WO2009080854A1 - System for remotely authenticating the identity of users by means of network-based smart cards - Google Patents
System for remotely authenticating the identity of users by means of network-based smart cards Download PDFInfo
- Publication number
- WO2009080854A1 WO2009080854A1 PCT/ES2008/000791 ES2008000791W WO2009080854A1 WO 2009080854 A1 WO2009080854 A1 WO 2009080854A1 ES 2008000791 W ES2008000791 W ES 2008000791W WO 2009080854 A1 WO2009080854 A1 WO 2009080854A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- smart card
- remote
- user
- authentication server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/388—Payment protocols; Details thereof using mutual authentication without cards, e.g. challenge-response
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0833—Card having specific functional components
- G07F7/084—Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
Definitions
- identity can be specified in the set of features of an individual or a community that characterize them in front of others or, beyond, as the awareness that a person has to be himself and different from the rest.
- identification can be considered as the action that allows to recognize if a person is who is supposed.
- Identity management and related security services have come to represent an important challenge.
- a certain person (with a specific identity, therefore) is authorized to perform certain actions to the extent that an entity with the corresponding authority relies on its behavior according to certain expectations associated with said person.
- an important set of challenges for identity management are derived. From a broad perspective, the inclusion of identification should be understood as another element for risk mitigation in the management of security systems.
- the electronic identity credentials are those logical elements whose main function is to associate a set of attributes with the identifying elements of a subject.
- the process by which a subject proves his identity is Authentication.
- identity credentials can be logical or physical structures that operate together, or separately, in order to provide such identity to the holder of a given credential.
- an electronic identity card may contain: a PIN or password to access secure information or authentication codes (hash, CRC, etc.), keys and certificates under PKI infrastructures, keys based on algorithms used to encrypt / decrypt data or validation cryptograms, as well as biometric identifiers.
- a PIN or password to access secure information or authentication codes (hash, CRC, etc.)
- keys and certificates under PKI infrastructures
- keys based on algorithms used to encrypt / decrypt data or validation cryptograms as well as biometric identifiers.
- FIG. 1 shows a generic scheme of remote identification with smart card, consisting of the following elements: - User, U
- the identification of a user is carried out by means of an authentication protocol in which, basically, he must present the authentication certificate C.X509.U_AUT and encrypt with the private key associated with this certificate a challenge (challenge) sent by the entity on the other side of the communication (eg, the remote authentication server SA).
- an authentication protocol in which, basically, he must present the authentication certificate C.X509.U_AUT and encrypt with the private key associated with this certificate a challenge (challenge) sent by the entity on the other side of the communication (eg, the remote authentication server SA).
- Terminal H as the end of both communications, derives and controls the session keys (SK1 and SK2) corresponding to both interfaces. That is, excessive role is given to the role played by Terminal H, which is undesirable in an unreliable environment. 5) The authentication process and the establishment of the secure channel in Ia
- Interface 2 is directed by H that needs the user authentication certificate C.X509.U_AUT, stored in the D for its establishment (normally, support on host H of the PKCS # 11 and CSP standards is required).
- This eID-H collaboration (which behaves as a single client against SA) in the U authentication process is undesirable and may result in man-in-the-middle attacks, originating in H.
- a public terminal is characterized, not only by being “untrustworthy” a priori but also because, often, the user does not have control over this device to validate in a safe and reliable way (for example through the OCSP protocol) certificate received from the remote server.
- network smart card for example, in
- the present invention takes all these inconveniences and deficiencies as challenges and provides an effective and safe solution, applied to the identification of people.
- the following section describes the essential elements of this invention.
- the smart card does not behave like a device integrated in the network, due to the lack of interoperability of the protocols that it implements and, therefore, it lacks the flexibility that any network node must have for its operation with the system in a transparent way, allowing its adaptation to the rapid changes to which This one is subjected.
- a remote authentication server Given the exceptional circumstance (for example, maintenance or repair) that a remote authentication server is not available, local user identification mechanisms must be provided based on different techniques that would force the smart card and Terminal to support a different strategy to guarantee the availability of the identification service.
- An implementation according to the known "network smart card" concept, based on a complete protocol stack - such as TLS / TCP / IP or similar - implies a cost of computing, memory and bandwidth not only unnecessary but also impracticable.
- the invention relates to a remote authentication system of a user according to claim 1. Preferred embodiments of the system are described in the dependent claims.
- the deficiencies mentioned above are overcome with the system of the invention, since it is a system in which the authentication is performed remotely between smart card and remote authentication server, without collaboration in the authentication process between smart card and Terminal ( access point).
- the smart card in the present invention behaves as an autonomous client ("by itself") against the remote authentication server in the process of user authentication. This minimizes the chances of man-in-the-middle attacks, originating from the access point (or Terminal).
- this refers to a remote authentication system of an identity of a user, comprising: a smart card that provides a certificate of authentication of said user (such as, CX509.U_AUT) , an access point or Terminal for said smart card, a remote authentication server to authenticate said smart card,
- said smart card is configured as an authentication requestor independent, and responds to a network protocol stack that implements a remote authentication mechanism controlled by said smart card;
- said access point is configured as a network access server and to act as an authentication intermediary between the smart card and the remote authentication server; and in response to a remote and mutual authentication between said remote authentication server and smart card, an end-to-end secure channel is established by a session key, said secure channel being defined between said smart card and said remote authentication server; and - through said secure channel an authentication of the user's identity is executed by means of said authentication certificate.
- said secure channel defined between smart card and remote authentication server is unique, establishing a single session key.
- Said end-to-end secure channel defined between the smart card and the remote authentication server can be established by authentication of both parties by asymmetric cryptography, based on a first and second component certificates associated with said smart card and said remote authentication server, respectively.
- Said end-to-end secure channel defined between the smart card and the remote authentication server can also be established by authentication of both parties by symmetric cryptography, based on a first and second shared secret keys associated with said smart card and said remote authentication server. respectively.
- mutual network authentication can be carried out between the access point and the remote authentication server.
- a session key can be established, different from the session key for the secure channel defined between smart card and remote authentication server, to encrypt traffic between the smart card and the access point.
- the type of mechanism is established to make use of the authentication certificate stored in the smart card; Said mechanism may be based on biometric techniques or verification techniques of a user's PIN.
- the domain of employment of said user authentication certificate may also be established in the system, which may be corporate (in which case said user is a member of a company) or governmental (in which the user is a citizen or individual).
- the remote authentication system of the present invention implies the following technical advantages:
- a single KSK session key is established for a single tunnel in the defined interface between smart card and SA authentication server (interface A), although the possibility of subsequently deriving a different session key for the defined interface between Terminal-card in order to encrypt the traffic between the two, and therefore for purposes other than those of user authentication.
- Terminal H does not derive or control the KSK session key in the new Interface A, but it is the smart card and the authentication server that can derive and control said key, as authentic communication ends.
- the interest of said secure channel through this session key not only lies in the need to use said channel to safely carry out the identification of the user but also in the possibility of using it in additional or complementary authentication processes (through an additional authentication factor, re-authentication processes, recognized digital signature, etc.)
- Figure 1 shows a diagram of a standard user identification process by means of the smart card-based remote authentication of the D that stores its authentication certificate, for the establishment of a secure channel between H and SA.
- Figure 2 schematically shows the elements of the developed architecture.
- Figure 3 shows in more detail the different elements of the system architecture of the invention with their corresponding protocols.
- Figure 4 shows a diagram of an example of the exchange of messages in the authentication process of the invention.
- Figures 5 and 6 show two examples of application of the process described in Figure 4 with asymmetric and symmetric cryptography, respectively, and detailing the possible implementation of protocols A, B and C.
- Figure 1 shows a scheme of a standard remote authentication process with a smart card D. Specifically, this scheme reflects the process described in the CWA 14890-2: 2004 regulation, under the heading "Client / Server authentication”.
- the card is a mere credential support (in the form of certificate X.509v3) of the user that will be required in the process of establishing a secure SSL / TLS channel between the Terminal o Host (a PC in this case) and a remote SA server. Once this phase is over, this channel will allow the exchange of secure information between both entities (H and SA).
- the communication between the eID card and the Terminal is carried out according to what is established in ISO 7816. That is, it is a system in which the authentication takes place in a single phase, with the aim of authenticating the User for access via channel Secure to remote services.
- the essential elements that compose can be identified
- ID-NSCard 10 card this is an eID smart card, which responds to a specific protocol stack for the remote authentication process and, therefore, incorporates a specific authentication method for this architecture. It participates as a support and store for the identity credentials of the users, as well as an element that autonomously implements the authentication and communication mechanisms with the system remotely.
- Access Point 20 for ID-NSCard it is a Terminal or Host that is a version adapted to this architecture of the traditional controllers and smart card readers ISO 7816. This adaptation in its protocol stack is given by the functionality as Authenticator (authenticator) and that has the access point within the authentication scheme.
- Remote Authentication Server 30 for ID-NSCard responds to a stack of standardized secure protocols, also incorporating the method of authentication.
- Figure 3 the architecture of the invention is explained in more detail, with the different protocols of each element.
- Protocol A means a standardized protocol in network systems, point-to-point connection between two devices (layer 2). This protocol can provide a spectrum of services, once connectivity is available in the link layer, since it must allow the encapsulation of datagrams of different protocols, which can be incorporated as an upper layer, for additional purposes.
- protocol A includes within its specification its own authentication mechanisms, it must be able to be extended by means of a protocol B that improves or extends said mechanisms.
- protocol A the choice of this protocol A must be made to the extent that it allows, due to its characteristics, the interoperation with the original protocols of an ISO 7816 smart card, regardless of the physical layer used: with or without contacts.
- said protocol must be able to work with physical layers that operate in synchronous or asynchronous mode.
- protocol A must also be able to conform to these characteristics.
- protocol A In relation to fragmentation details, protocol A must be able to adapt the MRU (Maximum Receive Unit) to different sizes, including small sizes, usually required on smart cards.
- MRU Maximum Receive Unit
- protocol B is a standardized protocol in network systems, which allows the extension of the possibilities of end-to-end authentication in layer 2, both of users and of the smart card, which they use for electronic identification purposes, in front of a remote authentication server.
- this type of authentication extension protocols have double functionality: on the one hand they are responsible for transporting authentication messages end to end, and on the other they allow the implementation of specific authentication algorithms and mechanisms, which are usually known as the "authentication methods of protocol B" and of which the same device could implement a set of them.
- Protocol B must provide tunnel mechanisms so as to encapsulate one authentication method within another.
- protocol B For its part, in this invention the authentication method of protocol B must allow (i) the user's authentication (identification based on their credentials, C.X509.U_AUT), (ii) Ia of the device used (smart card, through its C.elD.AUT certificate) and (iii) the device or equipment that acts as an authentication server (through C_CV.SA.AUT).
- protocol B must allow the establishment of a secure end-to-end initial tunnel (between the smart card and the authentication server), based on the credentials of the devices, and therefore, different from those belonging to the user .
- Said secure tunnel comes from the successful result of mutual authentication between these devices. Under said tunnel we proceed with the electronic identification of the user based on their credentials.
- protocol B must allow the separation of authentication functionalities as follows:
- Authentication applicant S: entity at the end of a point-to-point segment, which is authenticated by an authenticator A at the opposite end of the link.
- supplicant is also known as claimant, peer or authenticating peer.
- this functionality falls to the access point or host H.
- Authentication server, SA entity that provides an authentication service to an authenticator A. This service determines, based on the credentials provided by the authentication requestor
- the authentication server function is implemented in another entity (physically different) that is accessed through a network (for example, of the TCP / IP type), to which the authenticator A has access.
- the decision of the authentication server typically considers aspects of authentication, authorization and registration or accounting.
- this functionality falls to the remote authentication server SA.
- protocol B does not require IP layer connectivity.
- this protocol B is "one step with blocking" (lock-step) so that a single packet can be in transit in either of the two directions of the communication (based on request-response).
- Protocol B must be flexible in that it must allow the selection of an authentication method -from a set of them- on the side of the smart card (as applicant, S). At the same time, you must allow the authentication server to implement various authentication methods of protocol B.
- Protocol B must incorporate the retransmission mechanisms, being in the lower layers (protocol A) where order in the transmission is guaranteed ⁇ ordering guarantees), and the detection of duplicate (duplicate elimination).
- protocol C it is a standardized protocol in network systems, which at the application level and over UDP-TCP / IP networks, allows the establishment of authentication and authorization remote access sessions (optionally also accounting ) between two network devices with the corresponding functions of authenticator (client in protocol C) and authentication server (server in protocol C).
- the protocol C must allow the extension in the authentication possibilities by means of a protocol B, and therefore, of a set of possible authentication methods of the protocol B.
- the protocol C must allow the appropriate encapsulation of the protocol B.
- Access Point 20 acts as a client in protocol C and the authentication server SA as a server in said protocol, which must also guarantee the establishment of a secure communication between both entities, and independent of other possible secure tunnels between other entities of the scheme.
- a secure tunnel or channel is established 40 between the ID-NSCard smart card and the SA remote authentication server, after the remote and mutual authentication of both parties on the scheme represented in Figure 3.
- This end-to-end authentication between devices and establishment of a secure channel between them occurs over network technology
- the card on behalf of the user authenticates the SA over network technology.
- Kei D and K SA keys are generated as a random number of 32 bytes.
- the previously distributed secret keys K EN c and K MAC are used in the CGA3 and CGA4 cryptograms.
- PK.CA SA -CS_AUT is the authentication certificate for SA signed by the certification authority; allows validating the certificate C_CV.SA.AUT.
- K SA 32-byte key in SA
- PK.CA and i D .CS_AUT authentication certificate for eID signed by the certification authority; allows validating the CeI D. AUT certificate.
- Kei D 32-byte key available in eiD.
- C (RND. SA
- PK.elD.AUT public key of eID, associated with the component certificate C.elD.AUT.
- SK. U AUT private key associated with the U authentication certificate (C.X509.U_AUT) for the signature (encryption) of challenge T.
- KENC and K MA c are shared secret keys for encryption and decryption in MAC functions, respectively (previously established).
- K SA 32-byte key generated here as a random number.
- Kei D 32-byte key generated here as a random number.
- K s «: 32-byte key generated as KSK KSAW
- SSC eiD counter of the sequence in sending from eID
- SK.U.AUT private key associated with the U authentication certificate (C.X509.U_AUT) for the signature (encryption) of challenge T.
- This invention provides for the encapsulation in protocol B of the messages authentication required for the establishment of this tunnel, and in correspondence with protocols A and C.
- the identification of the user is carried out by means of the authentication of his identity credential based on X.509v3 certificates and through the previous tunnel.
- Protocol B must allow a new encapsulation of the messages involved in this second phase, to authenticate the user through their digital certificate.
- the present invention considers a remote authentication architecture with the ID-NSCard smart card as the central element, which supplements the deficiencies described in the background, with the following characteristics:
- the smart card acts as an independent authentication (S) requestor, compared to the current version of split-supplicant.
- the smart card incorporates the authentication protocol and mechanisms atomic form, and therefore, the design of said protocol must be done in an integral way for said device.
- the access point of the ID-NSCard smart card adopts the authenticator (A) functionality, separating itself from the authentication and authorization functionalities of the remote authentication server (SA), by means of the implementation of a stack of standardized protocols that make it a network access server. Under this condition, the independence of the smart card - and its associated identity credentials - is guaranteed at the same time in the process, while this access point or Terminal is involved in the authentication scheme, thus minimizing the risks of a A priori terminal unreliable.
- A authenticator
- SA remote authentication server
- End-to-end mutual authentication scheme in which the smart card participates as one of those ends in front of a remote authentication server, for purposes of identifying users.
- Authentication scheme in layer 2 implies a new approach to network smart cards (network smart cards ), without the need to implement protocols of upper layers and with the consequent lightening of the computational load, of memory resources and bandwidth, which positively results in the speed and efficiency with which user identification operations are carried out «Using protocols of standardized network environments It allows interoperability and flexibility that is required in this context, which enhances the functionalities of identity management systems.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
SISTEMA DE AUTENTICACIÓN REMOTA DE LA IDENTIDAD DE USUARIOS MEDIANTE TARJETAS INTELIGENTES EN RED. REMOTE AUTHENTICATION SYSTEM OF THE IDENTITY OF USERS THROUGH INTELLIGENT NETWORK CARDS.
Campo de Ia Invención La presente invención se engloba dentro de los sistemas centralizados deField of the Invention The present invention is encompassed within the centralized systems of
Identificación de Personas mediante tokens hardware criptográficos. Más en concreto, en tarjetas inteligentes (o smart cards), y de su utilización para Ia validación remota de credenciales de identidad.People Identification using cryptographic hardware tokens. More specifically, in smart cards (or smart cards), and their use for the remote validation of identity credentials.
Antecedentes de Ia InvenciónBackground of the Invention
La definición de identidad puede concretarse en el conjunto de rasgos propios de un individuo o de una colectividad que los caracterizan frente a los demás o, más allá, como Ia conciencia que una persona tiene de ser ella misma y distinta al resto. Así, Ia identificación puede considerarse como Ia acción que permite reconocer si una persona es quien se supone.The definition of identity can be specified in the set of features of an individual or a community that characterize them in front of others or, beyond, as the awareness that a person has to be himself and different from the rest. Thus, the identification can be considered as the action that allows to recognize if a person is who is supposed.
La gestión de Ia identidad y los servicios de seguridad relacionados han llegado a representar un desafío importante. Un determinada persona (con una identidad específica, por tanto) está autorizada a realizar ciertas acciones en Ia medida que una entidad con Ia correspondiente autoridad confía en su comportamiento según ciertas expectativas asociadas a dicha persona. De este manera, de las técnicas de "autorización", así como de las de "control de acceso", se derivan un conjunto importante de desafíos para Ia gestión de Ia identidad. Desde una perspectiva amplia, Ia inclusión de Ia identificación debe entenderse como un elemento más para Ia mitigación del riesgo en Ia gestión de los sistemas de seguridad.Identity management and related security services have come to represent an important challenge. A certain person (with a specific identity, therefore) is authorized to perform certain actions to the extent that an entity with the corresponding authority relies on its behavior according to certain expectations associated with said person. In this way, from the techniques of "authorization", as well as those of "access control", an important set of challenges for identity management are derived. From a broad perspective, the inclusion of identification should be understood as another element for risk mitigation in the management of security systems.
Las credenciales de identidad electrónica son aquellos elementos lógicos cuyo función principal es Ia de asociar un conjunto de atributos con los elementos identificadores de un sujeto. El proceso por el que un sujeto prueba su identidad es Ia Autenticación. De esta manera y de forma general, las credenciales de identidad pueden ser estructuras lógicas o físicas que operan en conjunto, o separadamente, con el objeto de proveer de tal identidad al titular de una credencial dada.The electronic identity credentials are those logical elements whose main function is to associate a set of attributes with the identifying elements of a subject. The process by which a subject proves his identity is Authentication. In this way and in a general way, identity credentials can be logical or physical structures that operate together, or separately, in order to provide such identity to the holder of a given credential.
Son varias las características de tipo lógico que una credencial de identidad electrónica puede contener: un PIN o contraseña para acceder a información segura o códigos de autenticación (hash, CRC, etc.), claves y certificados bajo infraestructuras de PKI, claves sobre Ia base de algoritmos usados para cifrar/descifrar datos o criptogramas de validación, así como los identificadores biométricos.There are several characteristics of a logical type that an electronic identity card may contain: a PIN or password to access secure information or authentication codes (hash, CRC, etc.), keys and certificates under PKI infrastructures, keys based on algorithms used to encrypt / decrypt data or validation cryptograms, as well as biometric identifiers.
Uno de los medios más eficaces para Ia portabilidad de las credenciales de identidad electrónicas asociadas a los individuos son los dispositivos hardware de tipo criptográfico (p.e. USB, tarjetas inteligentes o smart cards, etc.) que, además de por su uso extendido en multitud de escenarios, su tamaño y forma facilitan su manejabilidad. En concreto, las tarjetas inteligentes son consideradas como dispositivos seguros cuya aplicación en esquemas de identificación vienen extendiéndose universalmente en los últimos años en forma de "tarjetas de identificación electrónica" o "ID-cards" (equivalentes al DNI electrónico español) o pasaportes electrónicos. En general, estos sistemas permiten tanto procesos de autenticación off-line (local) entre Ia tarjeta inteligente y el Terminal (que incorpora el lector de Ia tarjeta) como procesos on-line (remoto). Estos sistemas de identificación remota basados en tarjetas electrónicas (ID cards, en adelante el D) pueden presentarse sobre Ia base de distintos esquemas en función de los objetivos perseguidos (firma digital, autenticación, personalización, etc.). En Ia Figura 1 se muestra un esquema genérico de identificación remota con tarjeta inteligente, que consta de los siguientes elementos: - Usuario, UOne of the most effective means for the portability of the electronic identity credentials associated with individuals is the cryptographic hardware devices (eg USB, smart cards or smart cards, etc.) which, in addition to their widespread use in a multitude of scenarios, its size and shape facilitate its manageability. Specifically, smart cards are considered as secure devices whose application in identification schemes have been extended universally in recent years in the form of "electronic identification cards" or "ID-cards" (equivalent to the Spanish electronic ID) or electronic passports. In general, these systems allow both off-line (local) authentication processes between the smart card and the Terminal (which incorporates the card reader) and on-line (remote) processes. These remote identification systems based on electronic cards (ID cards, hereinafter D) can be presented on the basis of different schemes depending on the objectives pursued (digital signature, authentication, personalization, etc.). Figure 1 shows a generic scheme of remote identification with smart card, consisting of the following elements: - User, U
Certificado de Autenticación X.509v3 del Usuario, C.X509.U_AUT [Nota: Un certificado de autenticación X.509v3 se caracteriza por el tipo "Digital Signature" en el campo "KeyUsage", frente a un certificado de firma reconocida que es de tipo "contentCommitment". Las claves para dicho certificado de autenticación se han de generar en Ia propia tarjeta criptográfica, que ha de cumplir un nivel de seguridadUser X.509v3 Authentication Certificate, C.X509.U_AUT [Note: An X.509v3 authentication certificate is characterized by the "Digital Signature" type in the "KeyUsage" field, as opposed to a recognized signature certificate that is of type "contentCommitment". The keys for said authentication certificate must be generated in the cryptographic card itself, which must meet a security level
CC EAL4+. El control sobre Ia clave privada asociada y el propio certificado de autenticación constituyen Ia "credencial de identidad"].CC EAL4 +. The control over the associated private key and the authentication certificate itself constitute the "identity card"].
Tarjeta Inteligente soportando el credencial de identidad, eID Certificado de Componente de Ia Tarjeta Inteligente, C.elD.AUT (obligatorio en entornos no confiables) [Nota: se trata de un certificado Card Verifiable segúnSmart Card supporting the identity card, eID Smart Card Component Certificate, C. elD.AUT (mandatory in unreliable environments) [Note: this is a Verifiable Card certificate according to
ISO 7816-8]ISO 7816-8]
Terminal o Host (incorpora Ia funcionalidad de lector de tarjetas), H Certificado de Componente del Host, C_CV.H.AUT (opcional, aunque obligatorio en los entornos no confiables, según normativa) Servidor Remoto de Autenticación, SA.Terminal or Host (incorporates the card reader functionality), H Host Component Certificate, C_CV.H.AUT (optional, although mandatory in unreliable environments, according to regulations) Servidor Remoto de Authentication, SA.
De esta manera, Ia identificación de un usuario se realiza mediante un protocolo de autenticación en el que, básicamente, éste debe presentar el certificado de autenticación C.X509.U_AUT y cifrar con Ia clave privada asociada a este certificado un desafío (challenge) enviado por Ia entidad en el otro lado de Ia comunicación (por ej., el servidor remoto de autenticación SA).In this way, the identification of a user is carried out by means of an authentication protocol in which, basically, he must present the authentication certificate C.X509.U_AUT and encrypt with the private key associated with this certificate a challenge (challenge) sent by the entity on the other side of the communication (eg, the remote authentication server SA).
Este esquema habitual del empleo de C.X509.U_AUT para Ia identificación remota está recogido en Ia normativa CWA 14890-2 "Application Interface for smart cards used as Secure Signature Creation Devices. Parí: 2: Additional Services", CEN, EUROPEAN COMMITTEE FOR STANDARDIZARON, May 2004, bajo el epígrafe "Client/Sen/er Authentication" y se representa en el esquema de autenticación de Ia identidad del usuario de Ia Figura 1 ; en este caso particularizado con el objetivo de establecer una sesión segura con el protocolo SSL entre H y SA, aunque otros protocolos son posibles (WTLS o Kerberos). Conviene en este punto señalar Ia diferencia entre autenticación entre dispositivos ("Device Authentication") y Ia autenticación de Ia identidad de usuarios. Si bien para Ia primera se emplean secretos compartidos (criptografía simétrica) o certificados de componentes (criptografía asimétrica) -propios de los dispositivos e interpretables por una eID-, en Ia segunda se emplean certificados de autenticación según el estándar X.509v3, emitidos para cada usuario y específicos para su identificación ante el sistema. Dicho certificado, aunque no puede ser verificado por Ia eID, es portado en ella y empleado, bajo demanda, en los procesos de identificación de usuarios. Por tanto, aun cuando un proceso del tipo "device authentication" podría derivar -tras una autenticación de dispositivos mutua- en un túnel extremo a extremo entre eID y SA, al no requerir del certificado de autenticación C.X509.U_AUT no constituye en sí mismo una proceso de identificación de usuario.This usual scheme of the use of C.X509.U_AUT for remote identification is included in the CWA 14890-2 "Application Interface for smart cards used as Secure Signature Creation Devices. Pari: 2: Additional Services", CEN, EUROPEAN COMMITTEE FOR STANDARDIZARON, May 2004, under the heading "Client / Sen / er Authentication" and is represented in the authentication scheme of the identity of the user of Figure 1; in this case, with the objective of establishing a secure session with the SSL protocol between H and SA, although other protocols are possible (WTLS or Kerberos). At this point it is worth noting the difference between authentication between devices ("Device Authentication") and the authentication of user identity. Although for the first one, shared secrets (symmetric cryptography) or component certificates (asymmetric cryptography) are used - own devices and interpretable by an eID -, in the second one authentication certificates are used according to the X.509v3 standard, issued to each user and specific for identification before the system. Said certificate, although it cannot be verified by the eID, is carried on it and used, on demand, in user identification processes. Therefore, even if a process of the type "device authentication" could derive - after mutual device authentication - in an end-to-end tunnel between eID and SA, by not requiring the authentication certificate C.X509.U_AUT does not constitute itself same a user identification process.
Aunque el esquema de Ia Figura 1 requiere de Ia autenticación del usuario de forma remota, el objetivo último no es su identificación sino proveer un mecanismo para el establecimiento de una comunicación segura entre un TerminalAlthough the scheme of Figure 1 requires user authentication remotely, the ultimate goal is not its identification but to provide a mechanism for establishing secure communication between a Terminal
(en Ia lado de usuario) y un servidor remoto . Así el empleo de este esquema para Ia identificación de usuarios presenta los siguientes inconvenientes, y por tanto, posibilidades de mejora: 1) Existe un claro desacople entre los procesos de autenticación eID-H y H-SA: desacople en el plano de Ia comunicación (capas) y en el propio de Ia autenticación. Consecuentemente, Ia el D no tiene información del resultado de Ia autenticación entre H y SA (capa de aplicación), e incluso el SA tampoco dispone información del resultado de Ia autenticación entre eID-H (capa de dispositivos). Al mismo tiempo, el D y SA no se autentican directamente; es decir, no existe ni comunicación ni autenticación mutua en este plano.(on the user side) and a remote server. Thus, the use of this scheme for the identification of users has the following drawbacks, and therefore, possibilities for improvement: 1) There is a clear decoupling between the authentication processes eID-H and H-SA: decouple in the plane of communication (layers) and in the authentication itself. Consequently, the D has no information on the result of the authentication between H and SA (application layer), and even the SA does not have information on the result of the authentication between eID-H (device layer). At the same time, D and SA do not authenticate directly; that is to say, there is neither communication nor mutual authentication in this plane.
2) Es necesario autenticar previamente los dispositivos eID-H (requisito obligado en un entorno no confiable). Una falta de actualización del certificado de componente de H, por ejemplo, bloquearía temporalmente Ia comunicación de eID con el sistema y por tanto, Ia identificación del usuario. En este caso, Ia eID no presenta suficientes recursos (flexibilidad) para enfrentarse a ciertas incidencias en este proceso de autenticación. Al mismo tiempo, se supedita -en gran medida- el proceso remoto a este proceso local.2) It is necessary to previously authenticate the eID-H devices (mandatory requirement in an unreliable environment). A failure to update the component certificate of H, for example, would temporarily block the communication of eID with the system and therefore, the identification of the user. In this case, the eID does not have sufficient resources (flexibility) to face certain incidents in this authentication process. At the same time, the remote process is subject to a large extent to this local process.
3) Una vez llevadas a cabo las correspondientes autenticaciones en Ia Interfaz 1 y en Ia Interfaz 2, se han establecido claves de sesión distintas en ambas interfaces. El host H descifra y cifra el tráfico en ambos sentidos de Ia comunicación, pero accedería a Ia información que transita por él en claro. Este hecho impide por ejemplo que en este esquema se puedan enviar comandos desde el SA a eID por un único canal seguro, por Io que un doble tuneleado, tras un proceso adicional de autenticación mutua sería necesario3) Once the corresponding authentications have been carried out in Interface 1 and in Interface 2, different session keys have been established in both interfaces. Host H decrypts and encrypts the traffic in both directions of the communication, but would access the information that passes through it clearly. This fact prevents, for example, that this scheme can send commands from the SA to eID through a single secure channel, so that a double tunneling, after an additional process of mutual authentication would be necessary
4) El Terminal H, como extremo de ambas comunicaciones, deriva y controla las claves de sesión (SK1 y SK2) correspondientes a ambas interfaces. Es decir, se Ie da una excesiva confianza al papel que desarrolla el Terminal H, Io que no es deseable en un entorno no confiable. 5) El proceso de autenticación y el establecimiento del canal seguro en Ia4) Terminal H, as the end of both communications, derives and controls the session keys (SK1 and SK2) corresponding to both interfaces. That is, excessive role is given to the role played by Terminal H, which is undesirable in an unreliable environment. 5) The authentication process and the establishment of the secure channel in Ia
Interfaz 2 está dirigido por H que necesita del certificado de autenticación del usuario C.X509.U_AUT, almacenado en el D para su establecimiento (normalmente, el soporte en el host H de los estándares PKCS#11 y CSP es requerido). Esta colaboración eID-H (que se comportan como un único cliente frente a SA) en el proceso de autenticación de U no es deseable y puede derivar en ataques del tipo hombre-en-medio, con origen en H.Interface 2 is directed by H that needs the user authentication certificate C.X509.U_AUT, stored in the D for its establishment (normally, support on host H of the PKCS # 11 and CSP standards is required). This eID-H collaboration (which behaves as a single client against SA) in the U authentication process is undesirable and may result in man-in-the-middle attacks, originating in H.
6) Un Terminal público se caracteriza, no solo por ser "no confiable" a priori sino por que, a menudo, el usuario no tiene control sobre este dispositivo para validar de forma segura y fiable (por ejemplo mediante el protocolo OCSP) el certificado recibido del servidor remoto.6) A public terminal is characterized, not only by being "untrustworthy" a priori but also because, often, the user does not have control over this device to validate in a safe and reliable way (for example through the OCSP protocol) certificate received from the remote server.
A diferencia del enfoque presentado en Ia Figura 1 , recientes avances en Ia tecnología de tarjeta inteligentes han hecho posible empezar a tratar a estos dispositivos con funcionalidades similares a las que podría tener cualquier otro host dentro de una red. De esta manera, Ia denominada "network smart card" (por ej., enUnlike the approach presented in Figure 1, recent advances in smart card technology have made it possible to start treating these devices with functionalities similar to those of any other host within a network. Thus, the so-called "network smart card" (for example, in
Montgomery, M., AIi, A. and Lu H. K., "Secure Network Card. Implementation of aMontgomery, M., AIi, A. and Lu H. K., "Secure Network Card. Implementation of a
Standard Network Stack in a Smart Card", In Proc. of 4th IFIP Smart Card Research and Advanced Application Conference, CARDIS '04, Toulouse, FR, KluwerStandard Network Stack in a Smart Card ", In Proc. Of 4 th IFIP Smart Card Research and Advanced Application Conference, CARDIS '04, Toulouse, FR, Kluwer
Academic Publishers, August 23-26, 2004) podría comunicarse de forma segura con otros equipos en Ia red haciendo uso de los protocolos de comunicaciones más habituales como TCP/IP y SSL/TLS.Academic Publishers, August 23-26, 2004) could communicate securely with other computers in the network using the most common communication protocols such as TCP / IP and SSL / TLS.
Sin embargo, este enfoque concreto de network smart cards, que en términos teóricos garantiza su propósito general, obliga a Ia implementación completa de Ia pila de protocolos TCP/IP más otros protocolos de seguridad de capa superior, Io que supone una sobrecarga (aproximada de un 80%) computacional, de memoria y de ancho de banda, por Io que su implementación se hace impracticable para su aplicación en Ia identificación de usuarios.However, this specific approach of network smart cards, which in theoretical terms guarantees its general purpose, obliges the complete implementation of the TCP / IP protocol stack plus other higher layer security protocols, which implies an overload (approximate 80%) computational, memory and bandwidth, so that its implementation becomes impracticable for application in the identification of users.
La presente invención toma todos estos inconvenientes y deficiencias como desafíos y aporta una solución efectiva y segura, aplicada a Ia identificación de personas. En el siguiente apartado se describen los elementos esenciales de esta invención.The present invention takes all these inconveniences and deficiencies as challenges and provides an effective and safe solution, applied to the identification of people. The following section describes the essential elements of this invention.
Así, los sistemas de identificación electrónica basados en tarjetas inteligentes para Ia autenticación remota de Ia identidad de usuarios actualmente empleados adolecen de los siguientes aspectos: - Presentan una excesiva confianza en cuanto al papel que desarrolla elThus, the electronic identification systems based on smart cards for the remote authentication of the identity of users currently employed suffer from the following aspects: - They have excessive confidence regarding the role played by the
Terminal en dichos procesos de autenticación.Terminal in said authentication processes.
Este hecho se hace especialmente latente al observar que según Ia tecnología empleada hasta el momento, el Terminal coopera o colabora en el proceso y autenticación de Ia tarjeta inteligente; por tanto se hace necesario destacar Ia dependencia de Ia tarjeta con respecto al Terminal, y consecuentemente Ia falta de autonomía de Ia tarjeta inteligente en dicho proceso, que en ese momento debería considerarse Ia representación electrónica de su titular.This fact becomes especially latent when observing that according to the technology used so far, the Terminal cooperates or collaborates in the process and authentication of the smart card; therefore it is necessary to highlight the dependence of the card with respect to the Terminal, and consequently the lack of autonomy of the smart card in said process, which at that time should be considered the electronic representation of its holder.
La tarjeta inteligente no se comporta como un dispositivo integrado en Ia red, por la falta de interoperabilidad de los protocolos que ésta implementa y, por tanto, carece de Ia flexibilidad que debe disponer cualquier nodo de red para su inter- operación con el sistema de una forma transparente, permitiéndole su adaptación a los rápidos cambios a los que éste se ve sometido. - Ante Ia circunstancia excepcional (por ejemplo, tareas de mantenimiento o reparación) de que un servidor de autenticación remoto no estuviera disponible, se deben proporcionar mecanismos locales de identificación de usuarios basadas en técnicas distintas que obligaría a Ia tarjeta inteligente y Terminal a soportar una estrategia distinta para garantizar Ia disponibilidad del servicio de identificación. - Una implementación según el concepto "network smart card" conocido, basada en una pila de protocolos completa -tal como TLS/TCP/IP o similar- supone un coste de computación, memoria y ancho de banda no sólo innecesario sino además impracticable.The smart card does not behave like a device integrated in the network, due to the lack of interoperability of the protocols that it implements and, therefore, it lacks the flexibility that any network node must have for its operation with the system in a transparent way, allowing its adaptation to the rapid changes to which This one is subjected. - Given the exceptional circumstance (for example, maintenance or repair) that a remote authentication server is not available, local user identification mechanisms must be provided based on different techniques that would force the smart card and Terminal to support a different strategy to guarantee the availability of the identification service. - An implementation according to the known "network smart card" concept, based on a complete protocol stack - such as TLS / TCP / IP or similar - implies a cost of computing, memory and bandwidth not only unnecessary but also impracticable.
Descripción de Ia InvenciónDescription of the Invention
La invención se refiere a un sistema de autenticación remota de un usuario de acuerdo con Ia reivindicación 1. Realizaciones preferidas del sistema se describen en las reivindicaciones dependientes.The invention relates to a remote authentication system of a user according to claim 1. Preferred embodiments of the system are described in the dependent claims.
Las deficiencias mencionadas anteriormente se superan con el sistema de Ia invención, al tratarse de un sistema en el que Ia autenticación se realiza de forma remota entre tarjeta inteligente y servidor de autenticación remoto, sin colaboración en el proceso de autenticación entre tarjeta inteligente y Terminal (punto de acceso). La tarjeta inteligente en Ia presente invención se comporta como un cliente autónomo ("por sí mismo") frente al servidor de autenticación remoto en el proceso de autenticación del usuario. De esta manera se minimizan las posibilidades de ataques de hombre-en-medio, con origen en el punto de acceso (o Terminal).The deficiencies mentioned above are overcome with the system of the invention, since it is a system in which the authentication is performed remotely between smart card and remote authentication server, without collaboration in the authentication process between smart card and Terminal ( access point). The smart card in the present invention behaves as an autonomous client ("by itself") against the remote authentication server in the process of user authentication. This minimizes the chances of man-in-the-middle attacks, originating from the access point (or Terminal).
Según un primer aspecto de Ia invención, ésta se refiere a un sistema de autenticación remota de una identidad de un usuario, que comprende: una tarjeta inteligente que proporciona un certificado de autenticación de dicho usuario (como por ej., C.X.509.U_AUT), un punto de acceso o Terminal para dicha tarjeta inteligente, un servidor de autenticación remoto para autenticar dicha tarjeta inteligente,According to a first aspect of the invention, this refers to a remote authentication system of an identity of a user, comprising: a smart card that provides a certificate of authentication of said user (such as, CX509.U_AUT) , an access point or Terminal for said smart card, a remote authentication server to authenticate said smart card,
De acuerdo con Ia invención, en el sistema de autenticación remota: dicha tarjeta inteligente está configurada como solicitante de autenticación independiente, y responde a una pila de protocolos de red que implementa un mecanismo de autenticación remota controlado por dicha tarjeta inteligente; dicho punto de acceso está configurado como servidor de acceso a Ia red y para actuar como intermediario de autenticación entre Ia tarjeta inteligente y el servidor de autenticación remoto; y en respuesta a una autenticación remota y mutua entre dichos servidor de autenticación remota y tarjeta inteligente, queda establecido un canal seguro extremo a extremo mediante una clave de sesión, estando definido dicho canal seguro entre dicha tarjeta inteligente y dicho servidor de autenticación remota; y - a través de dicho canal seguro es ejecutada una autenticación de Ia identidad del usuario mediante dicho certificado de autenticación.According to the invention, in the remote authentication system: said smart card is configured as an authentication requestor independent, and responds to a network protocol stack that implements a remote authentication mechanism controlled by said smart card; said access point is configured as a network access server and to act as an authentication intermediary between the smart card and the remote authentication server; and in response to a remote and mutual authentication between said remote authentication server and smart card, an end-to-end secure channel is established by a session key, said secure channel being defined between said smart card and said remote authentication server; and - through said secure channel an authentication of the user's identity is executed by means of said authentication certificate.
Preferiblemente dicho canal seguro definido entre tarjeta inteligente y servidor de autenticación remota es único, estableciéndose una única clave de sesión. Dicho canal seguro extremo a extremo definido entre Ia tarjeta inteligente y el servidor de autenticación remoto puede establecerse mediante autenticación de ambas partes por criptografía asimétrica, basada en un primer y un segundo certificados de componente asociados a dicha tarjeta inteligente y a dicho servidor de autenticación remota, respectivamente. Dicho canal seguro extremo a extremo definido entre Ia tarjeta inteligente y el servidor de autenticación remoto también puede establecerse mediante autenticación de ambas partes por criptografía simétrica, basada en una primera y una segunda claves secretas compartidas asociadas a dicha tarjeta inteligente y a dicho servidor de autenticación remota, respectivamente. Además puede llevarse a cabo una autenticación mutua en red entre el punto de acceso y el servidor de autenticación remoto.Preferably said secure channel defined between smart card and remote authentication server is unique, establishing a single session key. Said end-to-end secure channel defined between the smart card and the remote authentication server can be established by authentication of both parties by asymmetric cryptography, based on a first and second component certificates associated with said smart card and said remote authentication server, respectively. Said end-to-end secure channel defined between the smart card and the remote authentication server can also be established by authentication of both parties by symmetric cryptography, based on a first and second shared secret keys associated with said smart card and said remote authentication server. respectively. In addition, mutual network authentication can be carried out between the access point and the remote authentication server.
Además puede establecerse una clave de sesión, diferente a Ia clave de sesión para el canal seguro definido entre tarjeta inteligente y servidor de autenticación remoto, para cifrar el tráfico entre Ia tarjeta inteligente y el punto de acceso.In addition, a session key can be established, different from the session key for the secure channel defined between smart card and remote authentication server, to encrypt traffic between the smart card and the access point.
Preferiblemente en el sistema se establece el tipo de mecanismo para hacer uso del certificado de autenticación almacenado en Ia tarjeta inteligente; dicho mecanismo puede estar basado en técnicas biométricas o en de técnicas de verificación de un PIN del usuario. También puede estar establecido en el sistema el dominio de empleo de dicho certificado de autenticación de usuario, pudiendo éste ser corporativo (en cuyo caso dicho usuario es miembro de una empresa) o gubernativo (en el que el usuario es un ciudadano o individuo). El sistema de autenticación remota de Ia presente invención supone las siguientes ventajas técnicas:Preferably in the system the type of mechanism is established to make use of the authentication certificate stored in the smart card; Said mechanism may be based on biometric techniques or verification techniques of a user's PIN. The domain of employment of said user authentication certificate may also be established in the system, which may be corporate (in which case said user is a member of a company) or governmental (in which the user is a citizen or individual). The remote authentication system of the present invention implies the following technical advantages:
1) Elimina el desacople entre los procesos de autenticación tarjeta inteligente (elD)-Terminal (H) y Terminal (H) servidor de autenticación (SA) (incluido en el plano de Ia comunicación). Las entidades disponen de información implícita sobre el resultado de los procesos de autenticación.1) Eliminates the decoupling between the smart card (elD) -Terminal (H) and Terminal (H) authentication server (SA) authentication processes (included in the communication plane). Entities have implicit information about the result of authentication processes.
2) No es necesario autenticar previamente tarjeta inteligente-Terminal; sin embargo se preserva el nivel de seguridad que es necesario en los entornos no confiables. La información inicialmente intercambiada no compromete Ia seguridad del sistema. Se reducen las posibilidades de bloqueo de los procesos de autenticación, en caso de incidencias puntales con el estado de los certificados de componentes. En definitiva, se dota a Ia tarjeta inteligente de los recursos para acometer un proceso de autenticación robusto -aunque elástico ante posibles incidencias-, descansando en el servidor remoto SA, en lugar de depender del Terminal o host H. Al mismo tiempo, ante ciertas circunstancias excepcionales -y siempre de forma controlada- el Terminal podría incorporar Ia funcionalidad del SA en ausencia temporal de éste último, sin necesidad de cambio de los protocolos en ninguna de las entidades y siempre de forma transparente a Ia tarjeta inteligentes y su usuario.2) It is not necessary to authenticate previously smart card-Terminal; however, the level of security that is necessary in unreliable environments is preserved. The information initially exchanged does not compromise the security of the system. The possibilities of blocking authentication processes are reduced, in case of incidents with the status of component certificates. In short, the smart card is provided with the resources to undertake a robust authentication process - although elastic in the event of possible incidents -, resting on the remote server SA, instead of relying on the Terminal or host H. At the same time, before certain exceptional circumstances - and always in a controlled way - the Terminal could incorporate the functionality of the SA in the temporary absence of the latter, without the need to change the protocols in any of the entities and always transparently to the smart card and its user.
3) Se establece una única clave de sesión KSK para un único túnel en el interfaz definido entre tarjeta inteligente y servidor de autenticación SA (interfaz A), aunque se deja abierta Ia posibilidad de derivar posteriormente una clave de sesión distinta para Ia interfaz definida entre tarjeta-Terminal con el fin de cifrar el tráfico entre ambos, y por tanto con fines distintos a los de Ia autenticación de usuarios.3) A single KSK session key is established for a single tunnel in the defined interface between smart card and SA authentication server (interface A), although the possibility of subsequently deriving a different session key for the defined interface between Terminal-card in order to encrypt the traffic between the two, and therefore for purposes other than those of user authentication.
4) El Terminal H no deriva ni controla Ia clave de sesión KSK en el nuevo Interfaz A, sino que son Ia tarjeta inteligente y el servidor de autenticación los que pueden derivar y controlar dicha clave, como auténticos extremos de Ia comunicación. El interés de dicho canal seguro mediante esta clave de sesión no sólo radica en Ia necesidad de emplear dicho canal para llevar a cabo de forma segura Ia identificación del usuario sino, además, en Ia posibilidad de emplearlo en procesos adicionales o complementarios de autenticación (mediante un factor de autenticación adicional, procesos de re-autenticación, firma digital reconocida, etc.)4) Terminal H does not derive or control the KSK session key in the new Interface A, but it is the smart card and the authentication server that can derive and control said key, as authentic communication ends. The interest of said secure channel through this session key not only lies in the need to use said channel to safely carry out the identification of the user but also in the possibility of using it in additional or complementary authentication processes (through an additional authentication factor, re-authentication processes, recognized digital signature, etc.)
5) El proceso de autenticación y el establecimiento del canal seguro en Ia Interfaz A desde el lado del usuario está dirigido por Ia tarjeta inteligente que provee el certificado del usuario C.X509.U_AUT que almacena. No existe Ia colaboración tarjeta-Terminal en el proceso de autenticación, por tanto Ia tarjeta inteligente se comporta como un cliente autónomo e independiente frente al servidor de autenticación SA, en el proceso de autenticación del usuario U. De esta manera se minimizan las posibilidades de ataques de hombre-en-medio, con origen en el Terminal H.5) The authentication process and the establishment of the secure channel in Interface A from the user side is directed by the smart card that provides the user certificate C.X509.U_AUT that it stores. There is no Card-Terminal collaboration in the authentication process, therefore the smart card behaves as an autonomous and independent client in front of the authentication server SA, in the process of user authentication U. In this way the possibilities of minimizing man-in-the-middle attacks, originating in Terminal H.
6) Adicionalmente, bajo el esquema de autenticación de Ia presente invención podrían tener cabida otras funcionalidades íntimamente relacionadas con Ia ésta, como autorización y accounting, en una integración transparente, complementado las prestaciones de esquemas previos. 7) Una implementación para este sistema minimiza, al tiempo que Io hace factible, los requerimientos de Ia tarjeta inteligente en términos de computación, memoria y ancho de banda, comparado con propuestas del tipo "network smart card" señaladas en los Antecedentes de Ia Invención.6) Additionally, under the authentication scheme of the present invention, other functionalities intimately related to it could be accommodated, such as authorization and accounting, in a transparent integration, complementing the benefits of previous schemes. 7) An implementation for this system minimizes, while making it feasible, the requirements of the smart card in terms of computing, memory and bandwidth, compared to proposals of the "network smart card" type indicated in the Background of the Invention .
Breve descripción de los dibujosBrief description of the drawings
A continuación se pasa a describir de manera muy breve una serie de dibujos que ayudan a comprender mejor Ia invención y que se presentan como ejemplos ilustrativos pero no limitativos de ésta.Next, a series of drawings that help to better understand the invention and that are presented as illustrative but not limiting examples thereof are described very briefly.
La Figura 1 muestra un esquema de un proceso estándar de identificación de usuario mediante Ia autenticación remota basado en tarjeta inteligente el D que almacena su certificado de autenticación, para el establecimiento de un canal seguro entre H y SA.Figure 1 shows a diagram of a standard user identification process by means of the smart card-based remote authentication of the D that stores its authentication certificate, for the establishment of a secure channel between H and SA.
La Figura 2 se muestra esquemáticamente los elementos de Ia arquitectura desarrollada. La Figura 3 muestra más en detalle los diferentes elementos de Ia arquitectura del sistema de Ia invención con sus correspondientes protocolos.Figure 2 schematically shows the elements of the developed architecture. Figure 3 shows in more detail the different elements of the system architecture of the invention with their corresponding protocols.
La Figura 4 muestra un esquema de un ejemplo del intercambio de mensajes en el proceso de autenticación de Ia invención.Figure 4 shows a diagram of an example of the exchange of messages in the authentication process of the invention.
Las Figuras 5 y 6 muestran sendos ejemplos de aplicación del proceso descrito en Ia Figura 4 con criptografía asimétrica y simétrica, respectivamente, y detallando Ia posible implementación de los protocolos A, B y C.Figures 5 and 6 show two examples of application of the process described in Figure 4 with asymmetric and symmetric cryptography, respectively, and detailing the possible implementation of protocols A, B and C.
Descripción detallada de una realización preferida de Ia invenciónDetailed description of a preferred embodiment of the invention
Como se ha descrito en los Antecedentes de Ia Invención, Ia Figura 1 muestra un esquema de un proceso de autenticación remota estándar con una tarjeta inteligente el D. En concreto este esquema refleja el proceso descrito en Ia normativa CWA 14890-2:2004, bajo el epígrafe "Client/Server authentication".As described in the Background of the Invention, Figure 1 shows a scheme of a standard remote authentication process with a smart card D. Specifically, this scheme reflects the process described in the CWA 14890-2: 2004 regulation, under the heading "Client / Server authentication".
Como ya se ha indicado, en este esquema puede apreciarse cómo Ia tarjeta es un mero soporte de credencial (en Ia forma de certificado X.509v3) del usuario que será requerido en el proceso de establecimiento de un canal seguro SSL/TLS entre el Terminal o Host (un PC en este caso) y un servidor remoto SA. Superada esta fase, dicho canal permitirá el intercambio de información segura entre ambas entidades (H y SA). La comunicación entre Ia tarjeta eID y el Terminal se realiza según Io establecido en el ISO 7816. Es decir, se trata de un sistema en el que Ia autenticación se produce en una única fase, con el objetivo de autenticar al Usuario para acceso mediante canal seguro a servicios remotos. Además puede darse una autenticación local entre dispositivos y establecimiento de canal seguro entre ellos, sobre tecnología ISO 7816. En Ia Figura 2 se pueden identificar los elementos esenciales que componenAs already indicated, in this scheme it can be seen how the card is a mere credential support (in the form of certificate X.509v3) of the user that will be required in the process of establishing a secure SSL / TLS channel between the Terminal o Host (a PC in this case) and a remote SA server. Once this phase is over, this channel will allow the exchange of secure information between both entities (H and SA). The communication between the eID card and the Terminal is carried out according to what is established in ISO 7816. That is, it is a system in which the authentication takes place in a single phase, with the aim of authenticating the User for access via channel Secure to remote services. In addition, there can be local authentication between devices and establishment of a secure channel between them, on ISO 7816 technology. In Figure 2 the essential elements that compose can be identified
Ia arquitectura del sistema de Ia invención. Estos elementos son:The architecture of the system of the invention. These elements are:
Tarjeta ID-NSCard 10: se trata de una tarjeta inteligente eID, que responde a una pila de protocolos específica para el proceso de autenticación remota y, por tanto, incorpora un método de autenticación concreto para esta arquitectura. Participa como soporte y almacén de los credenciales de identidad de los usuarios, así como elemento que implementa autónomamente los mecanismos de autenticación y comunicación con el sistema de forma remota.ID-NSCard 10 card: this is an eID smart card, which responds to a specific protocol stack for the remote authentication process and, therefore, incorporates a specific authentication method for this architecture. It participates as a support and store for the identity credentials of the users, as well as an element that autonomously implements the authentication and communication mechanisms with the system remotely.
Punto de Acceso 20 para ID-NSCard: se trata de un Terminal o Host que supone una versión adaptada a esta arquitectura de los tradicionales controladores y lectores de tarjetas inteligentes ISO 7816. Esta adaptación en su pila de protocolos viene dada por Ia funcionalidad como Autenticador (authenticator) y que tiene el punto de acceso dentro del esquema de autenticación.Access Point 20 for ID-NSCard: it is a Terminal or Host that is a version adapted to this architecture of the traditional controllers and smart card readers ISO 7816. This adaptation in its protocol stack is given by the functionality as Authenticator (authenticator) and that has the access point within the authentication scheme.
Servidor de Autenticación Remoto 30 para ID-NSCard: responde a una pila de protocolos seguros estandarizados, incorporando además el método de autenticación. En Ia Figura 3 se explica más detalladamente Ia arquitectura de Ia invención, con los diferentes protocolos de cada elemento.Remote Authentication Server 30 for ID-NSCard: responds to a stack of standardized secure protocols, also incorporating the method of authentication. In Figure 3 the architecture of the invention is explained in more detail, with the different protocols of each element.
Por protocolo A se entiende un protocolo estandarizado en sistemas de redes, de conexión punto-a-punto entre dos dispositivos (capa 2). Este protocolo puede proporcionar un espectro de servicios, una vez que se dispone de conectividad en Ia capa de enlace, ya que debe permitir el encapsulado de datagramas de distintos protocolos, que pueden incorporarse como capa superior, con propósitos adicionales. Aunque el protocolo A contemple dentro de su especificación sus propios mecanismos de autenticación, éste debe poder ser extendido mediante un protocolo B que mejore o amplíe dichos mecanismos.Protocol A means a standardized protocol in network systems, point-to-point connection between two devices (layer 2). This protocol can provide a spectrum of services, once connectivity is available in the link layer, since it must allow the encapsulation of datagrams of different protocols, which can be incorporated as an upper layer, for additional purposes. Although protocol A includes within its specification its own authentication mechanisms, it must be able to be extended by means of a protocol B that improves or extends said mechanisms.
Por otro lado, Ia elección de este protocolo A se debe hacer en Ia medida que permita, por sus características, Ia interoperación con los protocolos originales de un tarjeta inteligente ISO 7816, con independencia de Ia capa física empleada: con o sin contactos. Así, dicho protocolo debe ser capaz de trabajar con capas físicas que operan en modo síncrono o asincrono. Aunque hay, y habrá, una variedad de tecnologías a emplear en esta capa de Ia tarjeta inteligente, las más aceptadas hasta el momento permiten Ia comunicación asincrona full/half dúplex con diferentes tasas de transmisión. Por tanto, el protocolo A debe poder ajustarse también a estas características. En relación a los detalles de fragmentación, el protocolo A debe poder adaptar el MRU (Máximum Receive Unit) a distintos tamaños, incluyendo los tamaños reducidos, requeridos habitualmente en las tarjetas inteligentes.On the other hand, the choice of this protocol A must be made to the extent that it allows, due to its characteristics, the interoperation with the original protocols of an ISO 7816 smart card, regardless of the physical layer used: with or without contacts. Thus, said protocol must be able to work with physical layers that operate in synchronous or asynchronous mode. Although there are, and will be, a variety of technologies to be used in this layer of the smart card, the most accepted so far allow full / half duplex asynchronous communication with different transmission rates. Therefore, protocol A must also be able to conform to these characteristics. In relation to fragmentation details, protocol A must be able to adapt the MRU (Maximum Receive Unit) to different sizes, including small sizes, usually required on smart cards.
Por su parte el protocolo B es un protocolo estandarizado en sistemas de redes, que permite Ia extensión de las posibilidades de autenticación extremo a extremo en capa 2, tanto de los usuarios como de Ia tarjeta inteligente, que éstos emplean con fines de identificación electrónica, frente a un servidor de autenticación remoto. Normalmente, este tipo de protocolos de extensión de Ia autenticación tienen doble funcionalidad: de un lado son los encargados de transportar los mensajes de autenticación extremo a extremo, y de otro permiten Ia implementación de algoritmos y mecanismos concretos de autenticación, que suelen ser conocidos como los "métodos de autenticación del protocolo B" y de los que un mismo dispositivo podría implementar un conjunto de ellos. El protocolo B debe proporcionar mecanismos de túnel de manera que permita encapsular un método de autenticación dentro de otro. Por su parte, en esta invención el método de autenticación del protocolo B debe permitir (i) Ia autenticación del usuario (identificación basada en sus credenciales, C.X509.U_AUT), (ii) Ia del dispositivo que emplea (tarjeta inteligente, mediante su certificado C.elD.AUT) y (iii) el dispositivo o equipo que actúa como servidor de autenticación (mediante C_CV.SA.AUT). En este sentido, el protocolo B debe permitir el establecimiento de un túnel seguro extremo a extremo inicial (entre Ia tarjeta inteligente y el servidor de autenticación), basado en los credenciales propios de los dispositivos, y por tanto, distintos a los pertenecientes al usuario. Dicho túnel seguro proviene del resultado exitoso de una autenticación mutua entre estos dispositivos. Bajo dicho túnel se procede con Ia identificación electrónica del usuario basado en sus credenciales.On the other hand, protocol B is a standardized protocol in network systems, which allows the extension of the possibilities of end-to-end authentication in layer 2, both of users and of the smart card, which they use for electronic identification purposes, in front of a remote authentication server. Normally, this type of authentication extension protocols have double functionality: on the one hand they are responsible for transporting authentication messages end to end, and on the other they allow the implementation of specific authentication algorithms and mechanisms, which are usually known as the "authentication methods of protocol B" and of which the same device could implement a set of them. Protocol B must provide tunnel mechanisms so as to encapsulate one authentication method within another. For its part, in this invention the authentication method of protocol B must allow (i) the user's authentication (identification based on their credentials, C.X509.U_AUT), (ii) Ia of the device used (smart card, through its C.elD.AUT certificate) and (iii) the device or equipment that acts as an authentication server (through C_CV.SA.AUT). In this sense, protocol B must allow the establishment of a secure end-to-end initial tunnel (between the smart card and the authentication server), based on the credentials of the devices, and therefore, different from those belonging to the user . Said secure tunnel comes from the successful result of mutual authentication between these devices. Under said tunnel we proceed with the electronic identification of the user based on their credentials.
Por tanto, las especificaciones del protocolo B deben permitir Ia separación de funcionalidades de autenticación de Ia siguiente manera:Therefore, the specifications of protocol B must allow the separation of authentication functionalities as follows:
Solicitante de autenticación (supplicant), S: entidad en el extremo de un segmento punto a punto, que es autenticado por un autenticador A en el extremo opuesto del enlace. El término de solicitante de autenticación (supplicant) es también conocido como claimant, peer o authenticating peer.Authentication applicant (supplicant), S: entity at the end of a point-to-point segment, which is authenticated by an authenticator A at the opposite end of the link. The term supplicant is also known as claimant, peer or authenticating peer.
En Ia presente invención esta funcionalidad recae netamente en Ia tarjeta inteligente ID-NSCard. - Autenticador (authenticator), A: entidad en el extremo de un segmento punto a punto que intermedia (pass-through) en Ia autenticación de una entidad asociada en el otro extremo del enlace. Es, por tanto, Ia entidad que garantiza y controla el acceso.In the present invention this functionality falls clearly on the ID-NSCard smart card. - Authenticator, A: entity at the end of a point-to-point segment that intermediates (pass-through) in the authentication of an associated entity at the other end of the link. It is, therefore, the entity that guarantees and controls access.
En Ia presente invención esta funcionalidad recae en el punto de acceso o host H.In the present invention this functionality falls to the access point or host H.
Servidor de autenticación (authentication server), SA: entidad que proporciona un servicio de autenticación a un autenticador A. Este servicio determina, a partir de los credenciales aportados por el solicitante de autenticaciónAuthentication server, SA: entity that provides an authentication service to an authenticator A. This service determines, based on the credentials provided by the authentication requestor
(supplicant), S, si éste está o no autorizado para acceder a los servicios que facilita el autenticador A.(supplicant), S, whether or not he is authorized to access the services provided by the authenticator A.
En el presente caso, Ia función del servidor de autenticación está implementada en otra entidad (distinta físicamente) a Ia que se accede a través de una red (por ejemplo, de tipo TCP/IP), a Ia cual el autenticador A tiene acceso.In the present case, the authentication server function is implemented in another entity (physically different) that is accessed through a network (for example, of the TCP / IP type), to which the authenticator A has access.
Esta separación de las funcionalidades entre autenticador y servidor de autenticación simplifica Ia gestión de los credenciales y Ia realización de políticas de decisión; aunque este aspecto complica el análisis de seguridad y Ia distribución de claves (si fuera necesaria), facilita Ia escalabilidad. Sin embargo, este sistema permite que en situaciones excepcionales y bajo control, el servidor de autenticación no esté separado físicamente del Terminal y sin que esto requiera cambio alguno en Ia implementación de las entidades, incluida Ia tarjeta ID-NSCard.This separation of the functions between authenticator and server of authentication simplifies the management of credentials and the implementation of decision policies; Although this aspect complicates the security analysis and the distribution of keys (if necessary), it facilitates scalability. However, this system allows that in exceptional situations and under control, the authentication server is not physically separated from the Terminal and without this requiring any change in the implementation of the entities, including the ID-NSCard card.
La decisión del servidor de autenticación, típicamente, considera aspectos de autenticación, autorización y registro o accounting.The decision of the authentication server typically considers aspects of authentication, authorization and registration or accounting.
En Ia presente invención esta funcionalidad recae en el servidor remoto de autenticación SA.In the present invention this functionality falls to the remote authentication server SA.
Al no tratarse de un protocolo de transporte de datos de aplicación, sino de una arquitectura para transportar paquetes de protocolos de autenticación, el protocolo B no requiere de conectividad en capa IP. Por otro lado, este protocolo B es de "un paso con bloqueo" (lock-step) por Io que un solo paquete puede estar en tránsito en cualquiera de los dos sentidos de Ia comunicación (basado en request- response).As it is not an application data transport protocol, but an architecture to transport authentication protocol packets, protocol B does not require IP layer connectivity. On the other hand, this protocol B is "one step with blocking" (lock-step) so that a single packet can be in transit in either of the two directions of the communication (based on request-response).
El protocolo B debe ser flexible en cuanto que debe permitir seleccionar un método de autenticación -de entre un conjunto de ellos- en el lado Ia tarjeta inteligente (como solicitante, S). Al mismo tiempo, debe permitir al servidor de autenticación que implemente diversos métodos de autenticación del protocolo B.Protocol B must be flexible in that it must allow the selection of an authentication method -from a set of them- on the side of the smart card (as applicant, S). At the same time, you must allow the authentication server to implement various authentication methods of protocol B.
Es decir, debe ser posible acordar entre los extremos el uso de uno en concreto, sin Ia necesidad de fijar con antelación uno en particular. En el presente caso, el Punto de Acceso 20 no tiene por qué entender cada método de autenticación. El protocolo B debe incorporar los mecanismos de retransmisión, siendo en las capas inferiores (protocolo A) donde se garantiza el orden en Ia transmisión {ordering guarantees), y Ia detección de duplicado (duplícate elimination).That is, it must be possible to agree between the extremes the use of one in particular, without the need to fix in advance one in particular. In the present case, Access Point 20 does not have to understand each authentication method. Protocol B must incorporate the retransmission mechanisms, being in the lower layers (protocol A) where order in the transmission is guaranteed {ordering guarantees), and the detection of duplicate (duplicate elimination).
De otro lado, no tiene por qué incorporar mecanismos de fragmentación y reensamblado, pudiendo ser estos mecanismos incorporados por los propios métodos de autenticación del protocolo B.On the other hand, it does not have to incorporate fragmentation and reassembly mechanisms, and these mechanisms may be incorporated by the authentication methods of protocol B.
En cuanto al protocolo C, se trata de un protocolo estandarizado en los sistemas de redes, que a nivel de aplicación y sobre redes de UDP-TCP/IP, permite el establecimiento de sesiones de acceso remoto de autenticación y autorización (opcionalmente también de accounting) entre dos equipos de red con las correspondientes funcionalidades de autenticador (cliente en el protocolo C) y servidor de autenticación (servidor en el protocolo C). El protocolo C debe permitir Ia extensión en las posibilidades de autenticación mediante un protocolo B, y por tanto, de un conjunto de posibles métodos de autenticación del protocolo B. Así, el protocolo C debe permitir el encapsulado apropiado del protocolo B.As for protocol C, it is a standardized protocol in network systems, which at the application level and over UDP-TCP / IP networks, allows the establishment of authentication and authorization remote access sessions (optionally also accounting ) between two network devices with the corresponding functions of authenticator (client in protocol C) and authentication server (server in protocol C). The protocol C must allow the extension in the authentication possibilities by means of a protocol B, and therefore, of a set of possible authentication methods of the protocol B. Thus, the protocol C must allow the appropriate encapsulation of the protocol B.
En Ia presente invención el Punto de Acceso 20 actúa como cliente en el protocolo C y el servidor de autenticación SA como servidor en dicho protocolo, que debe además garantizar el establecimiento de una comunicación segura entre ambas entidades, e independiente de otros posibles túneles seguros entre otras entidades del esquema.In the present invention, Access Point 20 acts as a client in protocol C and the authentication server SA as a server in said protocol, which must also guarantee the establishment of a secure communication between both entities, and independent of other possible secure tunnels between other entities of the scheme.
Otros equipos de red 25 que intermedien entre el autenticador A y el servidor de autenticación SA deben implementar funcionalidades de intermediación (proxy) del protocolo C, limitándose a Ia retransmisión de los mensajes relativos a dicho protocolo. Partiendo de esta arquitectura, Ia autenticación (protocolo B) de Ia identidad del usuario 11 de Ia presente invención se desarrolla en dos fases, según Figura 4: 1a) En primer lugar, en una primera fase se establece un túnel o canal seguro 40 entre Ia tarjeta inteligente ID-NSCard y el servidor de autenticación remoto SA, tras Ia autenticación remota y mutua de ambas partes sobre el esquema representado en Ia Figura 3. Esta autenticación extremo a extremo entre dispositivos y establecimiento de canal seguro entre ellos se produce sobre tecnología de red. La tarjeta en nombre del usuario, autentica al SA sobre tecnología de redes.Other network equipment 25 that intermediate between the authenticator A and the authentication server SA must implement intermediation (proxy) functions of the protocol C, being limited to the retransmission of the messages related to said protocol. Starting from this architecture, the authentication (protocol B) of the identity of the user 11 of the present invention is carried out in two phases, according to Figure 4: 1 a ) First, in a first phase a secure tunnel or channel is established 40 between the ID-NSCard smart card and the SA remote authentication server, after the remote and mutual authentication of both parties on the scheme represented in Figure 3. This end-to-end authentication between devices and establishment of a secure channel between them occurs over network technology The card on behalf of the user, authenticates the SA over network technology.
Existen varias posibles formas de establecer este túnel extremo-a-extremo: - una forma basada en Ia distribución previa de secretos (criptografía simétrica), de Ia que se ilustra un ejemplo en Ia Figura 6.There are several possible ways to establish this end-to-end tunnel: - a form based on the prior distribution of secrets (symmetric cryptography), of which an example is illustrated in Figure 6.
Otras formas basadas en criptografía asimétrica (certificados de componentes), de las que se ilustra un ejemplo en Ia Figura 5.Other forms based on asymmetric cryptography (component certificates), of which an example is illustrated in Figure 5.
En ambos casos el túnel se establece mediante una clave de sesión KSχ. derivada a partir de las claves KeιD y KSA; sin embargo, éstas últimas claves se crean de distinta manera, según se trate del caso representado en Ia Figura 6 o en Ia Figura 5.In both cases the tunnel is established by a session key K S χ. derived from the keys K e ι D and K SA ; However, the latter keys are created differently, depending on the case represented in Figure 6 or Figure 5.
En el ejemplo de criptografía simétrica (Figura 6) las claves KeiD y KSA son generadas como un número aleatorio de 32 bytes. Para comunicar al otro extremo de la comunicación Ia clave correspondiente, se emplean las claves secretas previamente distribuidas KENc y KMAC en los criptogramas CGA3 y CGA4.In the example of symmetric cryptography (Figure 6) the Kei D and K SA keys are generated as a random number of 32 bytes. To communicate to the other end of the corresponding Ia communication, the previously distributed secret keys K EN c and K MAC are used in the CGA3 and CGA4 cryptograms.
Para el caso de criptografía asimétrica (Figura 5), se ha supuesto que ambas partes de Ia comunicación disponen, respectivamente, de las claves de 32 bytes KeiD y KSA- Para autenticarse mutuamente e intercambiarse de forma segura dichas claves, se emplean los criptogramas CGA1 y CGA2, que se transmiten ciertos elementos (incluidas dichas claves) firmados por Ia clave privada en cada caso, y el conjunto de cada criptograma cifrado con Ia clave pública del dispositivo destinatario. Los extremos se autentican mediante el descifrado correspondiente y Ia verificación de dicha firma.In the case of asymmetric cryptography (Figure 5), it has been assumed that both parts of the communication have, respectively, the 32-byte keys Kei D and K SA - To authenticate each other and securely exchange said keys, the keys are used CGA1 and CGA2 cryptograms, which transmit certain elements (including said keys) signed by the private key in each case, and the set of each cryptogram encrypted with the public key of the target device. The ends are authenticated by the corresponding decryption and verification of said signature.
A continuación pasan a explicarse los términos usados en Ia Figura 5 (esquema asimétrico):The terms used in Figure 5 (asymmetric scheme) are explained below:
PK.CASA-CS_AUT: es el certificado de autenticación para SA firmado por Ia autoridad de certificación; permite validar el certificado C_CV.SA.AUT. KSA : clave de 32 bytes en SAPK.CA SA -CS_AUT: is the authentication certificate for SA signed by the certification authority; allows validating the certificate C_CV.SA.AUT. K SA : 32-byte key in SA
PK.CAeiD.CS_AUT : certificado de autenticación para eID firmado por Ia autoridad de certificación; permite validar el certificado CeI D. AUT.PK.CA and i D .CS_AUT: authentication certificate for eID signed by the certification authority; allows validating the CeI D. AUT certificate.
KeiD: clave de 32 bytes disponible en eiD.Kei D : 32-byte key available in eiD.
En el mensaje [MO]: : RND.elD. Número aleatorio generado por eID.In the [MO] message:: RND.elD. Random number generated by eID.
En el mensaje [M 1]:In the message [M 1]:
: C = (RND. SA || SN. SA). Valor generado por SA, con un valor aleatorio y un número de serie.: C = (RND. SA || SN. SA). Value generated by SA, with a random value and a serial number.
: C_CV.SA.AUT. Certificado de componente de SA. : Ref(PK.CASA-CS_AUT). Referencia a Ia autoridad de certificación.: C_CV.SA.AUT. SA component certificate. : Ref (PK.CA SA -CS_AUT). Reference to the certification authority.
: KeylD(SK.elD.AUT). Identificador de Ia clave de firma esperada.: KeylD (SK.elD.AUT). Identifier of the expected signature key.
: KeylD(PK.SA.AUT). Identificador de Ia clave pública de SA.: KeylD (PK.SA.AUT). Identifier of the public key of SA.
En [M2]:In [M2]:
: C.elD.AUT. Certificado de componente de eID. : CGA1. Criptograma de autenticación que contiene Ia clave pública de eID,: C. elD.AUT. EID component certificate. : CGA1. Authentication cryptogram containing the eID public key,
PK.elD.AUT.PK.elD.AUT.
PK.elD.AUT: clave pública de eID, asociada al certificado de componente C.elD.AUT.PK.elD.AUT: public key of eID, associated with the component certificate C.elD.AUT.
En [M3]: : CGA2. Criptograma de autenticación que contiene Ia clave KSA-In [M3]: : CGA2. Authentication cryptogram containing the key K S A-
:T. Desafío de Autenticación generado por SA. Clave de sesión Ks« calculada a partir de KSA y KeiD : T. Authentication Challenge generated by SA. Session key K s «calculated from K S A and Kei D
En [M4]: : C.X509.U_AUT. Certificado de autenticación del usuario U.In [M4]:: C.X509.U_AUT. User authentication certificate U.
: DS[T]- Firma (cifrado) del desafío T con SK.U.AUT.: DS [T] - Signature (encryption) of challenge T with SK.U.AUT.
SK. U AUT: clave privada asociada al certificado de autenticación de U (C.X509.U_AUT) para Ia firma (cifrado) del desafío T.SK. U AUT: private key associated with the U authentication certificate (C.X509.U_AUT) for the signature (encryption) of challenge T.
Igualmente, a continuación se explican brevemente los términos usados en Ia Figura 6 (esquema simétrico):Likewise, the terms used in Figure 6 (symmetric scheme) are briefly explained below:
KENC y KMAc: son claves secretas compartidas para el cifrado y descifrado en funciones MAC, respectivamente (previamente establecidas).KENC and K MA c: are shared secret keys for encryption and decryption in MAC functions, respectively (previously established).
En el mensaje [MO]:In the [MO] message:
: SN.eID || RND.elD. Número de serie y valor aleatorio proporcionado por eID.: SN.eID || RND.elD. Serial number and random value provided by eID.
KSA: clave de 32 bytes generada aquí como número aleatorio.K SA : 32-byte key generated here as a random number.
En [M1]:In [M1]:
: CGA3. Criptograma de autenticación protegido con KENC y KMAC, transporta: CGA3. Authentication cryptogram protected with K E NC and KMAC, transports
KeiD: clave de 32 bytes generada aquí como número aleatorio.Kei D : 32-byte key generated here as a random number.
Ks«: clave de 32 bytes generada como KSK=KSAWK s «: 32-byte key generated as KSK = KSAW
SSC. eiD: contador de Ia secuencia en el envío desde eIDSSC eiD: counter of the sequence in sending from eID
En [M2]:In [M2]:
: CGA4. criptograma de autenticación protegido con KENC y KMAC, transporta: CGA4. Authentication cryptogram protected with K E NC and K M AC, transports
SSCSA: contador de Ia secuencia en el envío desde SA. En [M3]:SSCSA: counter of the sequence in the shipment from SA. In [M3]:
: T. Desafío de autenticación generado por SA. En [M4]: : C.X509.U_AUT. Certificado de autenticación del usuario U.: T. Authentication challenge generated by SA. In [M4]:: C.X509.U_AUT. User authentication certificate U.
: DS[T]. Firma (cifrado) del desafío T con SK.U.AUT.: DS [T]. Signature (encryption) of challenge T with SK.U.AUT.
SK.U.AUT: clave privada asociada al certificado de autenticación de U (C.X509.U_AUT) para Ia firma (cifrado) del desafío T.SK.U.AUT: private key associated with the U authentication certificate (C.X509.U_AUT) for the signature (encryption) of challenge T.
Esta invención prevé el encapsulamiento en el protocolo B de los mensajes de autenticación necesarios para el establecimiento de este túnel, y en correspondencia con los protocolos A y C.This invention provides for the encapsulation in protocol B of the messages authentication required for the establishment of this tunnel, and in correspondence with protocols A and C.
2a) Después, en una segunda fase, se lleva a cabo Ia identificación del usuario mediante Ia autenticación de su credencial de identidad basada en certificados X.509v3 y a través del túnel anterior.2 a ) Then, in a second phase, the identification of the user is carried out by means of the authentication of his identity credential based on X.509v3 certificates and through the previous tunnel.
El protocolo B debe permitir un nuevo encapsulamiento de los mensajes involucrados en esta segunda fase, para autenticar al usuario mediante su certificado digital.Protocol B must allow a new encapsulation of the messages involved in this second phase, to authenticate the user through their digital certificate.
Es decir, Ia presente invención considera una arquitectura de autenticación remota con Ia tarjeta inteligente ID-NSCard como elemento central, que suple las deficiencias descritas en los antecedentes, con las siguientes características:That is, the present invention considers a remote authentication architecture with the ID-NSCard smart card as the central element, which supplements the deficiencies described in the background, with the following characteristics:
Se trata de una tarjeta inteligente autónoma en el proceso de autenticación, Io cual implica:It is an autonomous smart card in the authentication process, which implies:
- La tarjeta inteligente actúa como solicitante de autenticación (S) independiente, frente a Ia versión actual de solicitante dividido (split-supplicant).- The smart card acts as an independent authentication (S) requestor, compared to the current version of split-supplicant.
- La tarjeta inteligente incorpora el protocolo y mecanismos de autenticación de forma atómica, y por tanto, el diseño de dicho protocolo debe hacerse de forma integral para dicho dispositivo.- The smart card incorporates the authentication protocol and mechanisms atomic form, and therefore, the design of said protocol must be done in an integral way for said device.
El punto de acceso de Ia tarjeta inteligente ID-NSCard adopta Ia funcionalidad de autenticador (A), desvinculándose de las funcionalidades de autenticación y autorización al servidor de autenticación (SA) remoto, mediante Ia implementación de una pila de protocolos estandarizados que Ie convierten en un servidor de acceso a Ia red. Bajo esta condición, se garantiza al mismo tiempo Ia independencia de Ia tarjeta inteligente -y sus credenciales identidad asociados- en el proceso, al tiempo que se involucra a este punto de acceso o Terminal en el esquema de autenticación, minimizando así los riesgos de un Terminal a priorí no confiable.The access point of the ID-NSCard smart card adopts the authenticator (A) functionality, separating itself from the authentication and authorization functionalities of the remote authentication server (SA), by means of the implementation of a stack of standardized protocols that make it a network access server. Under this condition, the independence of the smart card - and its associated identity credentials - is guaranteed at the same time in the process, while this access point or Terminal is involved in the authentication scheme, thus minimizing the risks of a A priori terminal unreliable.
Esquema de autenticación mutua extremo a extremo, en el que Ia tarjeta inteligente participa como uno de esos extremos frente a un servidor de autenticación remoto, con fines propios de Ia identificación de usuarios.End-to-end mutual authentication scheme, in which the smart card participates as one of those ends in front of a remote authentication server, for purposes of identifying users.
* Esquema de autenticación en capa 2 (o capa de enlace según el modelo de referencia OSI): Ia integración de Ia tarjeta inteligente sobre Ia base de una autenticación remota en capa 2 supone un nuevo enfoque de las tarjetas inteligentes en red (network smart cards), sin necesidad de implementar protocolos de capas superiores y con el consiguiente aligeramiento de Ia carga computacional, de recursos de memoria y ancho de banda, Io cual redunda positivamente en Ia velocidad y eficiencia con que se realizan las operaciones de identificación de usuarios « El utilizar protocolos de entornos de red estandarizados permite Ia interoperabilidad y Ia flexibilidad que se requiere en este contexto, que potencia las funcionalidades de los sistemas de gestión de Ia identidad.* Authentication scheme in layer 2 (or link layer according to the OSI reference model): the integration of the smart card on the basis of a remote authentication in layer 2 implies a new approach to network smart cards (network smart cards ), without the need to implement protocols of upper layers and with the consequent lightening of the computational load, of memory resources and bandwidth, which positively results in the speed and efficiency with which user identification operations are carried out «Using protocols of standardized network environments It allows interoperability and flexibility that is required in this context, which enhances the functionalities of identity management systems.
La invención ha sido descrita según una realización preferida de Ia misma, pero para el experto en Ia materia resultará evidente que otras variaciones pueden ser introducidas sin exceder el objeto de Ia invención reivindicada. The invention has been described according to a preferred embodiment thereof, but it will be clear to the person skilled in the art that other variations can be introduced without exceeding the object of the claimed invention.
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| ESP200703406 | 2007-12-21 | ||
| ES200703406A ES2333931B1 (en) | 2007-12-21 | 2007-12-21 | REMOTE AUTHENTICATION SYSTEM OF THE IDENTITY OF USERS THROUGH INTELLIGENT NETWORK CARDS. |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2009080854A1 true WO2009080854A1 (en) | 2009-07-02 |
Family
ID=40800746
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/ES2008/000791 Ceased WO2009080854A1 (en) | 2007-12-21 | 2008-12-22 | System for remotely authenticating the identity of users by means of network-based smart cards |
Country Status (2)
| Country | Link |
|---|---|
| ES (1) | ES2333931B1 (en) |
| WO (1) | WO2009080854A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2017189629A1 (en) * | 2016-04-26 | 2017-11-02 | Ciphertext Solutions, Inc. | Issuance of virtual electronic cards using device and user-specific authentication information |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005034052A1 (en) * | 2003-09-29 | 2005-04-14 | Axalto Sa | Method and apparatus for secure networking between a resource-constrained device and a remote network node |
| WO2006021865A1 (en) * | 2004-08-24 | 2006-03-02 | Axalto Sa | A personal token and a method for controlled authentication. |
-
2007
- 2007-12-21 ES ES200703406A patent/ES2333931B1/en active Active
-
2008
- 2008-12-22 WO PCT/ES2008/000791 patent/WO2009080854A1/en not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005034052A1 (en) * | 2003-09-29 | 2005-04-14 | Axalto Sa | Method and apparatus for secure networking between a resource-constrained device and a remote network node |
| WO2006021865A1 (en) * | 2004-08-24 | 2006-03-02 | Axalto Sa | A personal token and a method for controlled authentication. |
Non-Patent Citations (2)
| Title |
|---|
| HIN CHUNG, TSANG ET AL.: "Design and Analisis of Smart Card Based Remote Authentication Protocol for Internet-based System", ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001. WET ICE 2001. PROCEEDINGS. TENTH IEEE INTERNATIONAL WORKSHOPS ON 20-22 JUNE 2001, pages 229 - 230 * |
| TORRES, JOAQUIN ET AL.: "Advances in network smart cards authentication", COMPUTER NETWORKS: THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, vol. 51, no. 9, 9 June 2007 (2007-06-09), pages 2249 - 2261 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2017189629A1 (en) * | 2016-04-26 | 2017-11-02 | Ciphertext Solutions, Inc. | Issuance of virtual electronic cards using device and user-specific authentication information |
| US10546298B2 (en) | 2016-04-26 | 2020-01-28 | Ciphertext Solutions, Inc. | Issuance of virtual electronic cards using device and user-specific authentication information |
Also Published As
| Publication number | Publication date |
|---|---|
| ES2333931B1 (en) | 2010-11-26 |
| ES2333931A1 (en) | 2010-03-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110912684B (en) | Method, system and computer readable medium for encryption and decryption | |
| US9867042B2 (en) | Radio frequency identification technology incorporating cryptographics | |
| AU2011305477B2 (en) | Shared secret establishment and distribution | |
| US8769289B1 (en) | Authentication of a user accessing a protected resource using multi-channel protocol | |
| ES2816324T3 (en) | Method that uses a single authentication device to authenticate a user to a service provider among a plurality of service providers and device to perform said method | |
| ES2440826T3 (en) | System and procedure for delegation of privileges and control | |
| EP2369811B1 (en) | System and methods for online authentication | |
| ES2626064T3 (en) | Procedure and system to authenticate a user who uses a mobile device and through certificates | |
| ES2876000T3 (en) | Method and device for controlling a closing mechanism with a mobile terminal | |
| US8724819B2 (en) | Credential provisioning | |
| EP2098006A2 (en) | Authentication delegation based on re-verification of cryptographic evidence | |
| ES2773705T3 (en) | Method to provide secure digital signatures | |
| ES2659580T3 (en) | Procedure for checking the preservation of privacy between three parties that communicate with each other | |
| CN105871553A (en) | Identity-free three-factor remote user authentication method | |
| EP4224792B1 (en) | System for dispersing access rights for routing devices in network | |
| US20180041494A1 (en) | Method and system for issuing and using derived credentials | |
| CN110020524A (en) | A kind of mutual authentication method based on smart card | |
| CN116112242B (en) | Unified safety authentication method and system for power regulation and control system | |
| US11070537B2 (en) | Stateless method for securing and authenticating a telecommunication | |
| Prakash et al. | Authentication protocols and techniques: a survey | |
| ES2923919T3 (en) | Protection of a P2P communication | |
| EP3556046B1 (en) | Method for secure management of secrets in a hierarchical multi-tenant environment | |
| ES2333931B1 (en) | REMOTE AUTHENTICATION SYSTEM OF THE IDENTITY OF USERS THROUGH INTELLIGENT NETWORK CARDS. | |
| EP2905717A1 (en) | Device and method for device and user authentication | |
| WO2014177055A1 (en) | Establishment of communication connection between mobile device and secure element |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08865668 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 08865668 Country of ref document: EP Kind code of ref document: A1 |