CN110321682A - A kind of unified identity authentication method and device based on UAF and IBC - Google Patents

A kind of unified identity authentication method and device based on UAF and IBC Download PDF

Info

Publication number
CN110321682A
CN110321682A CN201910614005.6A CN201910614005A CN110321682A CN 110321682 A CN110321682 A CN 110321682A CN 201910614005 A CN201910614005 A CN 201910614005A CN 110321682 A CN110321682 A CN 110321682A
Authority
CN
China
Prior art keywords
user
resource
identity
uaf
ibc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910614005.6A
Other languages
Chinese (zh)
Other versions
CN110321682B (en
Inventor
王栋
甄平
玄佳兴
王洪凯
方舟
刘俊艳
王俊生
薛真
周磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guowang Xiongan Finance Technology Group Co ltd
State Grid Digital Technology Holdings Co ltd
State Grid Corp of China SGCC
State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Guowang Xiongan Finance Technology Group Co Ltd
State Grid Agel Ecommerce Ltd
State Grid Corp of China SGCC
State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guowang Xiongan Finance Technology Group Co Ltd, State Grid Agel Ecommerce Ltd, State Grid Corp of China SGCC, State Grid Zhejiang Electric Power Co Ltd filed Critical Guowang Xiongan Finance Technology Group Co Ltd
Priority to CN201910614005.6A priority Critical patent/CN110321682B/en
Publication of CN110321682A publication Critical patent/CN110321682A/en
Application granted granted Critical
Publication of CN110321682B publication Critical patent/CN110321682B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of unified identity authentication method and device based on UAF and IBC, method includes: to be authenticated by user identity of the UAF and IBC to registration, after completing user identity authentication, passes through OAuth agreement and executes resource access process.The present invention can realize the certification of " no password " by UAF, IBC can be crossed and realize that user can pass through unification authentication platform authenticating identity, user bound account and public key are distinguished without each service server, are realized unified authentication, are effectively improved the safety and efficiency of certification.

Description

A kind of unified identity authentication method and device based on UAF and IBC
Technical field
The present invention relates to identity identifying technology fields, more particularly to one kind to be based on UAF (Universal Authentication Framework, universal authentication framework) and IBC (Identity-Based Cryptography, is based on The cryptographic technique of mark) unified identity authentication method and device.
Background technique
State Grid Corporation of China carries forward vigorously the construction such as " Guo Shang state net " electric power emerging service at present, pays dues, does electricity, energy clothes The business such as business are various, and that there are identification authentication modes is single for existing static, closed identity management mechanisms, security risk investigation is difficult The problem of.In order to enhance power business authentication security intensity, certification cost is reduced, needs to study new unified identity authentication Mandated program realizes the target of various power businesses " card is logical to be done ".
Most of operation systems realize the online identity certification of user using " user name+password " mode at present, and user is first It first passes through online service or website is registered, the user name and password and user account are bound, subsequent logged Cheng Zhong, it is only necessary to user's on-line authentication is completed by way of the user name and password.But there are passwords easily to let out for this authentication mode The problems such as dew, complicated password easily forget, weak passwurd.
To solve the above-mentioned problems, FIDO (Fast Identity Online, online quick authentication) alliance sets up, It is intended to create standard set open protocol and realizes strong user authentication, the dependence eliminated with this or weaken user to password.At present FIDO provides two sets of agreements of UAF and U2F (Universal Second Factor, general factor Ⅱ agreement), and UAF can be real The strong user authentication of existing " no password ", U2F then increase the safety that factor Ⅱ promotes existing password authentication mechanism.UAF is being infused Volume when by user server end account together with UAF apparatus bound, then in verification process, user be not necessarily to input port It enables, it is only necessary to certification can be completed by living things feature recognition or simple PIN in UAF equipment and realize Account Logon.But UAF It needs user to register in server end, user account and public key is bound, there is no unified identity authentication is solved the problems, such as, especially When it is that user identity authentication is related to multiple business systems or the access of cross-domain more resources, it is respectively necessary for being registered and is authenticated, used And it is inconvenient.
IBC can be bound, therefore be highly suitable for identity and recognize using the identity information of user as public key without digital certificate Card.In IBC, Your Majesty's key and main private key are generated by KGC (Key Generation Center, key generation centre) first, so KGC recycles the key of oneself to be existed according to the identity information ID (such as title, e-mail, identification card number) of user for user is raw afterwards Private key, the ID of user are public key, can particularly simple realize user identity authentication.But there are key updating problems by IBC, i.e., If some private key for user is revealed, or needs user to replace ID, the card property certainly of identity can have a greatly reduced quality at this time, or more by KGC Change owner private key and Your Majesty's key, the private key of all users requires to update again at this time, causes very big trouble.
Therefore, how significantly more efficient carry out unified identity authentication, be a urgent problem to be solved.
Summary of the invention
In view of this, UAF reality can be passed through the present invention provides a kind of unified identity authentication method based on UAF and IBC The certification of existing " no password " can cross IBC and realize that user can be by unification authentication platform authenticating identity, without each service server point Other user bound account and public key, realize unified authentication, effectively improve the safety and efficiency of certification.
The present invention provides a kind of unified identity authentication methods based on UAF and IBC, comprising:
It is authenticated by user identity of the UAF and IBC to registration;
After completing user identity authentication, resource access process is executed by OAuth agreement.
It is preferably, described before being authenticated by user identity of the UAF and IBC to registration, further includes:
Register user identity.
Preferably, the registration user identity, comprising:
User terminal generates User ID, and the User ID is sent to unification authentication platform;
The unification authentication platform authenticates the User ID, and private is generated for user according to Your Majesty's key and main private key Key, and the private key is back to the user terminal and is stored.
It is preferably, described to be authenticated by user identity of the UAF and IBC to registration, comprising:
Application in the user terminal generates resource access request, and the resource access request is sent to resource clothes Business device;
The Resource Server is required by challenge response mode to user's after receiving the resource access request Identity is authenticated;
The user terminal is signed by the private key, and signing messages is sent to the Resource Server;
The signing messages that the Resource Server is received using the main public key verifications of the unification authentication platform, verifying By rear, completion user identity authentication.
Preferably, described after completing user identity authentication, resource access process is executed by OAuth agreement, comprising:
The Resource Server sends access mandate request to authorization server;
The authorization server is user by inquiring the access authority of User ID after receiving access mandate request Issue resource access token;
Corresponding resource is sent in the user terminal by the Resource Server after receiving resource access token Application.
A kind of unified identity authentication device based on UAF and IBC, comprising:
User identity authentication module, for being authenticated by user identity of the UAF and IBC to registration;
Resource access authorization module, for executing resource by OAuth agreement and accessing after completing user identity authentication Journey.
Preferably, described device further include:
Customer identity registration module, for registering user identity.
Preferably, the customer identity registration module includes: user terminal and unification authentication platform;Wherein:
The user terminal generates User ID, and the User ID is sent to the unification authentication platform;
The unification authentication platform authenticates the User ID, and private is generated for user according to Your Majesty's key and main private key Key, and the private key is back to the user terminal and is stored.
Preferably, the user identity authentication module includes: Resource Server, in which:
Application in the user terminal generates resource access request, and the resource access request is sent to the money Source server;
The Resource Server is required by challenge response mode to user's after receiving the resource access request Identity is authenticated;
The user terminal is signed by the private key, and signing messages is sent to the Resource Server;
The signing messages that the Resource Server is received using the main public key verifications of the unification authentication platform, verifying By rear, completion user identity authentication.
Preferably, the resource access authorization module includes: authorization server, in which:
The Resource Server sends access mandate request to the authorization server;
The authorization server is user by inquiring the access authority of User ID after receiving access mandate request Issue resource access token;
Corresponding resource is sent in the user terminal by the Resource Server after receiving resource access token Application.
In conclusion the invention discloses a kind of unified identity authentication method based on UAF and IBC, when uniting It when one authentication, is authenticated first by user identity of the UAF and IBC to registration, then completes user identity authentication Afterwards, resource access process is executed by OAuth agreement.The present invention can realize the certification of " no password " by UAF, can cross IBC Realize that user can be real without each service server difference user bound account and public key by unification authentication platform authenticating identity Now unified authentication effectively improves the safety and efficiency of certification.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of method flow of the unified identity authentication method embodiment 1 based on UAF and IBC disclosed by the invention Figure;
Fig. 2 is a kind of method flow of the unified identity authentication method embodiment 2 based on UAF and IBC disclosed by the invention Figure;
Fig. 3 is a kind of method flow of the unified identity authentication method embodiment 3 based on UAF and IBC disclosed by the invention Figure;
Fig. 4 is a kind of structural representation of the unified identity authentication Installation practice 1 based on UAF and IBC disclosed by the invention Figure;
Fig. 5 is a kind of structural representation of the unified identity authentication Installation practice 2 based on UAF and IBC disclosed by the invention Figure;
Fig. 6 is a kind of structural representation of the unified identity authentication Installation practice 3 based on UAF and IBC disclosed by the invention Figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, being a kind of side of the unified identity authentication method embodiment 1 based on UAF and IBC disclosed by the invention Method flow chart, the method may include following steps:
S101, it is authenticated by user identity of the UAF and IBC to registration;
When needing to carry out unified identity authentication, authenticated first by user identity of the UAF and IBC to registration;Its In:
UAF is a set of open authentication agreement formulated by FIDO alliance, realizes the strong identity authentication of user " no password ". UAF registration when by user server end account together with UAF apparatus bound, then in verification process, Yong Huwu Password need to be inputted, it is only necessary to certification can be completed by living things feature recognition or simple PIN code in UAF equipment and realize account It logs in.
IBC is based on the basis of traditional PKI (Public Key Infrastructure, Public Key Infrastructure) It develops, it is main to simplify in specific security application exchangeing problem in a large amount of digital certificates, make security application more easily portion Administration and use.IBC cryptographic technique uses asymmetric cryptography system, and encryption uses two sets of different keys from decryption, each The public key of people is exactly his identity, such as the address email, telephone number etc..And private key is then in the form of data by user Oneself is grasped, and key management is comparatively simple, very easily can carry out encryption and decryption to data information.The basic technology of IBC includes Data encryption, digital signature, data integrity mechanism, digital envelope, user's identification, user authentication etc..
During authenticating by user identity of the UAF and IBC to registration, protect IBC private by UAF mechanism Key prevents its leakage, then realizes unified identity authentication by IBC.
S102, after completing user identity authentication, pass through OAuth agreement execute resource access process.
OAuth agreement is open authorization criteria, and third party is allowed to obtain by the interim token that service provider provides User resources are not necessarily to username and password, have the characteristics that simple, open, safety.
In conclusion in the above-described embodiments, when needing to carry out unified identity authentication, first by UAF and IBC to note The user identity of volume is authenticated, and then after completing user identity authentication, executes resource access process by OAuth agreement. The present invention can realize the certification of " no password " by UAF, can cross IBC and realize that user can authenticate body by unification authentication platform Part, without each service server difference user bound account and public key, realizes unified authentication, effectively improve certification Safety and efficiency.
As shown in Fig. 2, being a kind of side of the unified identity authentication method embodiment 2 based on UAF and IBC disclosed by the invention Method flow chart, the method may include following steps:
S201, registration user identity;
When needing to carry out unified identity authentication, it is necessary first to be registered to the initial id information of user, that is, to user Identity registered.Wherein, the ID of user can be name, mailbox, the identification card number etc. of user.
S202, it is authenticated by user identity of the UAF and IBC to registration;
S203, after completing user identity authentication, pass through OAuth agreement execute resource access process.
In conclusion in the above-described embodiments, when needing to carry out unified identity authentication, registering user identity first, so It is authenticated afterwards by user identity of the UAF and IBC to registration, then after completing user identity authentication, passes through OAuth agreement Execute resource access process.The present invention can realize the certification of " no password " by UAF, can cross IBC and realize that user can pass through system One authentication platform authenticating identity realizes unified authentication without each service server difference user bound account and public key, Effectively improve the safety and efficiency of certification.
As shown in figure 3, being a kind of side of the unified identity authentication method embodiment 3 based on UAF and IBC disclosed by the invention Method flow chart, the method may include following steps:
S301, user terminal generate User ID, and User ID are sent to unification authentication platform;
When needing to carry out unified identity authentication, user is firstly the need of the initial id information registration of progress, wherein initial ID can Think the name, mailbox, identification card number etc. of user, and User ID is transmitted to unification authentication platform.
S302, unification authentication platform authenticate User ID, and private key is generated for user according to Your Majesty's key and main private key, and Private key is back to the user terminal to store;
Unification authentication platform act mainly as key generation centre in IBC cipher system (Key Generation Center, KGC private key is generated for user according to Your Majesty's key and main private key after authenticating to User ID in role), and by generation Private key is back to user terminal, is stored in UAF equipment by user security, completes registration process.
Application in S303, user terminal generates resource access request, and resource access request is sent to resource service Device;
When the third-party application (APP of such as user mobile phone) in user terminal needs to access application server by user When resource, the application in user terminal generates resource access request, sends resource access request to Resource Server.
S304, Resource Server require the body to user after receiving resource access request, through challenge response mode Part is authenticated;
After Resource Server receives resource access request, require to recognize the identity of user by challenge response mode Card, i.e., selection one is with several N, it is desirable that user signs to N with private key.
S305, user terminal are signed by private key, and signing messages is sent to Resource Server;
After user receives challenge number N, UAF equipment is locked by the biological particular solution such as fingerprint, then N is carried out using private key Signature, is then sent to Resource Server for signing messages.
The signing messages that S306, Resource Server are received using the main public key verifications of unification authentication platform, after being verified, Complete user identity authentication;
The user's signature information that Resource Server is then received using the main public key verifications of unification authentication platform, is verified Afterwards, User ID authentication can be completed.
S307, Resource Server send access mandate request to authorization server;
After completing User ID authentication, Resource Server sends access mandate request to authorization server.
S308, authorization server are user by inquiring the access authority of User ID after receiving access mandate request Issue resource access token;
Authorization server issues resource access token by the access authority of inquiry User ID for user.
During S309, Resource Server are sent to the user terminal after receiving resource access token, by corresponding resource Using.
After the resource access permission for receiving User ID, corresponding resource is sent to third party and answered by Resource Server With completing entire authentication and licensing process.
In conclusion the present invention is based on UAF and IBC to propose a kind of unified authentication mandated program, realized by UAF The certification of " no password " realizes that user can be distinguished by unification authentication platform authenticating identity without each service server by IBC User bound account and public key realize unified authentication, improve the safety and efficiency of certification.In addition, private key is deposited Storage is only realized signature function in inside, will not be used outside hardware, to effectively improve IBC key in UAF hardware device Safety, it is therefore prevented that private key leakage.
As shown in figure 4, being a kind of knot of the unified identity authentication Installation practice 1 based on UAF and IBC disclosed by the invention Structure schematic diagram, the apparatus may include:
User identity authentication module 401, for being authenticated by user identity of the UAF and IBC to registration;
When needing to carry out unified identity authentication, authenticated first by user identity of the UAF and IBC to registration;Its In:
UAF is a set of open authentication agreement formulated by FIDO alliance, realizes the strong identity authentication of user " no password ". UAF registration when by user server end account together with UAF apparatus bound, then in verification process, Yong Huwu Password need to be inputted, it is only necessary to certification can be completed by living things feature recognition or simple PIN code in UAF equipment and realize account It logs in.
IBC is based on the basis of traditional PKI (Public Key Infrastructure, Public Key Infrastructure) It develops, it is main to simplify in specific security application exchangeing problem in a large amount of digital certificates, make security application more easily portion Administration and use.IBC cryptographic technique uses asymmetric cryptography system, and encryption uses two sets of different keys from decryption, each The public key of people is exactly his identity, such as the address email, telephone number etc..And private key is then in the form of data by user Oneself is grasped, and key management is comparatively simple, very easily can carry out encryption and decryption to data information.The basic technology of IBC includes Data encryption, digital signature, data integrity mechanism, digital envelope, user's identification, user authentication etc..
During authenticating by user identity of the UAF and IBC to registration, protect IBC private by UAF mechanism Key prevents its leakage, then realizes unified identity authentication by IBC.
Resource access authorization module 402, for executing resource by OAuth agreement and visiting after completing user identity authentication Ask process.
OAuth agreement is open authorization criteria, and third party is allowed to obtain by the interim token that service provider provides User resources are not necessarily to username and password, have the characteristics that simple, open, safety.
In conclusion in the above-described embodiments, when needing to carry out unified identity authentication, first by UAF and IBC to note The user identity of volume is authenticated, and then after completing user identity authentication, executes resource access process by OAuth agreement. The present invention can realize the certification of " no password " by UAF, can cross IBC and realize that user can authenticate body by unification authentication platform Part, without each service server difference user bound account and public key, realizes unified authentication, effectively improve certification Safety and efficiency.
As shown in figure 5, being a kind of knot of the unified identity authentication Installation practice 2 based on UAF and IBC disclosed by the invention Structure schematic diagram, the apparatus may include:
Customer identity registration module 501, for registering user identity;
When needing to carry out unified identity authentication, it is necessary first to be registered to the initial id information of user, that is, to user Identity registered.Wherein, the ID of user can be name, mailbox, the identification card number etc. of user.
User identity authentication module 502, for being authenticated by user identity of the UAF and IBC to registration;
Resource access authorization module 503, for executing resource by OAuth agreement and visiting after completing user identity authentication Ask process.
In conclusion in the above-described embodiments, when needing to carry out unified identity authentication, registering user identity first, so It is authenticated afterwards by user identity of the UAF and IBC to registration, then after completing user identity authentication, passes through OAuth agreement Execute resource access process.The present invention can realize the certification of " no password " by UAF, can cross IBC and realize that user can pass through system One authentication platform authenticating identity realizes unified authentication without each service server difference user bound account and public key, Effectively improve the safety and efficiency of certification.
As shown in fig. 6, being a kind of knot of the unified identity authentication Installation practice 3 based on UAF and IBC disclosed by the invention Structure schematic diagram, the apparatus may include: user terminal 601, unification authentication platform 602, Resource Server 603 and authorization service Device 604;Wherein:
User terminal 601 generates User ID, and User ID is sent to unification authentication platform 602;
When needing to carry out unified identity authentication, user is firstly the need of the initial id information registration of progress, wherein initial ID can Think the name, mailbox, identification card number etc. of user, and User ID is transmitted to unification authentication platform.
Unification authentication platform 602 authenticates User ID, private key is generated for user according to Your Majesty's key and main private key, and will Private key is back to user terminal 601 and is stored;
Unification authentication platform act mainly as key generation centre in IBC cipher system (Key Generation Center, KGC private key is generated for user according to Your Majesty's key and main private key after authenticating to User ID in role), and by generation Private key is back to user terminal, is stored in UAF equipment by user security, completes registration process.
Application in user terminal 601 generates resource access request, and resource access request is sent to Resource Server 603;
When the third-party application (APP of such as user mobile phone) in user terminal needs to access application server by user When resource, the application in user terminal generates resource access request, sends resource access request to Resource Server.
Resource Server 603 requires the identity to user after receiving resource access request, through challenge response mode It is authenticated;
After Resource Server receives resource access request, require to recognize the identity of user by challenge response mode Card, i.e., selection one is with several N, it is desirable that user signs to N with private key.
User terminal 601 is signed by private key, and signing messages is sent to Resource Server 603;
After user receives challenge number N, UAF equipment is locked by the biological particular solution such as fingerprint, then N is carried out using private key Signature, is then sent to Resource Server for signing messages.
The signing messages that Resource Server 603 is received using the main public key verifications of unification authentication platform 602, is verified Afterwards, user identity authentication is completed;
The user's signature information that Resource Server is then received using the main public key verifications of unification authentication platform, is verified Afterwards, User ID authentication can be completed.
Resource Server 603 sends access mandate request to authorization server 604;
After completing User ID authentication, Resource Server sends access mandate request to authorization server.
Authorization server 604, by inquiring the access authority of User ID, is issued after receiving access mandate request for user Send out resource access token;
Authorization server issues resource access token by the access authority of inquiry User ID for user.
Corresponding resource is sent to the user terminal in 601 by Resource Server 603 after receiving resource access token Using.
After the resource access permission for receiving User ID, corresponding resource is sent to third party and answered by Resource Server With completing entire authentication and licensing process.
In conclusion the present invention is based on UAF and IBC to propose a kind of unified authentication mandated program, realized by UAF The certification of " no password " realizes that user can be distinguished by unification authentication platform authenticating identity without each service server by IBC User bound account and public key realize unified authentication, improve the safety and efficiency of certification.In addition, private key is deposited Storage is only realized signature function in inside, will not be used outside hardware, to effectively improve IBC key in UAF hardware device Safety, it is therefore prevented that private key leakage.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part It is bright.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. a kind of unified identity authentication method based on UAF and IBC characterized by comprising
It is authenticated by user identity of the UAF and IBC to registration;
After completing user identity authentication, resource access process is executed by OAuth agreement.
2. the method according to claim 1, wherein it is described by UAF and IBC to the user identity of registration into Before row certification, further includes:
Register user identity.
3. according to the method described in claim 2, it is characterized in that, the registration user identity, comprising:
User terminal generates User ID, and the User ID is sent to unification authentication platform;
The unification authentication platform authenticates the User ID, and private key is generated for user according to Your Majesty's key and main private key, and The private key is back to the user terminal to store.
4. according to the method described in claim 3, it is characterized in that, described carried out by user identity of the UAF and IBC to registration Certification, comprising:
Application in the user terminal generates resource access request, and the resource access request is sent to resource service Device;
The Resource Server requires the identity to user after receiving the resource access request, through challenge response mode It is authenticated;
The user terminal is signed by the private key, and signing messages is sent to the Resource Server;
The signing messages that the Resource Server is received using the main public key verifications of the unification authentication platform, is verified Afterwards, user identity authentication is completed.
5. according to the method described in claim 4, being assisted by OAuth it is characterized in that, described after completing user identity authentication View executes resource access process, comprising:
The Resource Server sends access mandate request to authorization server;
The authorization server, by inquiring the access authority of User ID, is issued after receiving access mandate request for user Resource access token;
The Resource Server is sent to answering in the user terminal after receiving resource access token, by corresponding resource With.
6. a kind of unified identity authentication device based on UAF and IBC characterized by comprising
User identity authentication module, for being authenticated by user identity of the UAF and IBC to registration;
Resource access authorization module, for executing resource access process by OAuth agreement after completing user identity authentication.
7. device according to claim 6, which is characterized in that further include:
Customer identity registration module, for registering user identity.
8. device according to claim 7, which is characterized in that the customer identity registration module include: user terminal and Unification authentication platform;Wherein:
The user terminal generates User ID, and the User ID is sent to the unification authentication platform;
The unification authentication platform authenticates the User ID, and private key is generated for user according to Your Majesty's key and main private key, and The private key is back to the user terminal to store.
9. device according to claim 8, which is characterized in that the user identity authentication module includes: Resource Server, Wherein:
Application in the user terminal generates resource access request, and the resource access request is sent to the resource and is taken Business device;
The Resource Server requires the identity to user after receiving the resource access request, through challenge response mode It is authenticated;
The user terminal is signed by the private key, and signing messages is sent to the Resource Server;
The signing messages that the Resource Server is received using the main public key verifications of the unification authentication platform, is verified Afterwards, user identity authentication is completed.
10. device according to claim 9, which is characterized in that the resource access authorization module includes: authorization service Device, in which:
The Resource Server sends access mandate request to the authorization server;
The authorization server, by inquiring the access authority of User ID, is issued after receiving access mandate request for user Resource access token;
The Resource Server is sent to answering in the user terminal after receiving resource access token, by corresponding resource With.
CN201910614005.6A 2019-07-08 2019-07-08 Unified identity authentication method and device based on UAF (Universal authentication framework) and IBC (identity based communication) Active CN110321682B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910614005.6A CN110321682B (en) 2019-07-08 2019-07-08 Unified identity authentication method and device based on UAF (Universal authentication framework) and IBC (identity based communication)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910614005.6A CN110321682B (en) 2019-07-08 2019-07-08 Unified identity authentication method and device based on UAF (Universal authentication framework) and IBC (identity based communication)

Publications (2)

Publication Number Publication Date
CN110321682A true CN110321682A (en) 2019-10-11
CN110321682B CN110321682B (en) 2021-10-22

Family

ID=68121472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910614005.6A Active CN110321682B (en) 2019-07-08 2019-07-08 Unified identity authentication method and device based on UAF (Universal authentication framework) and IBC (identity based communication)

Country Status (1)

Country Link
CN (1) CN110321682B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110784395A (en) * 2019-11-04 2020-02-11 航天信息股份有限公司 Mail safety login method and system based on FIDO authentication
CN111245870A (en) * 2020-04-26 2020-06-05 国网电子商务有限公司 Identity authentication method based on mobile terminal and related device
CN113099448A (en) * 2019-12-20 2021-07-09 北京紫光青藤微***有限公司 Terminal identity authentication method suitable for high-capacity SIM card

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827571A (en) * 2015-01-06 2016-08-03 华为技术有限公司 UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment
CN107454077A (en) * 2017-08-01 2017-12-08 北京迪曼森科技有限公司 A kind of single-point logging method based on IKI ID authentications
US20180254909A1 (en) * 2017-03-06 2018-09-06 Lamark Solutions, Inc. Virtual Identity Credential Issuance and Verification Using Physical and Virtual Means
CN108900309A (en) * 2018-05-17 2018-11-27 北京岸思信息科技有限公司 A kind of method for authenticating and right discriminating system
CN109347857A (en) * 2018-11-14 2019-02-15 天津市国瑞数码安全***股份有限公司 A kind of general inter-network authentication method based on mark
CN109815666A (en) * 2018-12-26 2019-05-28 航天信息股份有限公司 Identity identifying method, device, storage medium and electronic equipment based on FIDO agreement

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827571A (en) * 2015-01-06 2016-08-03 华为技术有限公司 UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment
US20180254909A1 (en) * 2017-03-06 2018-09-06 Lamark Solutions, Inc. Virtual Identity Credential Issuance and Verification Using Physical and Virtual Means
CN107454077A (en) * 2017-08-01 2017-12-08 北京迪曼森科技有限公司 A kind of single-point logging method based on IKI ID authentications
CN108900309A (en) * 2018-05-17 2018-11-27 北京岸思信息科技有限公司 A kind of method for authenticating and right discriminating system
CN109347857A (en) * 2018-11-14 2019-02-15 天津市国瑞数码安全***股份有限公司 A kind of general inter-network authentication method based on mark
CN109815666A (en) * 2018-12-26 2019-05-28 航天信息股份有限公司 Identity identifying method, device, storage medium and electronic equipment based on FIDO agreement

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李梁磊 等: "一种基于FIDO UAF架构的开放授权方法", 《信息网络安全》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110784395A (en) * 2019-11-04 2020-02-11 航天信息股份有限公司 Mail safety login method and system based on FIDO authentication
CN110784395B (en) * 2019-11-04 2023-02-21 航天信息股份有限公司 Mail safety login method and system based on FIDO authentication
CN113099448A (en) * 2019-12-20 2021-07-09 北京紫光青藤微***有限公司 Terminal identity authentication method suitable for high-capacity SIM card
CN113099448B (en) * 2019-12-20 2022-07-19 紫光同芯微电子有限公司 Terminal identity authentication method suitable for high-capacity SIM card
CN111245870A (en) * 2020-04-26 2020-06-05 国网电子商务有限公司 Identity authentication method based on mobile terminal and related device
CN111245870B (en) * 2020-04-26 2020-08-14 国网电子商务有限公司 Identity authentication method based on mobile terminal and related device

Also Published As

Publication number Publication date
CN110321682B (en) 2021-10-22

Similar Documents

Publication Publication Date Title
CN105429760B (en) A kind of auth method and system of the digital certificate based on TEE
CN107070667B (en) Identity authentication method
US10382427B2 (en) Single sign on with multiple authentication factors
US9264232B2 (en) Cryptographic device that binds an additional authentication factor to multiple identities
US8843415B2 (en) Secure software service systems and methods
WO2017197974A1 (en) Biometric characteristic-based security authentication method, device and electronic equipment
CN111245870B (en) Identity authentication method based on mobile terminal and related device
CN106452772B (en) Terminal authentication method and device
CN109756485A (en) Electronic contract signs method, apparatus, computer equipment and storage medium
US20070130463A1 (en) Single one-time password token with single PIN for access to multiple providers
CN105608577A (en) Method for performing non-repudiation, and payment managing server and user device therefor
JP2018532301A (en) User authentication method and apparatus
CN108684041A (en) The system and method for login authentication
CN106209383B (en) A kind of method and device of mobile payment security certification
US8302175B2 (en) Method and system for electronic reauthentication of a communication party
CN105553654B (en) Key information processing method and device, key information management system
CN109639427A (en) A kind of method and apparatus that data are sent
CN110493237A (en) Identity management method, device, computer equipment and storage medium
JP2015537399A (en) Application system for mobile payment and method for providing and using mobile payment means
CN108769020A (en) A kind of the identity attribute proof system and method for secret protection
CN110321682A (en) A kind of unified identity authentication method and device based on UAF and IBC
CN104660412A (en) Password-less security authentication method and system for mobile equipment
CN109981287A (en) A kind of code signature method and its storage medium
CN109150547A (en) A kind of system and method for the digital asset real name registration based on block chain
CN110189184A (en) A kind of electronic invoice storage method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 100032 room 8018, 8 / F, building 7, Guangyi street, Xicheng District, Beijing

Patentee after: State Grid Digital Technology Holdings Co.,Ltd.

Patentee after: Guowang Xiongan Finance Technology Group Co.,Ltd.

Patentee after: STATE GRID ZHEJIANG ELECTRIC POWER Co.,Ltd.

Patentee after: STATE GRID CORPORATION OF CHINA

Address before: 311 guanganmennei street, Xicheng District, Beijing 100053

Patentee before: STATE GRID ELECTRONIC COMMERCE Co.,Ltd.

Patentee before: Guowang Xiongan Finance Technology Group Co.,Ltd.

Patentee before: STATE GRID ZHEJIANG ELECTRIC POWER Co.,Ltd.

Patentee before: STATE GRID CORPORATION OF CHINA

CP03 Change of name, title or address