[go: up one dir, main page]

TWI715500B - Authentication system and authentication method - Google Patents

Authentication system and authentication method Download PDF

Info

Publication number
TWI715500B
TWI715500B TW109116734A TW109116734A TWI715500B TW I715500 B TWI715500 B TW I715500B TW 109116734 A TW109116734 A TW 109116734A TW 109116734 A TW109116734 A TW 109116734A TW I715500 B TWI715500 B TW I715500B
Authority
TW
Taiwan
Prior art keywords
controller
key
file
authentication
electronic device
Prior art date
Application number
TW109116734A
Other languages
Chinese (zh)
Other versions
TW202046675A (en
Inventor
方耀德
宋明勳
Original Assignee
聯陽半導體股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 聯陽半導體股份有限公司 filed Critical 聯陽半導體股份有限公司
Priority to CN202010488875.6A priority Critical patent/CN112069493B/en
Priority to US16/894,889 priority patent/US11509655B2/en
Publication of TW202046675A publication Critical patent/TW202046675A/en
Application granted granted Critical
Publication of TWI715500B publication Critical patent/TWI715500B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An authentication system and an authentication method are provided. The electronic apparatus of the authentication system includes a controller, a processor and a key module, wherein the processor performs a application. In a binding phase, the application generates a digest file according to a key factor information and stores the digest file in a digest table of the electronic apparatus. In a checking phase, the application determines whether the controller is corresponded to a binding device according to the digest file and the key factor information. If the controller is corresponded to the binding device, in an authentication phase, the controller performs an authentication operation of a universal second factor service with a server apparatus according to the digest file corresponding to the binding device in response to a pressing of the key module.

Description

認證系統及認證方法Authentication system and authentication method

本發明是有關於一種認證系統及認證方法,且特別是有關於一種基於FIDO(Fast Identity Online Alliance)聯盟所制訂的通用第二因素(Universal 2nd Factor,U2F)協定而開發的認證系統及認證方法。The present invention relates to an authentication system and an authentication method, and in particular to an authentication system and an authentication method developed based on the Universal 2nd Factor (U2F) agreement formulated by the FIDO (Fast Identity Online Alliance) alliance .

隨著網路技術快速的發展,許多的重要訊息的傳送、商業交易或是金融交易多仰賴網路來提供服務。為了提高網路使用上的安全性,許多網站開始支援通用第二因素(Universal 2nd Factor,U2F)協定的驗證方式。然而,使用者必須額外購買一個特地針對通用第二因素協定所設計製造的實體金鑰裝置,方能透過電腦使用伺服器網站所支援的通用第二因素協定的驗證服務。如此一來,將會增加使用者的成本,從而降低使用者的使用意願。With the rapid development of Internet technology, the transmission of many important messages, commercial transactions, or financial transactions rely on the Internet to provide services. In order to improve the security of Internet usage, many websites have begun to support the verification method of Universal 2nd Factor (U2F) protocol. However, the user must purchase an additional physical key device specially designed and manufactured for the universal second-factor protocol in order to use the authentication service of the universal second-factor protocol supported by the server website through the computer. As a result, it will increase the user's cost, thereby reducing the user's willingness to use.

有鑑於此,本發明提供一種認證系統及認證方法,不僅可讓使用者使用網站所支援的通用第二因素協定的驗證服務,更可降低使用者的使用成本,從而提高使用者的使用意願。In view of this, the present invention provides an authentication system and an authentication method, which not only allows users to use the authentication service of the universal second-factor protocol supported by the website, but also reduces the user's use cost, thereby increasing the user's willingness to use.

本發明的認證系統包括電子裝置。電子裝置包括控制器、處理器及按鍵模組。控制器具有摘要表格。處理器耦接控制器,且用以執行應用程式。按鍵模組耦接控制器,且受控於控制器。於綁定階段,應用程式根據金鑰因素資訊產生摘要檔案,並將摘要檔案儲存在電子裝置的摘要表格中。於查驗階段,應用程式根據摘要檔案以及金鑰因素資訊判斷控制器是否對應綁定裝置。若控制器對應綁定娤置,則於認證階段,控制器反應於按鍵模組的按壓而根據綁定裝置對應的摘要檔案而與伺服器裝置進行通用第二因素服務的認證運作。The authentication system of the present invention includes an electronic device. The electronic device includes a controller, a processor, and a button module. The controller has a summary table. The processor is coupled to the controller and used to execute the application program. The button module is coupled to and controlled by the controller. During the binding phase, the application generates a summary file based on the key factor information, and stores the summary file in the summary table of the electronic device. During the verification phase, the application determines whether the controller corresponds to the binding device based on the summary file and key factor information. If the controller corresponds to the binding setting, in the authentication stage, the controller responds to the pressing of the button module and performs authentication operation of the common second factor service with the server device according to the summary file corresponding to the binding device.

本發明的認證方法包括以下步驟。於綁定階段,透過電子裝置的處理器所執行的應用程式根據金鑰因素資訊及選取策略產生摘要檔案,並將摘要檔案儲存在電子裝置的控制器的摘要表格中。於查驗階段,透過電子裝置的應用程式根據摘要檔案以及金鑰因素資訊判斷控制器是否對應綁定裝置。若控制器對應綁定裝置,則於認證階段,透過控制器反應於電子裝置的按鍵模組的按壓而根據綁定裝置對應的摘要檔案而與伺服器裝置進行通用第二因素服務的認證運作。The authentication method of the present invention includes the following steps. In the binding phase, the application program executed by the processor of the electronic device generates a summary file based on the key factor information and the selection strategy, and stores the summary file in the summary table of the controller of the electronic device. In the verification phase, the application program of the electronic device determines whether the controller corresponds to the bound device according to the summary file and the key factor information. If the controller corresponds to the binding device, in the authentication phase, the controller responds to the pressing of the button module of the electronic device and performs authentication operation of the common second factor service with the server device according to the summary file corresponding to the binding device.

基於上述,本發明所提出的認證系統及認證方法,可讓使用者使用伺服器裝置所支援的通用第二因素協定的驗證,以提高使用伺服器裝置服務的安全性。此外,本發明所提出的認證系統中的行動儲存裝置/行動通訊裝置可以是現有的任何類型的可攜式儲存裝置/可攜式通訊裝置,且認證方法可由電子裝置執行,因此使用者無須額外購買一個特地針對通用第二因素協定所設計製造的實體金鑰裝置。如此一來,可有效降低使用通用第二因素協定之驗證的成本,從而提高使用者的使用意願。Based on the above, the authentication system and authentication method proposed by the present invention can allow users to use the universal second-factor protocol authentication supported by the server device to improve the security of using the server device service. In addition, the mobile storage device/mobile communication device in the authentication system proposed by the present invention can be any type of existing portable storage device/portable communication device, and the authentication method can be executed by an electronic device, so the user does not need additional Purchase a physical key device specially designed and manufactured for the general second factor agreement. In this way, the cost of verification using the universal second-factor protocol can be effectively reduced, thereby increasing the user's willingness to use.

為讓本發明的上述特徵和優點能更明顯易懂,下文特舉實施例,並配合所附圖式作詳細說明如下。In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail in conjunction with the accompanying drawings.

為了使本發明之內容可以被更容易明瞭,以下特舉實施例做為本發明確實能夠據以實施的範例。另外,凡可能之處,在圖式及實施方式中使用相同標號的元件/構件,係代表相同或類似部件。In order to make the content of the present invention more comprehensible, the following embodiments are specifically cited as examples on which the present invention can indeed be implemented. In addition, wherever possible, elements/components with the same reference numbers in the drawings and embodiments represent the same or similar components.

圖1是依照本發明一實施例所繪示的認證系統的方塊及應用示意圖。請參照圖1,認證系統100至少包括電子裝置140,但在其他實施例中,認證系統100可以更包括行動儲存裝置120及行動通訊裝置130的其中之一。FIG. 1 is a block diagram and application diagram of an authentication system according to an embodiment of the invention. Please refer to FIG. 1, the authentication system 100 at least includes an electronic device 140, but in other embodiments, the authentication system 100 may further include one of a mobile storage device 120 and a mobile communication device 130.

行動儲存裝置120用以儲存金鑰識別檔案KDF以作為實體金鑰裝置。電子裝置140可用以與行動儲存裝置120相插接。電子裝置140可根據行動儲存裝置120所儲存的金鑰識別檔案KDF執行通用第二因素的相關運算,並且可反應於電子裝置140的按鍵模組的按壓啟用伺服器裝置900所支援的通用第二因素協定的驗證服務,以讓電子裝置140的使用者可使用伺服器裝置900所支援的通用第二因素協定的驗證服務。The mobile storage device 120 is used to store the key identification file KDF as a physical key device. The electronic device 140 can be used to connect with the mobile storage device 120. The electronic device 140 can perform the correlation operation of the common second factor according to the key identification file KDF stored in the mobile storage device 120, and can reflect the pressing of the key module of the electronic device 140 to enable the common second factor supported by the server device 900 The authentication service of the factor agreement, so that the user of the electronic device 140 can use the authentication service of the universal second factor agreement supported by the server device 900.

行動通訊裝置130用以傳送生物辨識確認結果BIR,其中生物辨識確認結果BIR例如臉部辨識結果或指紋辨識結果,但本發明實施例不以此為限。電子裝置140用以與行動通訊裝置130以有線方式或無線方式相連接。電子裝置140可根據行動通訊裝置130所提供的生物辨識確認結果BIR執行通用第二因素的相關運算,並且可反應於電子裝置140的按鍵模組的按壓啟用伺服器裝置900所支援的通用第二因素協定的驗證服務,以讓電子裝置140的使用者可使用伺服器裝置900所支援的通用第二因素協定的驗證服務。The mobile communication device 130 is used to transmit the biometric identification confirmation result BIR, where the biometric identification confirmation result BIR is for example a face recognition result or a fingerprint identification result, but the embodiment of the present invention is not limited thereto. The electronic device 140 is used to connect with the mobile communication device 130 in a wired or wireless manner. The electronic device 140 can perform the related calculation of the common second factor according to the biometric confirmation result BIR provided by the mobile communication device 130, and can reflect the pressing of the button module of the electronic device 140 to activate the common second factor supported by the server device 900 The authentication service of the factor agreement, so that the user of the electronic device 140 can use the authentication service of the universal second factor agreement supported by the server device 900.

並且,在電子裝置140未與外部電子裝置(例如行動儲存裝置120及行動通訊裝置130)相連接的情況下,電子裝置140可依據自身的資訊執行通用第二因素的相關運算,並且可反應於電子裝置140的按鍵模組的按壓啟用伺服器裝置900所支援的通用第二因素協定的驗證服務,以讓電子裝置140的使用者可使用伺服器裝置900所支援的通用第二因素協定的驗證服務。Moreover, when the electronic device 140 is not connected to an external electronic device (such as the mobile storage device 120 and the mobile communication device 130), the electronic device 140 can perform related operations of the common second factor based on its own information, and can respond to Pressing the button module of the electronic device 140 enables the authentication service of the universal second factor protocol supported by the server device 900, so that the user of the electronic device 140 can use the universal second factor protocol authentication supported by the server device 900 service.

因此,即使使用者於伺服器裝置900的登入帳號及密碼被他人取得,只要被綁定的介面實體裝置(例如電子裝置140)未被他人所取得,或者對應的認證實體裝置(例如行動儲存裝置120及行動通訊裝置130)未被他人所取得,他人所輸入的登入帳號及密碼便無法通過伺服器裝置900的通用第二因素協定的驗證,故而無法登入此使用者的帳號。Therefore, even if the user's login account and password on the server device 900 are obtained by others, as long as the bound interface physical device (such as the electronic device 140) is not obtained by another person, or the corresponding authentication physical device (such as a mobile storage device) 120 and the mobile communication device 130) are not obtained by others, the login account and password entered by others cannot pass the verification of the universal second factor protocol of the server device 900, and therefore cannot log in to the user's account.

在本發明的一實施例中,行動儲存裝置120可例如是通用序列匯流排(USB)隨身碟或是USB讀卡機與記憶卡之組合,行動通訊裝置130可例如是行動電話或平板電腦,但本發明不限於此。事實上,行動儲存裝置120可以是現有的任何類型的可攜式儲存裝置,行動通訊裝置130可以是現有的任何類型的可攜式通訊裝置,故而可降低使用者的使用成本。In an embodiment of the present invention, the mobile storage device 120 can be, for example, a universal serial bus (USB) flash drive or a combination of a USB card reader and a memory card, and the mobile communication device 130 can be, for example, a mobile phone or a tablet computer. But the present invention is not limited to this. In fact, the mobile storage device 120 can be any type of existing portable storage device, and the mobile communication device 130 can be any type of existing portable communication device, so the user's use cost can be reduced.

在本發明的一實施例中,電子裝置140可例如是筆記型電腦(notebook computer),但本發明不限於此。In an embodiment of the present invention, the electronic device 140 may be, for example, a notebook computer, but the present invention is not limited thereto.

在本發明的一實施例中,電子裝置140可透過有線通訊或無線通訊的方式與伺服器裝置900進行通訊。In an embodiment of the present invention, the electronic device 140 can communicate with the server device 900 through wired communication or wireless communication.

在本發明的一實施例中,認證系統100的認證流程可包括綁定階段、查驗階段以及認證階段,但不限於此。於綁定階段,可綁定用來執行的通用第二因素協定的驗證的電子裝置140,更可將行動儲存裝置120及行動通訊裝置130的其中之一與電子裝置140綁定。當電子裝置140與行動儲存裝置120相插接時,於綁定階段,電子裝置140可根據電子裝置140的金鑰因素資訊KFI0產生金鑰識別檔案KDF,並將金鑰識別檔案KDF傳送至行動儲存裝置120。此外,於綁定階段,電子裝置140可根據金鑰識別檔案KDF的檔案狀態及行動儲存裝置120的金鑰因素資訊KFI0產生摘要檔案DGF,並將摘要檔案DGF儲存在電子裝置140的控制器(稍後說明)中,其中控制器儲存有摘要表格。如此一來,行動儲存裝置120與電子裝置140藉由金鑰識別檔案KDF以及摘要檔案DGF而彼此綁定。In an embodiment of the present invention, the authentication process of the authentication system 100 may include a binding phase, an inspection phase, and an authentication phase, but is not limited thereto. In the binding phase, the electronic device 140 used to perform the verification of the universal second factor protocol can be bound, and one of the mobile storage device 120 and the mobile communication device 130 can be bound to the electronic device 140. When the electronic device 140 is plugged into the mobile storage device 120, in the binding phase, the electronic device 140 can generate the key identification file KDF according to the key factor information KFI0 of the electronic device 140, and send the key identification file KDF to the mobile Storage device 120. In addition, during the binding phase, the electronic device 140 can generate the digest file DGF according to the file status of the key identification file KDF and the key factor information KFI0 of the mobile storage device 120, and store the digest file DGF in the controller of the electronic device 140 ( I will explain later) in which the controller stores a summary table. In this way, the mobile storage device 120 and the electronic device 140 are bound to each other by the key identification file KDF and the digest file DGF.

當電子裝置140與行動通訊裝置130相連接時,於綁定階段,行動通訊裝置130會提供第一公鑰UK1及金鑰因素資訊KFI2至電子裝置140,金鑰因素資訊KFI2例如行動通訊裝置130目前登入的帳號(例如電子郵件地址(e-mail address))、行動通訊裝置130之國際行動裝置辨識(IMEI)碼、目前用戶身分模組(sim)卡的電話號碼、以及行動通訊裝置130中的應用程式於綁定當下隨機產生之訊息碼。此外,於綁定階段,電子裝置140可根據行動通訊裝置130的金鑰因素資訊KFI2及行動儲存裝置120的金鑰因素資訊KFI0產生摘要檔案DGF,並將摘要檔案DGF儲存在電子裝置140的摘要表格中。如此一來,行動通訊裝置130與電子裝置140藉由第一公鑰UK1及摘要檔案DGF而彼此綁定。When the electronic device 140 is connected to the mobile communication device 130, during the binding phase, the mobile communication device 130 will provide the first public key UK1 and the key factor information KFI2 to the electronic device 140, such as the mobile communication device 130 The currently logged-in account (such as e-mail address), the international mobile device identification (IMEI) code of the mobile communication device 130, the phone number of the current user identity module (sim) card, and the mobile communication device 130 The message code randomly generated at the moment of binding of the application of. In addition, during the binding phase, the electronic device 140 can generate a summary file DGF based on the key factor information KFI2 of the mobile communication device 130 and the key factor information KFI0 of the mobile storage device 120, and store the summary file DGF in the summary of the electronic device 140 Table. In this way, the mobile communication device 130 and the electronic device 140 are bound to each other by the first public key UK1 and the digest file DGF.

當電子裝置140未與外部電子裝置相連接時,於綁定階段,電子裝置140可根據其金鑰因素資訊KFI0產生摘要檔案DGF,並將摘要檔案DGF儲存在電子裝置140的摘要表格中,以假裝與虚擬裝置綁定。When the electronic device 140 is not connected to an external electronic device, in the binding phase, the electronic device 140 can generate a summary file DGF according to its key factor information KFI0, and store the summary file DGF in the summary table of the electronic device 140 to Pretend to be bound to a virtual device.

另外,當電子裝置140與行動儲存裝置120相插接時,於查驗階段,電子裝置140可查驗行動儲存裝置120與電子裝置140是否彼此綁定。詳細來說,電子裝置140可自行動儲存裝置120讀取金鑰識別檔案KDF,且根據摘要檔案DGF以及電子裝置140的金鑰因素資訊KFI0查驗行動儲存裝置120中的金鑰識別檔案KDF是否有效。若電子裝置140查驗金鑰識別檔案KDF為有效,表示行動儲存裝置120與電子裝置140已彼此綁定,亦即判定電子裝置140是對應至綁定裝置(亦即行動儲存裝置120),則於認證階段,電子裝置140可根據對應於金鑰識別檔案KDF的摘要檔案DGF而與伺服器裝置900進行通用第二因素服務的認證運作。In addition, when the electronic device 140 is plugged into the mobile storage device 120, in the verification phase, the electronic device 140 can verify whether the mobile storage device 120 and the electronic device 140 are bound to each other. In detail, the electronic device 140 can read the key identification file KDF from the mobile storage device 120, and check whether the key identification file KDF in the mobile storage device 120 is valid according to the digest file DGF and the key factor information KFI0 of the electronic device 140 . If the electronic device 140 checks that the key identification file KDF is valid, it means that the mobile storage device 120 and the electronic device 140 have been bound to each other, that is, it is determined that the electronic device 140 corresponds to the bound device (that is, the mobile storage device 120), then In the authentication phase, the electronic device 140 can perform a common second factor service authentication operation with the server device 900 according to the digest file DGF corresponding to the key identification file KDF.

當電子裝置140與行動通訊裝置130相連接時,於查驗階段,電子裝置140可驗證行動通訊裝置130與電子裝置140是否彼此綁定。詳細來說,行動通訊裝置130可自電子裝置140接收第一認證詢問CHS1,且根據第一認證詢問CHS1回傳第一簽章SIG1至電子裝置140,電子裝置140確認第一簽章SIG1是否與第一公鑰UK1對應而確認行動通訊裝置130是否為綁定裝置。若行動通訊裝置130為綁定裝置,電子裝置140可根據對應於行動通訊裝置130的摘要檔案DGF而與伺服器裝置900進行通用第二因素服務的認證運作。When the electronic device 140 is connected to the mobile communication device 130, in the verification phase, the electronic device 140 can verify whether the mobile communication device 130 and the electronic device 140 are bound to each other. In detail, the mobile communication device 130 can receive the first authentication query CHS1 from the electronic device 140, and according to the first authentication query CHS1, return the first signature SIG1 to the electronic device 140, and the electronic device 140 confirms whether the first signature SIG1 matches The first public key UK1 corresponds to confirm whether the mobile communication device 130 is a bound device. If the mobile communication device 130 is a binding device, the electronic device 140 can perform a common second factor service authentication operation with the server device 900 according to the digest file DGF corresponding to the mobile communication device 130.

當電子裝置140未與外部電子裝置相連接時,於查驗階段,電子裝置140可根據金鑰因素資訊KFI0確認電子裝置140是否對應至綁定裝置(在此為虚擬裝置)。一般而言,電子裝置140會被確認為與綁定裝置對應,接著電子裝置140可根據摘要檔案DGF而與伺服器裝置900進行通用第二因素服務的認證運作。When the electronic device 140 is not connected to an external electronic device, in the verification phase, the electronic device 140 can confirm whether the electronic device 140 corresponds to the bound device (here, a virtual device) according to the key factor information KFI0. Generally speaking, the electronic device 140 will be confirmed as corresponding to the binding device, and then the electronic device 140 can perform a common second factor service authentication operation with the server device 900 according to the digest file DGF.

在本發明的一實施例中,認證系統100的認證流程還可包括註冊階段。詳細來說,若電子裝置140確認為與綁定裝置對應,則於註冊階段,電子裝置140可根據對應的摘要檔案DGF向伺服器裝置900作通用第二因素服務的註冊。只要電子裝置140根據摘要檔案DGF完成向伺服器裝置900作通用第二因素服務的註冊,則於認證階段,電子裝置140根據對應的摘要檔案DGF向伺服器裝置900進行通用第二因素服務的認證即可通過。In an embodiment of the present invention, the authentication process of the authentication system 100 may further include a registration phase. In detail, if the electronic device 140 is confirmed to correspond to the bound device, during the registration phase, the electronic device 140 can register the general second factor service with the server device 900 according to the corresponding summary file DGF. As long as the electronic device 140 completes the registration of the general second factor service to the server device 900 according to the digest file DGF, in the authentication phase, the electronic device 140 performs the general second factor service authentication to the server device 900 according to the corresponding digest file DGF You can pass.

圖2是依照本發明一實施例所繪示的認證方法的步驟流程圖。請合併參照圖1及圖2,本範例實施例的認證方法包括如下步驟。首先,不論行動儲存裝置120是否被插接至電子裝置140或行動通訊裝置130是否與電子裝置140連接,使用者都可決定是否要讓電子裝置140是否與外部裝置(如行動儲存裝置120或行動通訊裝置130)或虛擬裝置彼此綁定,如步驟S200所示。若步驟S200的決定結果為是,則執行步驟S210,否則執行步驟S220。在步驟S210所示的綁定階段,透過電子裝置140的應用程式根據金鑰因素資訊KFI0(或者更與金鑰因素資訊KFI1及KFI2的其中之一)及選取策略SEP產生摘要檔案DGF,並將摘要檔案DGF及選取策略SEP儲存在電子裝置140的控制器中的摘要表格。FIG. 2 is a flowchart of steps of an authentication method according to an embodiment of the invention. Please refer to FIG. 1 and FIG. 2 together. The authentication method of this exemplary embodiment includes the following steps. First, regardless of whether the mobile storage device 120 is plugged into the electronic device 140 or the mobile communication device 130 is connected to the electronic device 140, the user can determine whether the electronic device 140 is to be connected to an external device (such as the mobile storage device 120 or mobile communication device). The communication device 130) or virtual devices are bound to each other, as shown in step S200. If the decision result of step S200 is yes, then step S210 is executed, otherwise, step S220 is executed. In the binding phase shown in step S210, the application program of the electronic device 140 generates the digest file DGF according to the key factor information KFI0 (or one of the key factor information KFI1 and KFI2) and the selected strategy SEP, and The summary file DGF and the selection strategy SEP are stored in the summary table in the controller of the electronic device 140.

另外,於步驟S220所示的查驗階段,透過電子裝置140的應用程式根據摘要檔案DGF以及金鑰因素資訊KFI0、KFI1及KFI2的其中之一判斷電子裝置140的控制器是否對應綁定裝置。若電子裝置140的控制器對應至綁定娤置,則決定是否向伺服器裝置900作通用第二因素服務的註冊,如步驟S230所示。若步驟S230的決定結果為是,則於步驟S240所示的註冊階段,透過電子裝置140根據摘要檔案DGF向伺服器裝置900作通用第二因素服務的註冊。若步驟S230的決定結果為否,則於步驟S250所示的認證階段,透過電子裝置140的控制器反應於電子裝置140的按鍵模組的按壓而根據綁定裝置的摘要檔案DGF而與伺服器裝置900進行通用第二因素服務的認證運作。In addition, in the verification phase shown in step S220, the application program of the electronic device 140 determines whether the controller of the electronic device 140 corresponds to the binding device according to the digest file DGF and one of the key factor information KFI0, KFI1, and KFI2. If the controller of the electronic device 140 corresponds to the binding setting, it is determined whether to register the general second factor service with the server device 900, as shown in step S230. If the decision result of step S230 is yes, then in the registration stage shown in step S240, the electronic device 140 registers the general second factor service with the server device 900 according to the digest file DGF. If the decision result of step S230 is no, then in the authentication phase shown in step S250, the controller of the electronic device 140 reacts to the pressing of the button module of the electronic device 140 and communicates with the server according to the summary file DGF of the bound device. The device 900 performs the authentication operation of the universal second factor service.

圖3是依照本發明一實施例所繪示的電子裝置的方塊示意圖。請參照圖3,電子裝置140可包括控制器141、處理器142以及按鍵模組144,但本發明不限於此。控制器141可包括儲存器143且具有識別碼SN。按鍵模組144耦接控制器141,且受控於控制器141。處理器142耦接控制器141。處理器142可執行應用程式AP,並且透過應用程式AP執行圖2的步驟S210及S220,且控制器141可透過其韌體執行圖2的步驟S240及S250。FIG. 3 is a block diagram of an electronic device according to an embodiment of the invention. 3, the electronic device 140 may include a controller 141, a processor 142, and a button module 144, but the invention is not limited thereto. The controller 141 may include a storage 143 and have an identification code SN. The key module 144 is coupled to the controller 141 and controlled by the controller 141. The processor 142 is coupled to the controller 141. The processor 142 can execute the application program AP, and execute steps S210 and S220 of FIG. 2 through the application program AP, and the controller 141 can execute steps S240 and S250 of FIG. 2 through its firmware.

在本發明的一實施例中,處理器142可例如是中央處理單元(Central Process Unit,CPU),但本發明不限於此。In an embodiment of the present invention, the processor 142 may be, for example, a central processing unit (CPU), but the present invention is not limited thereto.

在本發明的一實施例中,控制器141可例如是微控制器(microcontroller),但本發明不限於此。In an embodiment of the present invention, the controller 141 may be a microcontroller, for example, but the present invention is not limited thereto.

在本發明的一實施例中,儲存器143可例如是序列週邊介面(Serial Peripheral Interface,SPI)快閃記憶體(Flash memory),但本發明不限於此。In an embodiment of the present invention, the storage 143 may be, for example, a Serial Peripheral Interface (SPI) flash memory, but the present invention is not limited thereto.

在本發明的一實施例中,電子裝置140還可包括通訊模組。通訊模組耦接控制器141。控制器141可透過通訊模組與伺服器裝置900進行通訊。In an embodiment of the present invention, the electronic device 140 may further include a communication module. The communication module is coupled to the controller 141. The controller 141 can communicate with the server device 900 through a communication module.

圖4是依照本發明一實施例所繪示的圖2的步驟S210(即綁定階段)的細節步驟流程圖。請合併參照圖1、圖3及圖4,其中電子裝置140的金鑰因素資訊KFI0可包括控制器141的識別碼SN、上述應用程式的識別碼AP以及電子裝置140的登入帳號LID,但本發明不限於此。如圖4所示,步驟S210可包括細節步驟S2100、S2102、S2104、S2106、S2108。首先,於步驟S2100中,處理器142的應用程式AP可根據控制器141的識別碼SN、應用程式AP的識別碼SAP以及電子裝置140的登入帳號LID進行雜湊(Hashing)運算以產生金鑰識別檔案KDF。接著,於步驟S2102中,處理器142的應用程式AP可將金鑰識別檔案KDF傳送至行動儲存裝置120。FIG. 4 is a detailed step flowchart of step S210 (ie, the binding phase) of FIG. 2 according to an embodiment of the present invention. Please refer to FIGS. 1, 3, and 4 together. The key factor information KFI0 of the electronic device 140 may include the identification code SN of the controller 141, the identification code AP of the above-mentioned application program, and the login account LID of the electronic device 140. The invention is not limited to this. As shown in FIG. 4, step S210 may include detailed steps S2100, S2102, S2104, S2106, and S2108. First, in step S2100, the application AP of the processor 142 can perform a hashing operation based on the identification code SN of the controller 141, the identification code SAP of the application AP, and the login account LID of the electronic device 140 to generate a key identification. File KDF. Then, in step S2102, the application AP of the processor 142 can send the key identification file KDF to the mobile storage device 120.

在本發明的一實施例中,控制器141的識別碼SN可例如是控制器141的製造編號,其乃是唯讀的且是唯一的,用以識別控制器141,但本發明不限於此。在本發明的一實施例中,上述應用程式AP的識別碼SAP可例如是全局唯一識別元(Globally Unique Identifier,GUID),但本發明不限於此。在本發明的一實施例中,電子裝置140的登入帳號LID可例如是電子裝置140的作業系統的登入帳號,但本發明不限於此。In an embodiment of the present invention, the identification code SN of the controller 141 may be, for example, the manufacturing number of the controller 141, which is read-only and unique to identify the controller 141, but the present invention is not limited to this . In an embodiment of the present invention, the identification code SAP of the application AP may be, for example, a Globally Unique Identifier (GUID), but the present invention is not limited to this. In an embodiment of the present invention, the login account LID of the electronic device 140 may be, for example, the login account of the operating system of the electronic device 140, but the present invention is not limited to this.

由於行動儲存裝置120中的金鑰識別檔案KDF與控制器141的識別碼SN、應用程式AP的識別碼SAP以及電子裝置140的登入帳號LID有關,因此即使行動儲存裝置120被竊取,行動儲存裝置120中的金鑰識別檔案KDF也無法在其他電子裝置上使用。這是因為其他電子裝置的控制器識別碼及應用程式的識別碼與原先電子裝置140的控制器識別碼SN及應用程式AP的識別碼SAP並不相同,且其他電子裝置的登入帳號與原先的電子裝置140的登入帳號LID也可能不同,因此行動儲存裝置120中的金鑰識別檔案KDF在其他電子裝置會被認定為無效。如此一來,可提升認證系統100的安全性。Since the key identification file KDF in the mobile storage device 120 is related to the identification code SN of the controller 141, the identification code SAP of the application AP, and the login account LID of the electronic device 140, even if the mobile storage device 120 is stolen, the mobile storage device The key identification file KDF in 120 cannot be used on other electronic devices. This is because the controller identification code and application identification code of other electronic devices are different from the controller identification code SN of the original electronic device 140 and the identification code SAP of the application program AP, and the login accounts of other electronic devices are the same as the original The login account LID of the electronic device 140 may also be different, so the key identification file KDF in the mobile storage device 120 will be deemed invalid in other electronic devices. In this way, the security of the authentication system 100 can be improved.

另外,於步驟S2104中,處理器142的應用程式AP可隨機產生選取策略SEP。接著,於步驟S2106中,處理器142的應用程式AP可根據選取策略SEP選擇金鑰識別檔案KDF的檔案狀態以及行動儲存裝置120的金鑰因素資訊KFI1至少其中之一進行雜湊運算以產生摘要檔案DGF。之後,於步驟S2108中,處理器142可將摘要檔案DGF以及對應的選取策略SEP儲存在儲存器143的加密儲存區1432中的摘要表格。In addition, in step S2104, the application AP of the processor 142 can randomly generate the selection strategy SEP. Then, in step S2106, the application AP of the processor 142 can select at least one of the file status of the key identification file KDF and the key factor information KFI1 of the mobile storage device 120 according to the selection strategy SEP to perform a hash operation to generate a summary file DGF. After that, in step S2108, the processor 142 may store the summary file DGF and the corresponding selection strategy SEP in the summary table in the encrypted storage area 1432 of the storage 143.

更進一步來說,金鑰識別檔案KDF的檔案狀態可包括該金鑰識別檔案KDF的建立日期、修改日期、存取日期、檔案叢集(cluster)的起始位置以及檔案叢集的個數至少其中之一。另外,行動儲存裝置120的金鑰因素資訊KFI1可包括行動儲存裝置120的供應商識別碼、行動儲存裝置120的產品識別碼以及行動儲存裝置120的剩餘儲存空間大小至少其中之一。Furthermore, the file status of the key identification file KDF may include at least one of the creation date, modification date, access date, start location of the file cluster, and the number of file clusters of the key identification file KDF One. In addition, the key factor information KFI1 of the mobile storage device 120 may include at least one of the supplier identification code of the mobile storage device 120, the product identification code of the mobile storage device 120, and the remaining storage space of the mobile storage device 120.

舉例來說,若處理器142的應用程式AP隨機產生的選取策略SEP為金鑰識別檔案KDF的建立日期、行動儲存裝置120的剩餘儲存空間大小以及金鑰識別檔案KDF的檔案叢集的個數,則處理器142的應用程式AP將選取金鑰識別檔案KDF的建立日期、行動儲存裝置120的剩餘儲存空間大小以及金鑰識別檔案KDF的檔案叢集的個數進行雜湊運算以產生摘要檔案DGF,並將摘要檔案DGF以及對應的選取策略SEP儲存在儲存器143的加密儲存區1432。For example, if the selection strategy SEP randomly generated by the application AP of the processor 142 is the creation date of the key identification file KDF, the remaining storage space of the mobile storage device 120, and the number of file clusters of the key identification file KDF, Then the application AP of the processor 142 selects the creation date of the key identification file KDF, the remaining storage space size of the mobile storage device 120 and the number of file clusters of the key identification file KDF to perform a hash operation to generate the digest file DGF, and The summary file DGF and the corresponding selection strategy SEP are stored in the encrypted storage area 1432 of the storage 143.

可以理解的是,由於用以產生摘要檔案DGF的選取策略SEP是由處理器142的應用程式AP所隨機產生,且處理器142所產生的摘要檔案DGF及摘要檔案DGF的選取策略SEP被儲存在加密儲存區1432,因此他人並無法得知對應於金鑰識別檔案KDF的摘要檔案DGF的內容為何,亦無法得知摘要檔案DGF是如何產生的(因無法得知摘要檔案DGF的選取策略SEP),故而可防止摘要檔案DGF被他人複製。另外,即使金鑰識別檔案KDF被竊取並複製至另一行動儲存裝置,但複製後的金鑰識別檔案與原先的金鑰識別檔案的建立日期、修改日期、存取日期及檔案叢集的起始位置皆不相同,且另一行動儲存裝置與原先的行動儲存裝置的供應商識別碼、產品識別碼以及剩餘儲存空間大小也不可能完全相同,因此在查驗階段,處理器142的應用程式AP可根據摘要檔案DGF及選取策略SEP而查驗出複製後的金鑰識別檔案為無效。如此一來,可提升認證系統100的安全性。It is understandable that the selection strategy SEP used to generate the summary file DGF is randomly generated by the application AP of the processor 142, and the summary file DGF generated by the processor 142 and the selection strategy SEP of the summary file DGF are stored in Encrypted storage area 1432, so others cannot know the content of the digest file DGF corresponding to the key identification file KDF, nor how the digest file DGF is generated (because they cannot know the selection strategy SEP of the digest file DGF) , So it can prevent the abstract file DGF from being copied by others. In addition, even if the key identification file KDF is stolen and copied to another mobile storage device, the creation date, modification date, access date and the start of the file cluster of the copied key identification file and the original key identification file The locations are all different, and the vendor ID, product ID, and remaining storage space of another mobile storage device and the original mobile storage device may not be exactly the same. Therefore, during the inspection phase, the application AP of the processor 142 can be According to the summary file DGF and the selected strategy SEP, it is checked that the copied key identification file is invalid. In this way, the security of the authentication system 100 can be improved.

附帶一提的是,行動儲存裝置120可與多個不同的電子裝置綁定,因此,行動儲存裝置120中可存有一至多個金鑰識別檔案,其中此些金鑰識別檔案分別對應於不同的電子裝置、或是不同的登入帳號、或是不同的電子裝置及不同的登入帳號。類似地,電子裝置140可與多個不同的行動儲存裝置綁定,因此,加密儲存區1432中所儲存的摘要檔案及其選取策略之組合的數量可為一個或是多個,其中此些摘要檔案分別對應於不同的金鑰識別檔案。Incidentally, the mobile storage device 120 can be bound to a number of different electronic devices. Therefore, the mobile storage device 120 can store one or more key identification files, wherein the key identification files correspond to different Electronic devices, or different login accounts, or different electronic devices and different login accounts. Similarly, the electronic device 140 can be bound to a plurality of different mobile storage devices. Therefore, the number of the combination of summary files and their selection strategies stored in the encrypted storage area 1432 can be one or more, wherein the summaries The files correspond to different key identification files.

圖5是依照本發明一實施例所繪示的圖2的步驟S220(即查驗階段)的細節步驟流程圖。請合併參照圖1、圖3及圖5。如圖5所示,當電子裝置140與行動儲存裝置120相插接時,步驟S220包括細節步驟S2201~S2205。首先,於步驟S2201,處理器142的應用程式AP檢查行動儲存裝置120是否存有金鑰識別檔案KDF。在本發明的一實施例中,處理器142的應用程式AP可根據行動儲存裝置120中所儲存的檔案之檔名或副檔名來判斷其是否為金鑰識別檔案KDF,但本發明不限於此。若步驟S2201的檢查結果為否,表示行動儲存裝置120中並未存有金鑰識別檔案KDF,則處理器142的應用程式AP判斷查驗失敗,如步驟S2205所示,並結束查驗。若步驟S2201的檢查結果為是,表示行動儲存裝置120中存有金鑰識別檔案KDF,則執行步驟S2202。FIG. 5 is a detailed flow chart of step S220 (that is, the checking phase) of FIG. 2 according to an embodiment of the present invention. Please refer to Figure 1, Figure 3 and Figure 5 together. As shown in FIG. 5, when the electronic device 140 is plugged into the mobile storage device 120, step S220 includes detailed steps S2201 to S2205. First, in step S2201, the application AP of the processor 142 checks whether the mobile storage device 120 stores the key identification file KDF. In an embodiment of the present invention, the application AP of the processor 142 can determine whether it is a key identification file KDF according to the file name or extension of the file stored in the mobile storage device 120, but the present invention is not limited to this. If the check result of step S2201 is negative, it means that the key identification file KDF is not stored in the mobile storage device 120, and the application AP of the processor 142 determines that the check has failed, as shown in step S2205, and ends the check. If the check result of step S2201 is yes, it means that the key identification file KDF is stored in the mobile storage device 120, and step S2202 is executed.

於步驟S2202中,處理器142的應用程式AP可根據加密儲存區1432中的摘要檔案DGF的選取策略SEP來檢查金鑰識別檔案KDF是否對應於摘要檔案DGF。若步驟S2202的檢查結果為否,表示行動儲存裝置120中的金鑰識別檔案KDF並非對應於加密儲存區1432中的摘要檔案DGF,則處理器142判斷查驗失敗,亦即控制器141未對應至綁定裝置,如步驟S2205所示,並結束查驗。若步驟S2302的檢查結果為是,表示行動儲存裝置120中的金鑰識別檔案KDF對應於加密儲存區1432中的摘要檔案DGF,亦即控制器141對應至綁定裝置,則執行步驟S2203。In step S2202, the application AP of the processor 142 can check whether the key identification file KDF corresponds to the digest file DGF according to the selection strategy SEP of the digest file DGF in the encrypted storage area 1432. If the check result of step S2202 is no, it means that the key identification file KDF in the mobile storage device 120 does not correspond to the digest file DGF in the encrypted storage area 1432, and the processor 142 determines that the check fails, that is, the controller 141 does not correspond to Bind the device, as shown in step S2205, and end the inspection. If the check result of step S2302 is yes, it means that the key identification file KDF in the mobile storage device 120 corresponds to the digest file DGF in the encrypted storage area 1432, that is, the controller 141 corresponds to the binding device, and step S2203 is executed.

舉例來說,假設行動儲存裝置120中存有金鑰識別檔案KDF,且加密儲存區1432中存有第一摘要檔案及其第一選取策略以及第二摘要檔案及其第二選取策略。首先,處理器142的應用程式AP可根據加密儲存區1432中的第一選取策略選擇金鑰識別檔案KDF的檔案狀態以及行動儲存裝置120的金鑰因素資訊KFI1至少其中之一進行雜湊運算以產生一第一比對檔案,並判斷第一比對檔案與第一摘要檔案是否相同。若第一比對檔案與第一摘要檔案相同,表示行動儲存裝置120中的金鑰識別檔案KDF對應於加密儲存區1432中的第一摘要檔案,則執行步驟S2203。For example, assume that the mobile storage device 120 stores the key identification file KDF, and the encrypted storage area 1432 stores a first summary file and its first selection strategy, and a second summary file and its second selection strategy. First, the application AP of the processor 142 can select at least one of the file status of the key identification file KDF and the key factor information KFI1 of the mobile storage device 120 according to the first selection strategy in the encrypted storage area 1432 to perform a hash operation to generate A first comparison file, and determine whether the first comparison file is the same as the first summary file. If the first comparison file is the same as the first digest file, it means that the key identification file KDF in the mobile storage device 120 corresponds to the first digest file in the encrypted storage area 1432, and step S2203 is executed.

若第一比對檔案與第一摘要檔案不同,表示行動儲存裝置120中的金鑰識別檔案KDF並非對應於加密儲存區1432中的第一摘要檔案,則處理器142可再根據加密儲存區1432中的第二選取策略選擇金鑰識別檔案KDF的檔案狀態以及行動儲存裝置120的金鑰因素資訊KFI1至少其中之一進行雜湊運算以產生一第二比對檔案,並判斷第二比對檔案與第二摘要檔案是否相同。If the first comparison file is different from the first digest file, it means that the key identification file KDF in the mobile storage device 120 does not correspond to the first digest file in the encrypted storage area 1432, and the processor 142 may then perform the encryption according to the encrypted storage area 1432. The second selection strategy selects at least one of the file status of the key identification file KDF and the key factor information KFI1 of the mobile storage device 120 to perform a hash operation to generate a second comparison file, and determine whether the second comparison file is Whether the second summary file is the same.

若第二比對檔案與第二摘要檔案相同,表示行動儲存裝置120中的金鑰識別檔案KDF對應於加密儲存區1432中的第二摘要檔案,則執行步驟S2203。若第二比對檔案與第二摘要檔案不同,表示行動儲存裝置120中的金鑰識別檔案KDF並非對應於加密儲存區1432中的第一摘要檔案及第二摘要檔案,則處理器142的應用程式AP判斷查驗失敗(即金鑰識別檔案KDF為無效),如步驟S2205所示,並結束查驗。If the second comparison file is the same as the second summary file, it means that the key identification file KDF in the mobile storage device 120 corresponds to the second summary file in the encrypted storage area 1432, and step S2203 is executed. If the second comparison file is different from the second summary file, it means that the key identification file KDF in the mobile storage device 120 does not correspond to the first summary file and the second summary file in the encrypted storage area 1432, and the processor 142 applies The program AP determines that the check fails (that is, the key identification file KDF is invalid), as shown in step S2205, and ends the check.

於步驟S2203中,處理器142的應用程式AP可根據控制器141的識別碼SN、應用程式AP的識別碼SAP以及電子裝置140的登入帳號LID進行雜湊運算以檢驗金鑰識別檔案KDF是否正確。若步驟S2203的檢驗結果為否,則處理器142的應用程式AP判斷查驗失敗(即金鑰識別檔案KDF為無效),如步驟S2205所示,並結束查驗。若步驟S2203的檢驗結果為是,則處理器142判斷金鑰識別檔案KDF為有效,如步驟S2204所示,並進入步驟S230。In step S2203, the application AP of the processor 142 can perform a hash operation according to the identification code SN of the controller 141, the identification code SAP of the application AP, and the login account LID of the electronic device 140 to check whether the key identification file KDF is correct. If the check result in step S2203 is no, the application AP of the processor 142 determines that the check fails (that is, the key identification file KDF is invalid), as shown in step S2205, and ends the check. If the check result of step S2203 is yes, the processor 142 judges that the key identification file KDF is valid, as shown in step S2204, and proceeds to step S230.

圖6是依照本發明另一實施例所繪示的圖2的步驟S210的細節步驟流程圖。請合併參照圖1、圖3及圖6。如圖6所示,當電子裝置與行動通訊裝置130相連接時,步驟S210包括細節步驟S2100a、S2102a,此時電子裝置140與行動通訊裝置130是執行非對稱式認證及非對稱式加密傳輸。。首先,於步驟S2100a中,於綁定階段,處理器142的應用程式AP等待行動通訊裝置130的第一生物辨識確認結果BIR1。於步驟S2102a中,當第一生物辨識確認結果BIR1為通過時,處理器142的應用程式AP自行動通訊裝置130接收金鑰因素資訊KFI2後,將金鑰因素資訊KFI2傳送至控制器141,以產生摘要檔案DFG。FIG. 6 is a detailed step flowchart of step S210 in FIG. 2 according to another embodiment of the present invention. Please refer to Figure 1, Figure 3 and Figure 6 together. As shown in FIG. 6, when the electronic device is connected to the mobile communication device 130, step S210 includes detailed steps S2100a and S2102a. At this time, the electronic device 140 and the mobile communication device 130 perform asymmetric authentication and asymmetric encryption transmission. . First, in step S2100a, during the binding phase, the application AP of the processor 142 waits for the first biometric confirmation result BIR1 of the mobile communication device 130. In step S2102a, when the first biometric verification result BIR1 is passed, the application AP of the processor 142 receives the key factor information KFI2 from the mobile communication device 130, and then transmits the key factor information KFI2 to the controller 141 to Generate summary file DFG.

圖7是依照本發明另一實施例所繪示的圖2的步驟S220的細節步驟流程圖。請合併參照圖1、圖3及圖7。如圖7所示,當電子裝置140與行動通訊裝置130相連接時,步驟S220包括細節步驟S2200a、S2202a,此時電子裝置140與行動通訊裝置130是執行非對稱式認證及對稱式加密傳輸。首先,於步驟S2200a中,於查驗階段,處理器142的應用程式AP等待行動通訊裝置130的第二生物辨識確認結果BIR2。於步驟S2202a中,當第二生物辨識確認結果BIR2為通過時,處理器142的應用程式AP自行動通訊裝置130接收金鑰因素資訊KFI2後,將金鑰因素資訊KFI2傳送至控制器141,以確認控制器141是否對應綁定裝置。FIG. 7 is a detailed step flowchart of step S220 in FIG. 2 according to another embodiment of the present invention. Please refer to Figure 1, Figure 3 and Figure 7 together. As shown in FIG. 7, when the electronic device 140 is connected to the mobile communication device 130, step S220 includes detailed steps S2200a and S2202a. At this time, the electronic device 140 and the mobile communication device 130 perform asymmetric authentication and symmetric encryption transmission. First, in step S2200a, during the verification phase, the application AP of the processor 142 waits for the second biometric verification result BIR2 of the mobile communication device 130. In step S2202a, when the second biometric verification result BIR2 is passed, the application AP of the processor 142 receives the key factor information KFI2 from the mobile communication device 130, and then transmits the key factor information KFI2 to the controller 141 to It is confirmed whether the controller 141 corresponds to the binding device.

在本發明實施例中,在處理器142的應用程式AP等待行動通訊裝置130的第一生物辨識確認結果BIR1或第二生物辨識確認結果BIR2的時間中,行動通訊裝置130產生第一公鑰UK1及第一私鑰IK1,並且處理器142的應用程式AP向行動通訊裝置130請求第一公鑰UK1、生物辨識狀態BIS以及金鑰因素資訊KFI2,其中應用程式儲存第一公鑰UK1。在處理器142的應用程式AP將金鑰因素資訊KFI2傳送至控制器141之前,處理器142的應用程式產生第二公鑰UK2及第二私鑰IK2,並且第二公鑰傳UK2送至控制器141,以使控制器141儲存第二公鑰UK2。In the embodiment of the present invention, while the application AP of the processor 142 waits for the first biometric verification result BIR1 or the second biometric verification result BIR2 of the mobile communication device 130, the mobile communication device 130 generates the first public key UK1 And the first private key IK1, and the application AP of the processor 142 requests the mobile communication device 130 for the first public key UK1, the biometric status BIS, and the key factor information KFI2, where the application stores the first public key UK1. Before the application AP of the processor 142 transmits the key factor information KFI2 to the controller 141, the application of the processor 142 generates the second public key UK2 and the second private key IK2, and the second public key is transmitted to the control unit UK2. 141, so that the controller 141 stores the second public key UK2.

圖8是依照本發明一實施例的應用程式認證行動通訊裝置的細節步驟流程圖。請合併參照圖1、圖3及圖8。如圖8所示,當處理器142的應用程式AP認證行動通訊裝置130時,行動通訊裝置130取得來自處理器142的應用程式AP的第一認證詢問CHS1,行動通訊裝置130反應於第一認證詢問CHS1而依據第一私鑰IK1產生第一簽章SIG1,且行動通訊裝置130回傳第一簽章SIG1至處理器142的應用程式AP。處理器142的應用程式AP透過行動通訊裝置130所傳送的第一公鑰UK1來核對第一簽章SIG1是否正確,藉此來對行動通訊裝置130進行認證。FIG. 8 is a flowchart of detailed steps of an application authentication mobile communication device according to an embodiment of the present invention. Please refer to Figure 1, Figure 3 and Figure 8 together. As shown in FIG. 8, when the application AP of the processor 142 authenticates the mobile communication device 130, the mobile communication device 130 obtains the first authentication query CHS1 from the application AP of the processor 142, and the mobile communication device 130 responds to the first authentication. CHS1 is asked to generate the first signature SIG1 according to the first private key IK1, and the mobile communication device 130 returns the first signature SIG1 to the application AP of the processor 142. The application AP of the processor 142 verifies whether the first signature SIG1 is correct through the first public key UK1 sent by the mobile communication device 130, thereby authenticating the mobile communication device 130.

圖9是依照本發明一實施例的控制器認證應用程式的細節步驟流程圖。請合併參照圖1、圖3及圖9。如圖9所示當控制器141認證處理器142的應用程式AP時,處理器142的應用程式AP取得來自控制器141的第二認證詢問CHS2,處理器142的應用程式AP反應於第二認證詢問CHS2而依據第二私鑰IK2產生第二簽章SIG2,且處理器142的應用程式AP回傳第二簽章SIG2至控制器141。控制器141透過處理器142的應用程式AP所傳送的第二公鑰UK2來核對第二簽章SIG2是否正確,藉此來對處理器142的應用程式AP進行認證。FIG. 9 is a flowchart of detailed steps of a controller authentication application according to an embodiment of the invention. Please refer to Figure 1, Figure 3 and Figure 9 together. As shown in FIG. 9, when the controller 141 authenticates the application AP of the processor 142, the application AP of the processor 142 obtains the second authentication query CHS2 from the controller 141, and the application AP of the processor 142 reflects the second authentication. CHS2 is asked to generate a second signature SIG2 according to the second private key IK2, and the application AP of the processor 142 returns the second signature SIG2 to the controller 141. The controller 141 verifies whether the second signature SIG2 is correct through the second public key UK2 sent by the application AP of the processor 142, so as to authenticate the application AP of the processor 142.

在本發明的實施例中,電子裝置140可以不與外部電子裝置相連接而啟用通用第二因素的驗證。在電子裝置140可以未與外部電子裝置相連接時,於綁定階段中,亦即步驟S210中,處理器142的應用程式AP根據電子裝置140的金鑰因素資訊KFI0及取策略SEP產生摘要檔案DGF。於查驗階段,亦即步驟S220中,處理器142的應用程式AP根據摘要檔案DGF以及電子裝置140的金鑰因素資訊KFI0判斷控制器141是否對應至綁定裝置。In the embodiment of the present invention, the electronic device 140 may not be connected to an external electronic device and enable the verification of the common second factor. When the electronic device 140 may not be connected to an external electronic device, in the binding phase, that is, in step S210, the application AP of the processor 142 generates a summary file based on the key factor information KFI0 of the electronic device 140 and the strategy SEP DGF. In the checking phase, that is, in step S220, the application AP of the processor 142 determines whether the controller 141 corresponds to the binding device according to the digest file DGF and the key factor information KFI0 of the electronic device 140.

圖10是依照本發明一實施例所繪示的圖2的步驟S240(即註冊階段)的細節步驟流程圖。請合併參照圖1、圖3及圖10。如圖10所示,步驟S240包括細節步驟S2400、S2402、S2404、S2406。首先,於步驟S2400,控制器141可將使用者所輸入的用於登入伺服器裝置900的帳號及密碼傳送至伺服器裝置900。然後,於步驟S2402,控制器141可自伺服器裝置900取得對應的伺服器識別碼SVID,且控制器141可自處理器142取得對應於金鑰識別檔案KDF的摘要檔案DGF。接著,於步驟S2404,控制器141根據隨機數RNB、伺服器識別碼SVID以及摘要檔案DGF進行雜湊運算以產生信息識別碼MAC以及公鑰(Public Key) UK。FIG. 10 is a detailed step flowchart of step S240 (ie, the registration phase) of FIG. 2 according to an embodiment of the present invention. Please refer to Figure 1, Figure 3 and Figure 10 together. As shown in FIG. 10, step S240 includes detailed steps S2400, S2402, S2404, and S2406. First, in step S2400, the controller 141 may send the account and password entered by the user for logging in to the server device 900 to the server device 900. Then, in step S2402, the controller 141 can obtain the corresponding server identification code SVID from the server device 900, and the controller 141 can obtain the digest file DGF corresponding to the key identification file KDF from the processor 142. Next, in step S2404, the controller 141 performs a hash operation according to the random number RNB, the server identification code SVID, and the digest file DGF to generate an information identification code MAC and a public key (Public Key) UK.

詳細來說,步驟S2404可包括細節步驟S642、S644。首先,於步驟S642,控制器141可根據隨機數RNB、伺服器識別碼SVID以及摘要檔案DGF進行雜湊運算以產生私鑰(Private Key) IK及公鑰UK。接著,於步驟S644,控制器141可根據私鑰IK、伺服器識別碼SVID以及摘要檔案DGF進行雜湊運算以產生信息識別碼MAC。In detail, step S2404 may include detailed steps S642 and S644. First, in step S642, the controller 141 can perform a hash operation based on the random number RNB, the server identification code SVID, and the digest file DGF to generate a private key (Private Key) IK and a public key UK. Then, in step S644, the controller 141 can perform a hash operation according to the private key IK, the server identification code SVID, and the digest file DGF to generate the information identification code MAC.

之後,於步驟S2406,控制器141可將隨機數RNB、信息識別碼MAC以及公鑰UK傳送至伺服器裝置900,以向伺服器裝置900作通用第二因素服務的註冊。如此一來,伺服器裝置900即可將上述用於登入伺服器裝置900的帳號及密碼對應至公鑰UK,並完成註冊。After that, in step S2406, the controller 141 may transmit the random number RNB, the message identification code MAC, and the public key UK to the server device 900 to register the general second factor service with the server device 900. In this way, the server device 900 can map the account and password used to log in to the server device 900 to the public key UK, and complete the registration.

在本發明的一實施例中,上述所提到的雜湊運算可採用現有的雜湊運算法來進行運算,例如安全雜湊演算法(Secure Hash Algorithm,SHA)等等,但本發明不限於此,端視實際應用或設計需求而定。In an embodiment of the present invention, the above-mentioned hash operation can be performed by an existing hash operation method, such as Secure Hash Algorithm (SHA), etc., but the present invention is not limited to this. Depends on actual application or design requirements.

圖11是依照本發明一實施例所繪示的圖2的步驟S250(即認證階段)的細節步驟流程圖。請合併參照圖1、圖3及圖11。如圖11所示,步驟S250包括細節步驟S2500、S2502、S2504、S2506。首先,於步驟S2500,控制器141可將使用者所輸入的用於登入伺服器裝置900的帳號及密碼傳送至伺服器裝置900,致使伺服器裝置900可根據上述帳號及密碼查找對應的公鑰UK及送出認證詢問CHS。然後,於步驟S2502,控制器141可取得來自伺服器裝置900的認證詢問CHS。接著,於步驟S2504,控制器141可反應於認證詢問CHS而依據私鑰IK產生簽章SIG。FIG. 11 is a detailed flowchart of step S250 (ie, the authentication phase) of FIG. 2 according to an embodiment of the present invention. Please refer to Figure 1, Figure 3 and Figure 11 together. As shown in FIG. 11, step S250 includes detailed steps S2500, S2502, S2504, and S2506. First, in step S2500, the controller 141 may send the account and password entered by the user to log in to the server device 900 to the server device 900, so that the server device 900 can find the corresponding public key according to the account and password. UK and send certification to inquire CHS. Then, in step S2502, the controller 141 can obtain the authentication query CHS from the server device 900. Then, in step S2504, the controller 141 can generate the signature SIG according to the private key IK in response to the authentication query CHS.

在本發明的一實施例中,步驟S2504可包括細節步驟S752、S754、S756。首先,於步驟S752,控制器141可判斷電子裝置140的按鍵模組144的一特定按鍵是否有被按壓。若步驟S752的判斷結果為否,表示使用者可能並非位於電子裝置140的週邊或使用者並未使用電子裝置140,則於步驟S756中,控制器141將不產生簽章SIG。若步驟S752的判斷結果為是,表示使用者確實位於電子裝置140的週邊且正在使用電子裝置140,則控制器141反應於認證詢問CHS而依據私鑰IK產生簽章SIG,如步驟S754所示。在本發明的一實施例中,若控制器141未在一特定時間區間內回傳簽章SIG至伺服器裝置900,則上述用於登入伺服器裝置900的帳號及密碼將無法通過伺服器裝置900的通用第二因素協定的認證,且伺服器裝置900將會發出通用第二因素認證失敗的訊息給電子裝置140。In an embodiment of the present invention, step S2504 may include detailed steps S752, S754, and S756. First, in step S752, the controller 141 can determine whether a specific key of the key module 144 of the electronic device 140 is pressed. If the determination result of step S752 is no, it means that the user may not be located around the electronic device 140 or the user is not using the electronic device 140, then in step S756, the controller 141 will not generate the signature SIG. If the judgment result of step S752 is yes, it means that the user is indeed located around the electronic device 140 and is using the electronic device 140, the controller 141 responds to the authentication query CHS and generates the signature SIG according to the private key IK, as shown in step S754 . In an embodiment of the present invention, if the controller 141 does not return the signature SIG to the server device 900 within a specific time interval, the aforementioned account and password for logging in to the server device 900 will not pass through the server device. 900 is authenticated by the universal second-factor protocol, and the server device 900 will send a message that the universal second-factor authentication has failed to the electronic device 140.

之後,於步驟S2506,控制器141回傳簽章SIG至伺服器裝置900,致使伺服器裝置900根據簽章SIG及公鑰UK(即對應於上述用於登入伺服器裝置900的帳號及密碼的公鑰)進行通用第二因素服務的認證。詳細來說,伺服器裝置900可根據公鑰UK來檢驗簽章SIG是否有效。若伺服器裝置900檢驗簽章SIG為有效,則上述用於登入伺服器裝置900的帳號及密碼便通過了伺服器裝置900的通用第二因素協定的認證,因此使用者可開始使用伺服器裝置900所提供的線上服務。After that, in step S2506, the controller 141 returns the signature SIG to the server device 900, causing the server device 900 to use the signature SIG and the public key UK (that is, the corresponding account and password used to log in to the server device 900). Public key) for authentication of the universal second factor service. In detail, the server device 900 can check whether the signature SIG is valid according to the public key UK. If the server device 900 verifies that the signature SIG is valid, the account and password used to log in to the server device 900 have passed the authentication of the server device 900's universal second factor protocol, so the user can start using the server device 900 online services provided.

依據上述,當電子裝置140與行動儲存裝置120相插接時,控制器141會對處理器142的應用程式AP進行確認。在應用程式AP通過確認後,控制器141接著對行動儲存裝置120進行確認。在行動儲存裝置120通過確認後,控制器141才會啟用通用第二因素服務的認證運作。當電子裝置140與行動通訊裝置130相連接時,處理器142的應用程式AP會對行動通訊裝置130進行確認。在行動通訊裝置130通過確認後,控制器141接著會對處理器142的應用程式AP進行確認。在應用程式AP通過確認後,控制器141再對行動通訊裝置130進行確認。在行動通訊裝置130通過確認後,控制器141才會啟用通用第二因素服務的認證運作。According to the above, when the electronic device 140 is plugged into the mobile storage device 120, the controller 141 will confirm the application AP of the processor 142. After the application AP passes the confirmation, the controller 141 then confirms the mobile storage device 120. After the mobile storage device 120 passes the confirmation, the controller 141 activates the authentication operation of the universal second factor service. When the electronic device 140 is connected to the mobile communication device 130, the application AP of the processor 142 will confirm the mobile communication device 130. After the mobile communication device 130 passes the confirmation, the controller 141 then confirms the application AP of the processor 142. After the application AP passes the confirmation, the controller 141 confirms the mobile communication device 130 again. After the mobile communication device 130 passes the confirmation, the controller 141 starts the authentication operation of the universal second factor service.

綜上所述,本發明實施例所提出的認證系統及認證方法,可讓使用者使用伺服器裝置所支援的通用第二因素協定的驗證,以提高使用伺服器裝置服務的安全性。此外,由於本發明實施例所提出的認證系統中的行動儲存裝置/行動通訊裝置可以是現有的任何類型的可攜式儲存裝置/可攜式通訊裝置,且認證方法可由電子裝置中的處理器及控制器分別透過應用程式及韌體來執行,因此使用者無須額外購買一個特地針對通用第二因素協定所設計製造的實體金鑰裝置。如此一來,可有效降低使用通用第二因素協定之驗證的成本,從而提高使用者的使用意願。In summary, the authentication system and authentication method proposed in the embodiments of the present invention allow users to use the universal second-factor protocol authentication supported by the server device to improve the security of using the server device service. In addition, since the mobile storage device/mobile communication device in the authentication system proposed by the embodiment of the present invention can be any type of existing portable storage device/portable communication device, and the authentication method can be performed by the processor in the electronic device And the controller is executed through the application and firmware respectively, so the user does not need to purchase an additional physical key device specially designed and manufactured for the general second-factor protocol. In this way, the cost of verification using the universal second-factor protocol can be effectively reduced, thereby increasing the user's willingness to use.

雖然本發明已以實施例揭露如上,然其並非用以限定本發明,任何所屬技術領域中具有通常知識者,在不脫離本發明的精神和範圍內,當可作些許的更動與潤飾,故本發明的保護範圍當視後附的申請專利範圍所界定者為準。Although the present invention has been disclosed in the above embodiments, it is not intended to limit the present invention. Anyone with ordinary knowledge in the technical field can make some changes and modifications without departing from the spirit and scope of the present invention. The scope of protection of the present invention shall be determined by the scope of the attached patent application.

100:認證系統 120:行動儲存裝置 130:行動通訊裝置 140:電子裝置 141:控制器 142:處理器 143:儲存器 1432:加密儲存區 144:按鍵模組 900:伺服器裝置 AP:應用程式 BIR:生物辨識確認結果 BIR1:第一生物辨識確認結果 BIR2:第二生物辨識確認結果 BIS:生物辨識狀態 CHS:認證詢問 CHS1:第一認證詢問 CHS2:第二認證詢問 DGF:摘要檔案 IK:私鑰 IK1:第一私鑰 IK2:第二私鑰 KDF:金鑰識別檔案 KFI0、KFI1、KFI2:電子裝置的金鑰因素資訊 LID:電子裝置的登入帳號 MAC:信息識別碼 RNB:隨機數 S200、S210、S220、S230、S240、S250、S2100、S2102、S2104、S2106、S2108、S2100a、S2102a、S2201、S2202、S2203、S2204、S2205、S2200a、S2202a、S2400、S2402、S2404、S2406、S642、S644、S2500、S2502、S2504、S2506、S752、S754、S756:步驟 SAP:應用程式的識別碼 SEP:選取策略 SIFO:行動儲存裝置的資訊 SIG:簽章 SIG1:第一簽章 SIG2:第二簽章 SN:控制器的識別碼 SVID:伺服器識別碼 UK:公鑰 UK1:第一公鑰 UK2:第二公鑰 100: authentication system 120: Mobile storage device 130: mobile communication device 140: Electronic device 141: Controller 142: Processor 143: Storage 1432: Encrypted storage area 144: Button module 900: Server device AP: Application BIR: biometric confirmation result BIR1: The first biometric verification result BIR2: Second biometric identification confirmation result BIS: Biometric Status CHS: Certification inquiry CHS1: First certification inquiry CHS2: Second certification inquiry DGF: Summary File IK: private key IK1: The first private key IK2: second private key KDF: Key Identification File KFI0, KFI1, KFI2: Key factor information of electronic devices LID: login account of the electronic device MAC: information identification code RNB: random number S200, S210, S220, S230, S240, S250, S2100, S2102, S2104, S2106, S2108, S2100a, S2102a, S2201, S2202, S2203, S2204, S2205, S2200a, S2202a, S2400, S2402, S2404, S2406, S642, S644, S2500, S2502, S2504, S2506, S752, S754, S756: steps SAP: Application ID SEP: Select strategy SIFO: Mobile storage device information SIG: signature SIG1: The first signature SIG2: Second signature SN: the identification code of the controller SVID: Server ID UK: Public key UK1: The first public key UK2: The second public key

下面的所附圖式是本發明的說明書的一部分,繪示了本發明的示例實施例,所附圖式與說明書的描述一起說明本發明的原理。 圖1是依照本發明一實施例所繪示的認證系統的方塊及應用示意圖。 圖2是依照本發明一實施例所繪示的認證方法的步驟流程圖。 圖3是依照本發明一實施例所繪示的電子裝置的方塊示意圖。 圖4是依照本發明一實施例所繪示的圖2的步驟S210的細節步驟流程圖。 圖5是依照本發明一實施例所繪示的圖2的步驟S220的細節步驟流程圖。 圖6是依照本發明另一實施例所繪示的圖2的步驟S210的細節步驟流程圖。 圖7是依照本發明另一實施例所繪示的圖2的步驟S220的細節步驟流程圖。 圖8是依照本發明一實施例的應用程式認證行動通訊裝置的細節步驟流程圖。 圖9是依照本發明一實施例的控制器認證應用程式的細節步驟流程圖。 圖10是依照本發明一實施例所繪示的圖2的步驟S240的細節步驟流程圖。 圖11是依照本發明一實施例所繪示的圖2的步驟S250的細節步驟流程圖。 The accompanying drawings below are a part of the specification of the present invention, and illustrate exemplary embodiments of the present invention. The accompanying drawings and the description of the specification illustrate the principle of the present invention. FIG. 1 is a block diagram and application diagram of an authentication system according to an embodiment of the invention. FIG. 2 is a flowchart of steps of an authentication method according to an embodiment of the invention. FIG. 3 is a block diagram of an electronic device according to an embodiment of the invention. FIG. 4 is a detailed flow chart of step S210 of FIG. 2 according to an embodiment of the present invention. FIG. 5 is a detailed flow chart of step S220 of FIG. 2 according to an embodiment of the present invention. FIG. 6 is a detailed step flowchart of step S210 in FIG. 2 according to another embodiment of the present invention. FIG. 7 is a detailed step flowchart of step S220 in FIG. 2 according to another embodiment of the present invention. FIG. 8 is a flowchart of detailed steps of an application authentication mobile communication device according to an embodiment of the present invention. FIG. 9 is a flowchart of detailed steps of a controller authentication application according to an embodiment of the invention. FIG. 10 is a detailed flowchart of step S240 of FIG. 2 according to an embodiment of the present invention. FIG. 11 is a detailed flow chart of step S250 of FIG. 2 according to an embodiment of the present invention.

100:認證系統 120:行動儲存裝置 130:行動通訊裝置 140:電子裝置 900:伺服器裝置 BIR:生物辨識確認結果 CHS1:第一認證詢問 DGF:摘要檔案 KDF:金鑰識別檔案 KFI0、KFI1、KFI2:金鑰因素資訊 SEP:選取策略 SIG1:第一簽章 UK1:第一公鑰 100: authentication system 120: Mobile storage device 130: mobile communication device 140: Electronic device 900: Server device BIR: biometric confirmation result CHS1: First certification inquiry DGF: Summary File KDF: Key Identification File KFI0, KFI1, KFI2: Key factor information SEP: Select strategy SIG1: The first signature UK1: The first public key

Claims (33)

一種認證系統,包括: 一電子裝置,包括: 一控制器,具有一摘要表格; 一處理器,耦接該控制器,且用以執行一應用程式;以及 一按鍵模組,耦接該控制器,且受控於該控制器, 其中於一綁定階段,該應用程式根據一金鑰因素資訊及一選取策略產生一摘要檔案,並將該摘要檔案及該選取策略儲存在該摘要表格中, 其中於一查驗階段,該應用程式根據該摘要檔案以及該金鑰因素資訊判斷該控制器是否對應一綁定裝置, 當該控制器對應該綁定娤置,則該控制器反應於該按鍵模組的一按壓而根據該綁定裝置對應的該摘要檔案而與一伺服器裝置進行一通用第二因素服務的一認證運作。 An authentication system includes: An electronic device, including: A controller with a summary table; A processor coupled to the controller and used to execute an application program; and A button module, coupled to and controlled by the controller, In a binding phase, the application generates a summary file based on a key factor information and a selection strategy, and stores the summary file and the selection strategy in the summary table. In a verification phase, the application determines whether the controller corresponds to a binding device based on the summary file and the key factor information. When the controller corresponds to the binding setting, the controller responds to a press of the button module and performs a common second factor service with a server device according to the summary file corresponding to the binding device Certification operation. 如請求項1所述的認證系統,其中若該控制器對應該綁定裝置,則於一註冊階段,該控制器根據該摘要檔案而向該伺服器裝置作該通用第二因素服務的註冊。The authentication system according to claim 1, wherein if the controller corresponds to the binding device, in a registration phase, the controller registers the universal second factor service with the server device according to the summary file. 如請求項1所述的認證系統,其中該電子裝置與一行動儲存裝置相插接, 其中於該綁定階段,該應用程式根據該電子裝置的該金鑰因素資訊進行雜湊運算以產生一金鑰識別檔案,並將該金鑰識別檔案傳送至該行動儲存裝置,且該應用程式隨機產生該選取策略,並根據該選取策略選擇該金鑰識別檔案的該檔案狀態以及該行動儲存裝置的該金鑰因素資訊的至少其中之一進行雜湊運算以產生該摘要檔案。 The authentication system according to claim 1, wherein the electronic device is plugged into a mobile storage device, In the binding phase, the application program generates a key identification file based on the key factor information of the electronic device and sends the key identification file to the mobile storage device, and the application program randomly The selection strategy is generated, and at least one of the file status of the key identification file and the key factor information of the mobile storage device is selected according to the selection strategy to perform a hash operation to generate the summary file. 如請求項3所述的認證系統,其中該電子裝置的該金鑰因素資訊包括該控制器的一識別碼、一應用程式的一識別碼以及該電子裝置的一登入帳號,該檔案狀態包括該金鑰識別檔案的建立日期、修改日期、存取日期、檔案叢集的起始位置以及檔案叢集的個數至少其中之一,且該行動儲存裝置的該金鑰因素資訊包括該行動儲存裝置的供應商識別碼、產品識別碼以及剩餘儲存空間大小至少其中之一。The authentication system according to claim 3, wherein the key factor information of the electronic device includes an identification code of the controller, an identification code of an application program, and a login account of the electronic device, and the file status includes the The key identifies at least one of the creation date, modification date, access date, the starting location of the file cluster, and the number of file clusters, and the key factor information of the mobile storage device includes the supply of the mobile storage device At least one of the vendor identification code, product identification code, and remaining storage space size. 如請求項4所述的認證系統,其中於該查驗階段: 該應用程式檢查該行動儲存裝置是否存有該金鑰識別檔案以得到一第一結果, 若該第一結果為是,則該應用程式根據該選取策略檢查該金鑰識別檔案是否對應於該摘要檔案以得到一第二結果, 若該第二結果為是,則該應用程式根據該控制器的該識別碼、該應用程式的該識別碼以及該電子裝置的該登入帳號進行雜湊運算以檢驗該金鑰識別檔案是否正確以得到一第三結果, 若該第三結果為是,則該應用程式判斷該控制器對應該綁定裝置。 The authentication system according to claim 4, wherein in the verification phase: The application checks whether the key identification file is stored in the mobile storage device to obtain a first result, If the first result is yes, the application program checks whether the key identification file corresponds to the summary file according to the selection strategy to obtain a second result, If the second result is yes, the application program performs a hash operation according to the identification code of the controller, the identification code of the application program, and the login account of the electronic device to check whether the key identification file is correct to obtain A third result, If the third result is yes, the application program determines that the controller corresponds to the bound device. 如請求項1所述的認證系統,其中該電子裝置與一行動通訊裝置相連接,其中於該綁定階段,該應用程式等待該行動通訊裝置的一第一生物辨識確認結果,並且 當該第一生物辨識確認結果為通過時,該應用程式自該行動通訊裝置接收該金鑰因素資訊後,將該金鑰因素資訊傳送至該控制器,以產生該摘要檔案。 The authentication system according to claim 1, wherein the electronic device is connected to a mobile communication device, and in the binding phase, the application waits for a first biometric confirmation result of the mobile communication device, and When the first biometric verification result is passed, the application program receives the key factor information from the mobile communication device, and then transmits the key factor information to the controller to generate the summary file. 如請求項6所述的認證系統,其中於該查驗階段,該應用程式等待該行動通訊裝置的一第二生物辨識確認結果,並且 當該第二生物辨識確認結果為通過時,該應用程式自該行動通訊裝置接收該金鑰因素資訊後,將該金鑰因素資訊傳送至該控制器,以確認該控制器是否對應該綁定裝置。 The authentication system according to claim 6, wherein in the verification phase, the application program waits for a second biometric confirmation result of the mobile communication device, and When the second biometric verification result is passed, after the application receives the key factor information from the mobile communication device, it sends the key factor information to the controller to confirm whether the controller corresponds to the binding Device. 如請求項7所述的認證系統,其中在該應用程式等待該行動通訊裝置的該第一生物辨識確認結果或該第二生物辨識確認結果的時間中,該行動通訊裝置產生一第一公鑰及一第一私鑰,並且該應用程式向該行動通訊裝置請求該第一公鑰、一生物辨識狀態以及該金鑰因素資訊,其中該應用程式儲存該第一公鑰, 其中,在該應用程式將該金鑰因素資訊傳送至該控制器之前,該應用程式產生一第二公鑰及一第二私鑰,並且該第二公鑰傳送至該控制器,以使該控制器儲存該第二公鑰。 The authentication system according to claim 7, wherein the mobile communication device generates a first public key while the application is waiting for the first biometric verification result or the second biometric verification result of the mobile communication device And a first private key, and the application program requests the first public key, a biometric identification status, and the key factor information from the mobile communication device, wherein the application program stores the first public key, Wherein, before the application program transmits the key factor information to the controller, the application program generates a second public key and a second private key, and the second public key is transmitted to the controller so that the The controller stores the second public key. 如請求項8所述的認證系統,其中當該應用程式認證該行動通訊裝置時,該行動通訊裝置取得來自該應用程式的一第一認證詢問,該行動通訊裝置反應於該第一認證詢問而依據該第一私鑰產生一第一簽章,且該行動通訊裝置回傳該第一簽章至該應用程式。The authentication system according to claim 8, wherein when the application program authenticates the mobile communication device, the mobile communication device obtains a first authentication query from the application program, and the mobile communication device responds to the first authentication query A first signature is generated according to the first private key, and the mobile communication device returns the first signature to the application. 如請求項8所述的認證系統,其中當該控制器認證該應用程式時,該應用程式取得來自該控制器的一第二認證詢問,該應用程式反應於該第二認證詢問而依據該第二私鑰產生一第二簽章,且該應用程式回傳該第二簽章至該控制器。The authentication system according to claim 8, wherein when the controller authenticates the application, the application obtains a second authentication query from the controller, and the application responds to the second authentication query based on the first authentication query The two private keys generate a second signature, and the application program returns the second signature to the controller. 如請求項1所述的認證系統,其中該電子裝置未與一外部電子裝置相連接,其中於該綁定階段,該應用程式根據該電子裝置的該金鑰因素資訊及該取策略產生該摘要檔案, 其中於該查驗階段,該應用程式根據該摘要檔案以及該電子裝置的該金鑰因素資訊判斷該控制器是否對應該綁定裝置。 The authentication system according to claim 1, wherein the electronic device is not connected to an external electronic device, and in the binding phase, the application program generates the summary according to the key factor information of the electronic device and the retrieval strategy file, In the checking phase, the application program determines whether the controller corresponds to the binding device according to the summary file and the key factor information of the electronic device. 如請求項11所述的認證系統,其中該電子裝置的該金鑰因素資訊包括該控制器的一識別碼、一應用程式的一識別碼以及該電子裝置的一登入帳號。The authentication system according to claim 11, wherein the key factor information of the electronic device includes an identification code of the controller, an identification code of an application program, and a login account of the electronic device. 如請求項2所述的認證系統,其中於該註冊階段: 該控制器將用於登入該伺服器裝置的帳號及密碼傳送至該伺服器裝置,該控制器分別自該伺服器裝置以及該處理器取得一伺服器識別碼以及該摘要檔案,該控制器根據一隨機數、該伺服器識別碼以及該摘要檔案進行雜湊運算以產生一信息識別碼以及一公鑰,且該控制器將該隨機數、該信息識別碼以及該公鑰傳送至該伺服器裝置,以向該伺服器裝置作該通用第二因素服務的註冊。 The authentication system according to claim 2, wherein in the registration phase: The controller sends the account and password used to log in to the server device to the server device. The controller obtains a server identification code and the summary file from the server device and the processor respectively, and the controller according to A random number, the server identification code, and the summary file are hashed to generate an information identification code and a public key, and the controller transmits the random number, the information identification code and the public key to the server device , To register the universal second factor service with the server device. 如請求項13所述的認證系統,其中於該註冊階段,該控制器根據該隨機數、該伺服器識別碼以及該摘要檔案進行雜湊運算以產生一私鑰及該公鑰,且該控制器根據該私鑰、該伺服器識別碼以及該摘要檔案進行雜湊運算以產生該信息識別碼。The authentication system according to claim 13, wherein in the registration phase, the controller performs a hash operation according to the random number, the server identification code, and the digest file to generate a private key and the public key, and the controller According to the private key, the server identification code and the digest file, a hash operation is performed to generate the information identification code. 如請求項14所述的認證系統,其中於該認證階段: 該控制器將用於登入該伺服器裝置的帳號及密碼傳送至該伺服器裝置,該控制器取得來自該伺服器裝置的一認證詢問,該控制器反應於該認證詢問而依據該私鑰產生一簽章,且該控制器回傳該簽章至該伺服器裝置,致使該伺服器裝置根據該簽章及該公鑰進行該通用第二因素服務的認證。 The authentication system according to claim 14, wherein in the authentication phase: The controller sends the account and password used to log in to the server device to the server device, the controller obtains an authentication query from the server device, and the controller responds to the authentication query and generates according to the private key A signature, and the controller returns the signature to the server device, causing the server device to perform authentication of the universal second factor service according to the signature and the public key. 如請求項14所述的認證系統,其中於該認證階段,該控制器判斷該按鍵模組的一按鍵是否被按壓以得到一判斷結果,若該判斷結果為是,則該控制器反應於該認證詢問而依據該私鑰產生該簽章。The authentication system according to claim 14, wherein in the authentication phase, the controller determines whether a key of the key module is pressed to obtain a judgment result, and if the judgment result is yes, the controller responds to the The authentication query generates the signature based on the private key. 如請求項1所述的認證系統,其中該控制器具有一儲存器,用以儲存該摘要表格。The authentication system according to claim 1, wherein the controller has a memory for storing the summary table. 一種認證方法,包括: 於一綁定階段,透過一電子裝置的一處理器所執行的一應用程式根據金鑰因素資訊及一選取策略產生一摘要檔案,並將該摘要檔案儲存在該電子裝置的一控制器的一摘要表格中; 於一查驗階段,透過該電子裝置的該應用程式根據該摘要檔案以及該金鑰因素資訊判斷該控制器是否對應一綁定裝置;以及 若該控制器對應該綁定裝置,則於一認證階段,透過該控制器反應於該電子裝置的一按鍵模組的一按壓而根據該綁定裝置對應的該摘要檔案而與一伺服器裝置進行一通用第二因素服務的一認證運作。 An authentication method including: In a binding phase, an application program executed by a processor of an electronic device generates a summary file based on key factor information and a selection strategy, and stores the summary file in a controller of the electronic device Summary table; In a verification stage, the application program of the electronic device determines whether the controller corresponds to a binding device according to the summary file and the key factor information; and If the controller corresponds to the binding device, in an authentication phase, the controller reacts to a pressing of a button module of the electronic device and communicates with a server device according to the summary file corresponding to the binding device. Perform an authentication operation of a universal second factor service. 如請求項18所述的認證方法,更包括: 若該控制器對應該綁定裝置,則於一註冊階段,透過該控制器根據該摘要檔案而向該伺服器裝置作該通用第二因素服務的註冊。 The authentication method described in claim 18 further includes: If the controller corresponds to the binding device, in a registration stage, the controller registers the general second factor service with the server device according to the summary file. 如請求項18所述的認證方法,其中其中該電子裝置與一行動儲存裝置相插接,並且根據該金鑰因素資訊及該選取策略產生該摘要檔案的步驟包括: 透過該應用程式根據該電子裝置的該金鑰因素資訊進行雜湊運算以產生一金鑰識別檔案, 透過該應用程式隨機產生該選取策略;以及 透過該應用程式根據該選取策略選擇該金鑰識別檔案的該檔案狀態以及該行動儲存裝置的該金鑰因素資訊至少其中之一進行雜湊運算以產生該摘要檔案。 The authentication method according to claim 18, wherein the electronic device is plugged into a mobile storage device, and the steps of generating the summary file according to the key factor information and the selection strategy include: Through the application, a hash operation is performed based on the key factor information of the electronic device to generate a key identification file, Randomly generate the selection strategy through the application; and At least one of the file status of the key identification file and the key factor information of the mobile storage device is selected by the application according to the selection strategy to perform a hash operation to generate the summary file. 如請求項20所述的認證方法,其中該電子裝置的該金鑰因素資訊包括該控制器的一識別碼、該應用程式的一識別碼以及該電子裝置的一登入帳號,該檔案狀態包括該金鑰識別檔案的建立日期、修改日期、存取日期、檔案叢集的起始位置以及檔案叢集的個數至少其中之一,且該行動儲存裝置的該金鑰因素資訊包括該行動儲存裝置的供應商識別碼、產品識別碼以及剩餘儲存空間大小至少其中之一。The authentication method according to claim 20, wherein the key factor information of the electronic device includes an identification code of the controller, an identification code of the application program, and a login account of the electronic device, and the file status includes the The key identifies at least one of the creation date, modification date, access date, the starting location of the file cluster, and the number of file clusters, and the key factor information of the mobile storage device includes the supply of the mobile storage device At least one of the vendor identification code, product identification code, and remaining storage space size. 如請求項21所述的認證方法,其中根據該摘要檔案以及該電子裝置的該金鑰因素資訊查驗該控制器是否對應該綁定裝置的步驟包括: 透過該應用程式檢查該行動儲存裝置是否存有該金鑰識別檔案以得到一第一結果; 若該第一結果為是,則透過該應用程式根據該選取策略檢查該金鑰識別檔案是否對應於該摘要檔案以得到一第二結果; 若該第二結果為是,則透過該應用程式根據該控制器的該識別碼、該應用程式的該識別碼以及該電子裝置的該登入帳號進行雜湊運算以檢驗該金鑰識別檔案是否正確以得到一第三結果;以及 若該第三結果為是,則透過該應用程式判斷該控制器對應該綁定裝置。 The authentication method according to claim 21, wherein the step of checking whether the controller corresponds to the binding device according to the summary file and the key factor information of the electronic device includes: Check whether the key identification file is stored in the mobile storage device through the application to obtain a first result; If the first result is yes, check whether the key identification file corresponds to the summary file through the application according to the selection strategy to obtain a second result; If the second result is yes, the application program performs a hash operation based on the identification code of the controller, the identification code of the application program, and the login account of the electronic device to verify whether the key identification file is correct or not. Get a third result; and If the third result is yes, it is determined through the application that the controller corresponds to the bound device. 如請求項18所述的認證方法,其中該電子裝置與一行動通訊裝置相連接,該認證方法更包括: 於該綁定階段,該應用程式等待該行動通訊裝置的一第一生物辨識確認結果;以及 當該第一生物辨識確認結果為通過時,該應用程式自該行動通訊裝置接收該金鑰因素資訊後,將該金鑰因素資訊傳送至該控制器,以產生該摘要檔案。 The authentication method according to claim 18, wherein the electronic device is connected to a mobile communication device, and the authentication method further includes: During the binding phase, the application waits for a first biometric confirmation result of the mobile communication device; and When the first biometric verification result is passed, the application program receives the key factor information from the mobile communication device, and then transmits the key factor information to the controller to generate the summary file. 如請求項23所述的認證方法,更包括: 於該查驗階段,該應用程式等待該行動通訊裝置的一第二生物辨識確認結果;以及 當該第二生物辨識確認結果為通過時,該應用程式自該行動通訊裝置接收該金鑰因素資訊後,將該金鑰因素資訊傳送至該控制器,以確認該控制器是否對應該綁定裝置。 The authentication method described in claim 23 further includes: During the verification phase, the application waits for a second biometric confirmation result of the mobile communication device; and When the second biometric verification result is passed, after the application receives the key factor information from the mobile communication device, it sends the key factor information to the controller to confirm whether the controller corresponds to the binding Device. 如請求項24所述的認證方法,更包括: 在該應用程式等待該行動通訊裝置的該第一生物辨識確認結果或該第二生物辨識確認結果的時間中,該行動通訊裝置產生一第一公鑰及一第一私鑰,並且該應用程式向該行動通訊裝置請求該第一公鑰、一生物辨識狀態以及該金鑰因素資訊,其中該應用程式儲存該第一公鑰;以及 在該應用程式將該金鑰因素資訊傳送至該控制器之前,該應用程式產生一第二公鑰及一第二私鑰,並且該第二公鑰傳送至該控制器,以使該控制器儲存該第二公鑰。 The authentication method described in claim 24 further includes: While the application is waiting for the first biometric confirmation result or the second biometric confirmation result of the mobile communication device, the mobile communication device generates a first public key and a first private key, and the application Request the first public key, a biometric identification status, and the key factor information from the mobile communication device, wherein the application program stores the first public key; and Before the application program transmits the key factor information to the controller, the application program generates a second public key and a second private key, and transmits the second public key to the controller so that the controller Store the second public key. 如請求項25所述的認證方法,更包括: 當該應用程式認證該行動通訊裝置時,該行動通訊裝置取得來自該應用程式的一第一認證詢問;以及 由該行動通訊裝置反應於該第一認證詢問而依據該第一私鑰產生一第一簽章,且該行動通訊裝置回傳該第一簽章至該應用程式。 The authentication method described in claim 25 further includes: When the application program authenticates the mobile communication device, the mobile communication device obtains a first authentication query from the application program; and The mobile communication device responds to the first authentication query to generate a first signature according to the first private key, and the mobile communication device returns the first signature to the application. 如請求項25所述的認證方法,更包括: 當該控制器認證該應用程式時,該應用程式取得來自該控制器的一第二認證詢問;以及 由該應用程式反應於該第二認證詢問而依據該第二私鑰產生一第二簽章,且該應用程式回傳該第二簽章至該控制器。 The authentication method described in claim 25 further includes: When the controller authenticates the application, the application obtains a second authentication query from the controller; and The application program responds to the second authentication query to generate a second signature according to the second private key, and the application program returns the second signature to the controller. 如請求項18所述的認證方法,其中該電子裝置未與一外部電子裝置相連接,並且該認證方法更包括: 於該綁定階段,該應用程式根據該電子裝置的該金鑰因素資訊及該取策略產生該摘要檔案;以及 於該查驗階段,該應用程式根據該摘要檔案以及該電子裝置的該金鑰因素資訊判斷該控制器是否對應一綁定裝置。 The authentication method according to claim 18, wherein the electronic device is not connected to an external electronic device, and the authentication method further includes: In the binding phase, the application program generates the summary file based on the key factor information of the electronic device and the retrieval strategy; and In the checking phase, the application program determines whether the controller corresponds to a binding device according to the summary file and the key factor information of the electronic device. 如請求項28所述的認證方法,其中該電子裝置的該金鑰因素資訊包括該控制器的一識別碼、一應用程式的一識別碼以及該電子裝置的一登入帳號。The authentication method according to claim 28, wherein the key factor information of the electronic device includes an identification code of the controller, an identification code of an application program, and a login account of the electronic device. 如請求項18所述的認證方法,其中所述根據該摘要檔案而向該伺服器裝置作該通用第二因素服務的註冊的步驟包括: 透過該控制器將用於登入該伺服器裝置的帳號及密碼傳送至該伺服器裝置; 透過該控制器分別自該伺服器裝置以及該處理器取得一伺服器識別碼以及該摘要檔案; 透過該控制器根據一隨機數、該伺服器識別碼以及該摘要檔案進行雜湊運算以產生一信息識別碼以及一公鑰;以及 透過該控制器將該隨機數、該信息識別碼以及該公鑰傳送至該伺服器裝置,以向該伺服器裝置作該通用第二因素服務的註冊。 The authentication method according to claim 18, wherein the step of registering the universal second factor service with the server device according to the summary file includes: Send the account and password used to log in to the server device to the server device through the controller; Obtain a server identification code and the summary file from the server device and the processor through the controller; Performing a hash operation based on a random number, the server identification code and the digest file through the controller to generate an information identification code and a public key; and The random number, the information identification code, and the public key are sent to the server device through the controller to register the universal second factor service with the server device. 如請求項30所述的認證方法,其中所述根據該隨機數、該伺服器識別碼以及該摘要檔案進行雜湊運算以產生該信息識別碼以及該公鑰的步驟包括: 透過該控制器根據該隨機數、該伺服器識別碼以及該摘要檔案進行雜湊運算以產生一私鑰及該公鑰;以及 透過該控制器根據該私鑰、該伺服器識別碼以及該摘要檔案進行雜湊運算以產生該信息識別碼。 The authentication method according to claim 30, wherein the step of performing a hash operation based on the random number, the server identification code, and the digest file to generate the information identification code and the public key includes: Perform hash operations on the controller according to the random number, the server identification code, and the digest file to generate a private key and the public key; and The controller performs a hash operation according to the private key, the server identification code, and the summary file to generate the information identification code. 如請求項31所述的認證方法,其中所述根據對應於該金鑰識別檔案的該摘要檔案而與該伺服器裝置進行該通用第二因素服務的該認證運作的步驟包括: 透過該控制器將用於登入該伺服器裝置的帳號及密碼傳送至該伺服器裝置, 透過該控制器取得來自該伺服器裝置的一認證詢問; 透過該控制器反應於該認證詢問而依據該私鑰產生一簽章;以及 透過該控制器回傳該簽章至該伺服器裝置,致使該伺服器裝置根據該簽章及該公鑰進行該通用第二因素服務的認證。 The authentication method according to claim 31, wherein the step of performing the authentication operation of the universal second factor service with the server device according to the digest file corresponding to the key identification file includes: Send the account and password used to log in to the server device to the server device through the controller, Obtain an authentication query from the server device through the controller; Generate a signature based on the private key in response to the authentication query through the controller; and The signature is returned to the server device through the controller, so that the server device performs authentication of the universal second factor service according to the signature and the public key. 如請求項32所述的認證方法,其中所述透過該控制器反應於該認證詢問而依據該私鑰產生該簽章的步驟包括: 透過該控制器判斷該按鍵模組的一按鍵是否被按壓以得到一判斷結果;以及 若該判斷結果為是,則透過該控制器反應於該認證詢問而依據該私鑰產生該簽章。 The authentication method according to claim 32, wherein the step of generating the signature according to the private key through the controller in response to the authentication query includes: Determine whether a button of the button module is pressed through the controller to obtain a determination result; and If the result of the judgment is yes, the controller is used to respond to the authentication query and generate the signature according to the private key.
TW109116734A 2019-06-10 2020-05-20 Authentication system and authentication method TWI715500B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010488875.6A CN112069493B (en) 2019-06-10 2020-06-02 Authentication system and authentication method
US16/894,889 US11509655B2 (en) 2019-06-10 2020-06-08 Authentication system and authentication method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TW108119975 2019-06-10
TW108119975 2019-06-10

Publications (2)

Publication Number Publication Date
TW202046675A TW202046675A (en) 2020-12-16
TWI715500B true TWI715500B (en) 2021-01-01

Family

ID=73658589

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109116734A TWI715500B (en) 2019-06-10 2020-05-20 Authentication system and authentication method

Country Status (2)

Country Link
CN (1) CN112073178B (en)
TW (1) TWI715500B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9432373B2 (en) * 2010-04-23 2016-08-30 Apple Inc. One step security system in a network storage system
CN115189716B (en) * 2021-04-06 2025-01-21 瑞昱半导体股份有限公司 Identification and pairing method of signal processing system and signal transmission device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105554013A (en) * 2015-12-30 2016-05-04 深圳数字电视国家工程实验室股份有限公司 Separate identity authentication apparatus based on USB device, system and method
US20170232300A1 (en) * 2016-02-02 2017-08-17 Bao Tran Smart device
WO2017155703A1 (en) * 2016-03-08 2017-09-14 Qualcomm Incorporated System, apparatus and method for generating dynamic ipv6 addresses for secure authentication

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577606B (en) * 2014-10-09 2019-03-01 华为技术有限公司 A method and device for realizing authenticator registration
WO2017128756A1 (en) * 2016-01-25 2017-08-03 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for network access
US10154037B2 (en) * 2017-03-22 2018-12-11 Oracle International Corporation Techniques for implementing a data storage device as a security device for managing access to resources
CN107994998A (en) * 2018-01-24 2018-05-04 国民认证科技(北京)有限公司 A kind of authentication information encryption method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105554013A (en) * 2015-12-30 2016-05-04 深圳数字电视国家工程实验室股份有限公司 Separate identity authentication apparatus based on USB device, system and method
US20170232300A1 (en) * 2016-02-02 2017-08-17 Bao Tran Smart device
WO2017155703A1 (en) * 2016-03-08 2017-09-14 Qualcomm Incorporated System, apparatus and method for generating dynamic ipv6 addresses for secure authentication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
A1 *

Also Published As

Publication number Publication date
CN112073178A (en) 2020-12-11
TW202046675A (en) 2020-12-16
CN112073178B (en) 2024-04-05

Similar Documents

Publication Publication Date Title
CN112069493B (en) Authentication system and authentication method
JP6574168B2 (en) Terminal identification method, and method, system, and apparatus for registering machine identification code
US10225089B2 (en) Per-device authentication
TWI759322B (en) Method and device for programming and verification of Internet of Things equipment, and method and device for identity authentication
US9667626B2 (en) Network authentication method and device for implementing the same
KR101941227B1 (en) A FIDO authentication device capable of identity confirmation or non-repudiation and the method thereof
CN111353903A (en) Network identity protection method and device, electronic equipment and storage medium
TW202134913A (en) Query system, method and non-transitory machine-readable medium to determine authentication capabilities
CN106656455B (en) Website access method and device
CN101027676A (en) Personal Tokens and Methods for Controlled Authentication
CN114579951B (en) Service access method, electronic device and storage medium
TWM595792U (en) Authorization system for cross-platform authorizing access to resources
TWI715500B (en) Authentication system and authentication method
JP6567939B2 (en) Information processing system, peripheral device, wireless communication chip, application program, and information processing method
TWI770411B (en) Firmware access based on temporary passwords
WO2009140911A1 (en) Method for interactive authentication
JP2001216270A (en) Authentication station, authentication system and authentication method
CN110061988B (en) Authentication method of embedded equipment, service server and storage medium
KR102515721B1 (en) Non-fungible password authentication supproting method using one time password for authentication based on blockchain and apparatus therefor
CN114615309B (en) Client access control method, device, system, electronic equipment and storage medium
WO2007016867A1 (en) A method of physical authentication and a digital device
JP7668314B2 (en) PROGRAM, INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD
KR101936941B1 (en) Electronic approval system, method, and program using biometric authentication
TWI813905B (en) System for using authentication mechanism of fast identity online to enable certificate and method thereof
JP7768515B2 (en) PROGRAM, INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD