correct, the access of S704-2 is allowed, and if it is wrong, the user is refused to connect.
由上可知,使用認證簡碼可使認證流程中止並於可信賴之第二通道傳遞此次認證之後續入口,配合數位簽章之認證機制,將有效解決使用者誤連釣魚網站所導致之認證資訊遭竊風險,以及排除中間人竊聽與竄改的機會。 It can be seen from the above that the authentication short code can be used to terminate the authentication process and pass the subsequent entry of the authentication in the trusted second channel. The authentication mechanism of the digital signature will effectively solve the authentication caused by the user misconnecting the phishing website. The risk of information theft and the opportunity to exclude middlemen from eavesdropping and tampering.
請參閱第8圖,係說明本發明之線上認證方法第二實施態樣之認證階段之流程圖。須說明者,在此實施例中,執行線上認證前,同樣要完成前置設定,其與第6圖所述流程相似,同樣是為了後續認證時,可快速找出對應該使用者之認證裝置(即第二通道行動裝置(M1)),故不再贅述,接著,下列直接說明使用者提出請求後的認證流程。 Please refer to FIG. 8 , which is a flow chart showing the authentication phase of the second embodiment of the online authentication method of the present invention. It should be noted that in this embodiment, before performing online authentication, the pre-setting is also completed, which is similar to the process described in FIG. 6, and is also for quickly identifying the authentication device corresponding to the user for subsequent authentication. (ie, the second channel mobile device (M1)), so it will not be described again. Next, the following directly explains the authentication process after the user makes the request.
於流程S801中,使用者使用瀏覽器(B1)連線至認證需求端應用伺服(R1)欲進行特權操作,例如登入、轉帳等。 In the process S801, the user uses the browser (B1) to connect to the authentication request application servo (R1) for privileged operations, such as login, transfer, and the like.
於流程S802中,認證需求端應用伺服器(R1)接獲請求後,向認證服務提供端應用伺服器(P1)提出使用者認證請求。 In the process S802, after the authentication request end application server (R1) receives the request, the authentication service provider application server (P1) submits a user authentication request.
於流程S803中,認證服務提供端應用伺服器(P1)接獲認證請求後,依傳入之參數判斷出該使用者預先綁定之認證裝置,並產生用於本次認證之特定時間內為唯一認證簡碼(下稱簡碼),並將該簡碼利用推播技術或相關類似技術,傳送至使用者預先授權之使用者端瀏覽器(B1)。 In the process S803, after the authentication service provider application server (P1) receives the authentication request, it determines the authentication device pre-bound by the user according to the incoming parameter, and generates a specific time for the current authentication. The unique authentication short code (hereinafter referred to as short code), and the short code is transmitted to the user-preferred user browser (B1) by using push technology or related similar technology.
於流程S804中,使用者端瀏覽器(B1)接收前述推播之簡碼後,使用者可點擊簡碼中之連結,此動作將使瀏覽器(B1)離開原先訪問之頁面,並連線至認證服務提供端應用伺服器(P1)指定之網頁介面。另外,前述指定之網頁上會提示使用者需使用第二通道行動裝置(M1)進行二階段驗證,並開始進入倒數等待,等候使用者進行下一步動作,如圖中之步驟S804-1。 In the process S804, after the user browser (B1) receives the short code of the push, the user can click the link in the short code, and the action will cause the browser (B1) to leave the original visited page and connect. Go to the web interface specified by the authentication service provider application server (P1). In addition, the designated webpage prompts the user to use the second channel mobile device (M1) for two-stage verification, and starts to enter the countdown wait, waiting for the user to perform the next action, as shown in step S804-1.
於流程S805中,認證服務提供端應用伺服器(P1)接獲 前一個流程之請求後,會再依該次認證階段資訊,發送簽章驗證請求至使用者預先綁定的第二通道行動裝置(M1),並於第二通道行動裝置(M1)上提示使用者是否同意進行該筆簽章驗證。 In the process S805, the authentication service provider application server (P1) receives the solution. After the request of the previous process, the signature verification request is sent to the second channel mobile device (M1) pre-bound by the user according to the information of the authentication phase, and the second channel mobile device (M1) is prompted to use. Whether the person agrees to carry out the signature verification.
於流程S806中,使用者檢視第二通道行動裝置(M1)上所提示之訊息後,如同意放行該筆認證,則使用第二通道行動裝置(M1)上所提供之功能,進行本次認證挑戰資訊的簽章,並將此數位簽章回傳至認證服務提供端應用伺服器(P1)。 In the process S806, after the user views the message presented on the second channel mobile device (M1), if the user agrees to release the authentication, the user provides the authentication using the function provided on the second channel mobile device (M1). Challenge the signing of the information and return the digital signature to the authentication service provider application server (P1).
另外,也可將此數位簽章經由認證需求端應用伺服器(R1)轉回傳至認證服務提供端應用伺服器(P1),如圖中流程S806’所示,其中,流程S806和流程S806’擇一即可。 In addition, the digital signature can also be transferred back to the authentication service provider application server (P1) via the authentication demand application server (R1), as shown in the process S806', where the process S806 and the process S806 'You can choose one.
接著如流程S804-2所示,認證服務提供端應用伺服器(P1)在收到本次認證回傳之簽章後,查核該簽章是否正確。假如正確,則停止S804-1之等待迴圈,並送出轉址通知給使用者端瀏覽器(B1),將頁面轉導至認證需求端應用伺服器(R1),反之,若簽章不正確,中斷認證流程。 Then, as shown in the process S804-2, the authentication service provider application server (P1) checks whether the signature is correct after receiving the signature of the authentication return. If it is correct, stop the waiting loop of S804-1, and send the forwarding notification to the user browser (B1), and forward the page to the authentication request application server (R1). Otherwise, if the signature is incorrect. , interrupt the certification process.
於流程S807中,認證需求端應用伺服器(R1)在收到使用者端瀏覽器(B1)發出之S804-2的請求後,隨即再向認證服務提供端應用伺服器(P1)重複確認使用者是否已通過認證,假如正確,則允許S804-2的存取,若錯誤,則拒絕使用者連線。 In the process S807, after receiving the request of S804-2 sent by the user-side browser (B1), the authentication request-side application server (R1) then repeatedly confirms the use to the authentication service provider application server (P1). Whether the user has passed the authentication, if it is correct, the access of S804-2 is allowed, and if it is wrong, the user is refused to connect.
上述皆說明使用者要求服務時如何進行認證,接著針對使用者使誤連上釣魚網站時,本發明所提出之線上認證 方法的流程。具體來說,第9圖和第10圖可分別搭配第7圖以及第8圖,最大差異處在於第7圖流程S701以及第8圖流程S801,即在使用者端瀏覽器(B1)要連線認證需求端應用伺服器(R1)時,中間被釣魚網站之仿客戶端模擬程式攔截,並模擬為真實用戶,則此釣魚網站將成為隱形中間人裝置,倘若使用者不知情下,可能還替此釣魚網站完成認證,讓此釣魚網站替代真實使用者連線至認證需求端應用伺服器(R1)來執行服務,例如轉帳或竄改密碼。 The above describes how the user authenticates when the user requests the service, and then the online authentication proposed by the present invention when the user accidentally connects to the phishing website. The flow of the method. Specifically, FIG. 9 and FIG. 10 can be respectively matched with FIG. 7 and FIG. 8 respectively, and the biggest difference lies in the flow S701 of FIG. 7 and the flow S801 of FIG. 8, that is, the browser of the user side (B1) is connected. When the line authentication demand side application server (R1) is intercepted by the imitation client simulation program of the phishing website and simulated as a real user, the phishing website will become an invisible middleman device, and if the user does not know, it may still The phishing website is certified to allow the phishing website to connect to the authentication demand application server (R1) instead of the real user to perform services such as transferring funds or tampering with the password.
因此,可將第7圖流程S701可視為第9圖中的S901和S901’,因為中間被釣魚網站攔截,即使用者端瀏覽器(B1)傳送登入請求S901至釣魚網站(已誤連釣魚網站)以及釣魚網站竄改部分內容,並轉向認證需求端應用伺服器(R1)發出登入請求S901’。同理,第8圖流程S801可視為第10圖中的S1001和S1001’,因為中間也被釣魚網站攔截,即使用者端瀏覽器(B1)傳送登入請求S1001至釣魚網站(已誤連釣魚網站)以及釣魚網站竄改部分內容,並轉向認證需求端應用伺服器(R1)發出登入請求S1001’。 Therefore, the process S701 of FIG. 7 can be regarded as S901 and S901' in FIG. 9 because the middle is intercepted by the phishing website, that is, the user-side browser (B1) transmits the login request S901 to the phishing website (the phishing website has been mistakenly connected) And the phishing website tampers with part of the content and goes to the authentication demand side application server (R1) to issue a login request S901'. Similarly, the process S801 of FIG. 8 can be regarded as S1001 and S1001' in FIG. 10, because the middle is also intercepted by the phishing website, that is, the user-side browser (B1) transmits the login request S1001 to the phishing website (the phishing website has been mistakenly connected) And the phishing website tampers with part of the content and goes to the authentication demand side application server (R1) to issue a login request S1001'.
如第9圖所示,係說明本發明於誤連釣魚網站下第一實施態樣之時序圖。釣魚詐騙網站於流程開始時,寄發詐騙信件、簡訊或利用社交通訊軟體,誘騙使用者點擊偽造之連結,進而讓使用者誤連至高度仿真之假銀行官方網站(即釣魚網站),並提示訊息誘導使用者需進行登入以進行後續操作。使用者此時因未能察覺此為釣魚詐騙網站,而向釣魚網站指定之仿客戶端模擬程式送出登入請求,如圖 中流程S901。 As shown in Fig. 9, a timing chart of the first embodiment of the present invention under the misconnection phishing website is described. At the beginning of the process, the phishing website sends fraudulent letters, newsletters or social communication software to trick users into clicking fake links, which in turn allows users to accidentally connect to the highly simulated fake bank official website (ie phishing website) and prompt The message induces the user to log in for subsequent operations. At this time, the user failed to detect this as a phishing scam website, and sent a login request to the phishing client-specified client emulation program, as shown in the figure. In the process S901.
透過本發明所述機制,使用者應已了解在任何認證步驟中,皆無需填入關鍵的機密認證資訊,例如密碼,而僅需提供簡易且公開之識別資訊即可,例如銀行帳號。不僅如此,在輸入完簡易且公開之識別資訊後,初期認證流程應已完成,網頁上只會顯示如“您已提交認證請求”之簡易提示資訊,而此時網頁已無效,正常來說不會在網頁上要求使用者繼續任何步驟。如果釣魚網站想多竊取更多資訊,或誘使用戶在該網頁進行後續操作時,使用者將會查覺異狀,進而識破詐騙的意圖。因此,即便完成此流程中,釣魚網站僅能竊取到無關痛癢的公開資訊。 Through the mechanism of the present invention, the user should have understood that in any authentication step, it is not necessary to fill in key confidential authentication information, such as a password, but only need to provide simple and open identification information, such as a bank account number. Not only that, after entering the simple and open identification information, the initial certification process should be completed, and only the simple prompt information such as “You have submitted the authentication request” will be displayed on the webpage. At this time, the webpage is invalid. Normally, it is not. The user will be asked to continue any steps on the web page. If the phishing website wants to steal more information or induce users to follow up on the page, the user will detect the abnormality and then understand the intention of fraud. Therefore, even if this process is completed, the phishing website can only steal public information that is irrelevant.
在流程S901’中,釣魚詐騙網站接到此請求時竄改部分內容,並偽裝自己為真實使用者向認證需求端應用伺服器(R1)/銀行,轉送登入請求。 In the process S901', the phishing website tampers with part of the content upon receiving the request, and pretends that it is the real user to the authentication request end application server (R1)/bank, and forwards the login request.
在流程S902中,認證需求端應用伺服器(R1)在接受到認證請求後,轉送此認證請求至認證服務提供端應用伺服器(P1)以進行後續的認證流程。 In the process S902, after the authentication request application server (R1) receives the authentication request, the authentication request is forwarded to the authentication service provider application server (P1) for the subsequent authentication process.
在流程S903中,認證服務提供端應用伺服器(P1)在收到認證請求後,依傳入之參數判斷出該使用者預先綁定之認證裝置,並產生用於本次認證之特定時間內為唯一簡碼,並將該簡碼傳送至使用者預先綁定之第二通道行動裝置(M1)。 In the process S903, after receiving the authentication request, the authentication service provider application server (P1) determines the authentication device pre-bound by the user according to the incoming parameter, and generates a specific time for the current authentication. It is a unique shortcode and is transmitted to the second channel mobile device (M1) that the user pre-binds.
在流程S904中,使用者從第二通道行動裝置(M1)獲取認證簡碼後,將此簡碼輸入至使用者端瀏覽器(B1)之網址 列並按下執行,輸入方式可為鍵盤輸入或使用例如藍芽、NFC等方式,此將導致使用者端瀏覽器(B1)當前瀏覽之頁面中斷(例如當前頁面非空白頁面時),並開啟新連線將瀏覽頁面導向認證服務提供端應用伺服器(P1)所指定之專屬認證等候頁面(此頁面於單一時效內僅專屬於該使用者),如圖中流程S904-1,且如有需要,亦可實作檢查先前於註冊服務階段,埋藏於瀏覽器中僅限認證服務提供端應用伺服器(P1)可讀取的“檢查密鑰”是否相符,如不相符則中斷認證流程。 In the process S904, after the user obtains the authentication short code from the second channel mobile device (M1), the short code is input to the URL of the user browser (B1). Column and press to execute, the input mode can be keyboard input or use, for example, Bluetooth, NFC, etc., which will cause the user browser (B1) to browse the page currently interrupted (for example, when the current page is not blank), and open The new connection will browse the page to the exclusive authentication waiting page specified by the authentication service provider application server (P1) (this page is exclusive to the user within a single aging), as shown in the flow S904-1 in the figure, and if If necessary, you can also check whether the "check key" that can be read by the application server (P1) of the authentication service provider is buried in the browser during the registration service phase. If it does not match, the authentication process is interrupted.
在流程S904-1等待過程中,使用者端瀏覽器(B1)將提示使用者需於第二通道行動裝置(M1)上進行認證放行,在被核准放行前畫面將持續倒數等待,直到使用者通過放行驗證,或倒數結束中止驗證流程為止。 During the waiting process of the process S904-1, the user-side browser (B1) will prompt the user to perform the authentication release on the second channel mobile device (M1), and the screen will continue to count down until the user is approved before releasing. The verification process is terminated by release verification or by the end of the countdown.
於使用者端瀏覽器(B1)進行流程S904-1的等待過程中,認證服務提供端應用伺服器(P1)則會送出本次認證的簽章請求給第二通道行動裝置(M1),如圖中流程S905。使用者在第二通道行動裝置(M1)提示後,判斷是否進行本次認證的放行。如同意放行該筆認證,則使用第二通道行動裝置(M1)上所提供之功能,進行本次認證挑戰資訊的簽章,並將此數位簽章回傳至認證服務提供端應用伺服器(P1),如圖中流程S906。 During the waiting process of the process S904-1 by the client browser (B1), the authentication service provider application server (P1) sends the signature request of the authentication to the second channel mobile device (M1), such as Flow S905 in the figure. After the second channel mobile device (M1) prompts the user, it is determined whether the release of the authentication is performed. If you agree to release the certification, use the function provided on the second channel mobile device (M1) to sign the certification challenge information and return the digital signature to the authentication service provider application server ( P1), as shown in the flow S906 in the figure.
認證服務提供端應用伺服器(P1)在收到本次認證回傳之簽章後,查核該簽章是否正確。如正確,則停止流程S904-1之等待迴圈,並送出轉址通知給使用者端瀏覽器 (B1),將頁面轉導至認證需求端應用伺服器(R1)/銀行,如圖中流程S904-2。如簽章不正確,則中斷認證流程。 After receiving the signature of this authentication return, the authentication service provider application server (P1) checks whether the signature is correct. If it is correct, stop the waiting loop of process S904-1, and send the forwarding notification to the user browser. (B1), the page is forwarded to the authentication demand side application server (R1)/bank, as shown in the flow S904-2. If the signature is incorrect, the certification process is interrupted.
認證需求端應用伺服器(R1)/銀行在收到使用者端瀏覽器(B1)發出之流程S904-2的請求後,隨即再向認證服務提供端應用伺服器(P1)重複確認使用者是否已通過認證,如圖中流程S907,若正確則允許流程S904-2的存取,並設定已通過認證,此時使用者已正確完成認證,反之若錯誤,則拒絕使用者連線。 After the authentication request end application server (R1)/bank receives the request of the process S904-2 sent by the user browser (B1), it then repeats to the authentication service provider application server (P1) to confirm whether the user is The user has passed the authentication, as shown in the process S907 in the figure. If it is correct, the access of the process S904-2 is allowed, and the authentication has been set, and the user has correctly completed the authentication. Otherwise, if the error occurs, the user is denied the connection.
特別的是,在流程S903中傳送的認證簡碼,將在可信任的通道或利用加密的方法,傳送到第二通道行動裝置(M1)上,除非可信任的第二通道行動裝置(M1)也被惡意人士所挾持或破解,不然除了真實使用者外,當無人可知此認證簡碼,換言之,惡意人士無法輕易得知而進行流程S904的動作。 In particular, the authentication short code transmitted in the process S903 will be transmitted to the second channel mobile device (M1) on a trusted channel or by means of encryption, unless the trusted second channel mobile device (M1) It is also held or cracked by a malicious person. Otherwise, except for the real user, when no one knows the authentication short code, in other words, the malicious person cannot easily know the action of the process S904.
退步言之,倘若惡意人士暴力破解或猜出簡碼,透過適當保護設計,如前述檢查埋藏於瀏覽器中僅限認證服務提供端應用伺服器(P1)可讀取的“檢查密鑰”是否相符之機制,也無法通過流程S904-1中的查核。另外,由於流程S904是由使用者發起另一階段的連線,即“自行連線”至認證服務提供端應用伺服器(P1),此連線階段可使用SSL或類似之加密機制加密,因此,透過本發明所述方法,由於使用者不再是連線至釣魚網站,故就算先前誤連釣魚網站也沒有關係,此機制下已跳脫釣魚詐騙的流程,因而就算是惡意人士使用網路竊聽之機制,因已連線至正確的網 站且連線已正確加密,因而僅能竊聽到加密後之訊息。 Regressively, if a malicious person violently cracks or guesses a shortcode, through proper protection of the design, such as the aforementioned check buried in the browser, only the "check key" readable by the authentication service provider application server (P1) is The matching mechanism cannot be checked by the process in S904-1. In addition, since the process S904 is initiated by the user to initiate another phase of connection, that is, "self-connection" to the authentication service provider application server (P1), the connection phase can be encrypted using SSL or a similar encryption mechanism, so According to the method of the present invention, since the user is no longer connected to the phishing website, even if the phishing website is previously misconnected, the phishing scam process has been detached, and even the malicious person uses the network. The mechanism of eavesdropping, because it has been connected to the correct network The station and the connection are properly encrypted, so only the encrypted message can be hacked.
如第10圖所示,係說明本發明於誤連釣魚網站下第二實施態樣之時序圖。須說明者,第二實施態樣與第一實施態樣多數步驟相似,兩者最大差異在於取得認證簡碼方式不同,第一實施態樣(第9圖)是將簡碼傳送至第二通道行動裝置(M1),而第二實施態樣(第10圖)是將簡碼推播至使用者端瀏覽器(B1),接著透過輸入或點擊而令使用者端瀏覽器(B1)重新導向至正確伺服器,即認證服務提供端應用伺服器(P1),故可跳脫原本連線,免於持續在釣魚網站下的風險。因此,第10圖流程將不再逐一詳述。 As shown in Fig. 10, a timing chart of the second embodiment of the present invention under the misconnection phishing website will be described. It should be noted that the second embodiment is similar to the majority of the steps in the first embodiment. The biggest difference between the two is that the authentication short code is obtained. The first embodiment (Fig. 9) transmits the short code to the second channel. The mobile device (M1), and the second embodiment (Fig. 10) pushes the short code to the user-side browser (B1), and then redirects the user-side browser (B1) through input or click. To the correct server, that is, the authentication service provider application server (P1), it can jump off the original connection, avoiding the risk of continuing on the phishing website. Therefore, the process of Figure 10 will not be detailed one by one.
綜上所述,本發明係提出一種線上認證方法以及線上認證伺服器,透過本發明所述機制,即使使用者誤連釣魚詐騙網站,因原先發起之認證流程於本發明中無需輸入任何密碼資訊,且流程固定會中斷,有心人士將無法竊取任何機密資訊。再者,因本發明中後續之認證入口是由認證服務伺服器透過預先註冊之可信任之第二通道通知,並藉此重新發起認證流程,因此能有效中斷/跳脫原先的釣魚網站,並重新導向正確且真實之認證入口以完成原先欲完成的認證任務。因此,本發明能有效解決習知認證技術中認證資訊被側錄,或者因誤入釣魚網站導致身分被盜用或被偽造使用者身分後進行特權操作等問題。 In summary, the present invention provides an online authentication method and an online authentication server. Through the mechanism of the present invention, even if a user accidentally connects to a phishing website, the original authentication process does not require any password information to be input in the present invention. And the process will be interrupted, and people who are interested will not be able to steal any confidential information. Furthermore, since the authentication portal in the present invention is notified by the authentication service server through the pre-registered trusted second channel, and thereby re-initiating the authentication process, the original phishing website can be effectively interrupted/ridden, and Redirect the correct and authentic authentication portal to complete the original certification task. Therefore, the present invention can effectively solve the problem that the authentication information is side-recorded in the conventional authentication technology, or the privileged operation is performed after the identity is stolen or the user is falsified due to being mistakenly entered into the phishing website.
上述實施例僅例示性說明本發明之原理及其功效,而非用於限制本發明。任何熟習此項技藝之人士均可在不違背本發明之精神及範疇下,對上述實施例進行修飾與改 變。因此,本發明之權利保護範圍,應如後述之申請專利範圍所列。 The above-described embodiments are merely illustrative of the principles of the invention and its effects, and are not intended to limit the invention. Anyone skilled in the art can modify and modify the above embodiments without departing from the spirit and scope of the present invention. change. Therefore, the scope of protection of the present invention should be as set forth in the scope of the claims described below.
S41~S46‧‧‧步驟 S41~S46‧‧‧Steps
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW105134407A TWI579728B (en) | 2016-10-25 | 2016-10-25 | Online certificate verification server and method for online certificate verification |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW105134407A TWI579728B (en) | 2016-10-25 | 2016-10-25 | Online certificate verification server and method for online certificate verification |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TWI579728B true TWI579728B (en) | 2017-04-21 |
| TW201816652A TW201816652A (en) | 2018-05-01 |
Family
ID=59240919
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW105134407A TWI579728B (en) | 2016-10-25 | 2016-10-25 | Online certificate verification server and method for online certificate verification |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI579728B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI652594B (en) | 2017-05-10 | 2019-03-01 | 周宏建 | Authentication method for login |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070094337A1 (en) * | 2005-10-21 | 2007-04-26 | Klassen Gerhard D | Instant messaging device/server protocol |
| TW200805180A (en) * | 2006-07-14 | 2008-01-16 | Arachnoid Biometrics Identification Group Corp | System and method for registering a fingerprint, setting a login method of an application, and logining in the application |
| TW201019684A (en) * | 2008-11-14 | 2010-05-16 | Acer Inc | Two stage login IM architecture |
-
2016
- 2016-10-25 TW TW105134407A patent/TWI579728B/en not_active IP Right Cessation
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070094337A1 (en) * | 2005-10-21 | 2007-04-26 | Klassen Gerhard D | Instant messaging device/server protocol |
| TW200805180A (en) * | 2006-07-14 | 2008-01-16 | Arachnoid Biometrics Identification Group Corp | System and method for registering a fingerprint, setting a login method of an application, and logining in the application |
| TW201019684A (en) * | 2008-11-14 | 2010-05-16 | Acer Inc | Two stage login IM architecture |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI652594B (en) | 2017-05-10 | 2019-03-01 | 周宏建 | Authentication method for login |
Also Published As
| Publication number | Publication date |
|---|---|
| TW201816652A (en) | 2018-05-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11405380B2 (en) | Systems and methods for using imaging to authenticate online users | |
| TWI522836B (en) | Network authentication method and system for secure electronic transaction | |
| JP6648110B2 (en) | System and method for authenticating a client to a device | |
| CA2875503C (en) | Enterprise triggered 2chk association activation | |
| JP4861417B2 (en) | Extended one-time password method and apparatus | |
| US20100088766A1 (en) | Method and system for detecting, blocking and circumventing man-in-the-middle attacks executed via proxy servers | |
| KR101028882B1 (en) | OTP user authentication system and method using a mobile terminal | |
| WO2013184267A1 (en) | Enhanced 2chk authentication security with query transactions | |
| JP7702404B2 (en) | SYSTEM AND METHOD FOR PROTECTION AGAINST MALICIOUS PROGRAM CODE INJECTION - Patent application | |
| JP6370771B2 (en) | Method and system for providing secure transactions using cyber IDs | |
| CN102667799A (en) | Access control system, authentication server system, and access control program | |
| JP2008282212A (en) | Authentication device and authentication system | |
| TWI579728B (en) | Online certificate verification server and method for online certificate verification | |
| CN113032761B (en) | Securing remote authentication | |
| TWI778319B (en) | Method for cross-platform authorizing access to resources and authorization system thereof | |
| CN107979575A (en) | Online authentication server and online authentication method | |
| JP7539427B2 (en) | Authentication system and computer program | |
| US20250097038A1 (en) | Full-Duplex Password-less Authentication | |
| HK40081382A (en) | System and method for protection against malicious program code injection | |
| HK1246933B (en) | Airborne terminal payment authentication method, device and system | |
| HK1220297B (en) | Method for verifying secruity data, system, and a computer-readable storage device | |
| HK1207713B (en) | Enterprise triggered 2chk association |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |