TW201533605A - Integrated smart card UNIX authentication management system and method - Google Patents
Integrated smart card UNIX authentication management system and method Download PDFInfo
- Publication number
- TW201533605A TW201533605A TW103106393A TW103106393A TW201533605A TW 201533605 A TW201533605 A TW 201533605A TW 103106393 A TW103106393 A TW 103106393A TW 103106393 A TW103106393 A TW 103106393A TW 201533605 A TW201533605 A TW 201533605A
- Authority
- TW
- Taiwan
- Prior art keywords
- authentication
- user
- smart card
- password
- unix
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 74
- 238000012795 verification Methods 0.000 claims abstract description 10
- 238000012545 processing Methods 0.000 claims abstract description 5
- 238000007726 management method Methods 0.000 claims description 125
- 238000013475 authorization Methods 0.000 claims description 29
- 238000013519 translation Methods 0.000 claims description 11
- 238000004891 communication Methods 0.000 claims description 9
- 238000010187 selection method Methods 0.000 claims description 5
- 238000012546 transfer Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 claims description 2
- 238000012360 testing method Methods 0.000 claims 1
- 238000013461 design Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000007796 conventional method Methods 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 238000010923 batch production Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
Description
本發明係為一種UNIX認證管理系統與方法有關;具體而言,特別是關於一種以整合式智慧卡登入UNIX系統,並進行認證及管理之系統與方法,係動態產生一認證碼,以使用者之智慧卡之加密憑證加密後傳輸到使用者端,再以智慧卡解密並回傳至系統以驗證使用者之身分。再上傳並動態佈署用戶端以非對稱式密鑰演算法(Rivest Shamir Adleman,RSA)產生之公鑰至UNIX端,再以開源式安全殼套件(Open Secure Shell,OPENSSH)的公鑰認證方法(Public key Authentication)進行認證以登入UNIX系統。係以間接的方式達成利用實體智慧卡進行認證的方法。 The present invention relates to a UNIX authentication management system and method; in particular, a system and method for logging in to a UNIX system with an integrated smart card and performing authentication and management, dynamically generating an authentication code for the user The encrypted certificate of the smart card is encrypted and transmitted to the user end, and then decrypted by the smart card and transmitted back to the system to verify the identity of the user. Then upload and dynamically deploy the public key generated by the user's asymmetric key algorithm (Rivest Shamir Adleman, RSA) to the UNIX side, and then use the public key authentication method of Open Secure Shell (OPENSSH). (Public key Authentication) authenticates to log in to the UNIX system. Indirect ways to achieve authentication using physical smart cards.
於專利前案具有供用戶確認交易資料之一次性密碼認證方法(申請日期:2011/10/14,申請案號:100137295),係供用戶端將交易資料傳送至銀行端,令銀行端再將部分交易資料傳送至認證服務端以依據該部分交易資料產生用戶複核碼、銀行認證碼及交易認證碼,其中,用戶端會收到用戶複核 碼、銀行認證碼及部分交易資料,俾供用戶端在確認部分交易資料後,透過交易提供端將相關資料送回認證服務端進行認證,並在認證無誤後通知銀行端進行交易,最後,銀行端將交易結果傳送到用戶端以供用戶端再確認,以透過對交易資料之多次檢核,確保用戶交易之安全性。此外,透過交易資料所產生的一次性密碼可提供交易後不可否認性的依據。 In the pre-patent case, there is a one-time password authentication method for the user to confirm the transaction data (application date: 2011/10/14, application number: 100137295), which is for the client to transmit the transaction data to the bank, so that the bank will Part of the transaction data is transmitted to the authentication server to generate a user review code, a bank authentication code and a transaction authentication code according to the part of the transaction data, wherein the user terminal receives the user review. The code, the bank authentication code and part of the transaction data, after the client confirms part of the transaction data, send the relevant data back to the certification server for authentication through the transaction provider, and notify the bank to conduct the transaction after the authentication is correct, and finally, the bank The terminal transmits the transaction result to the client for re-confirmation by the client to ensure the security of the user transaction through multiple checks on the transaction data. In addition, a one-time password generated through transaction data provides a basis for non-repudiation after the transaction.
於專利前案視窗作業系統之多因子認證系統與登 入方法(申請日期:2006/10/27,申請案號:095139806),用於視窗Vista TM作業系統中客製化的系統登入與認證方法,在不影響使用者使用習慣下,於視窗Vista TM作業系統登入畫面上產生一多因子的認證視窗,使產生更安全與方便的登入方式,其中系統功能包括利用視窗登入程式(Winlogon.exe)建立視窗登入程序之視窗登入手段、由視窗登入程序呼叫登入使用者介面程式(LogonUI.exe)之登入使用者介面手段、利用憑證提供者(credential provider)管理使用者的認證手段、產生包括多因子認證視窗的視窗登入畫面之登入畫面顯示手段、產生多因子認證程序之多因子認證手段、對多因子認證程序產生的使用者識別資料與資料庫中的使用者資料進行比對的使用者身份比對手段、回填使用者識別碼/密碼的使用者識別碼/密碼回填手段,以及一訊息傳遞手段。此專利前案針對微軟Windows作業系統提出一種新的認證模型,使登入的畫面(LogonUI)與管理視窗登入程序的Winlogon程序直接溝通,視窗Vista TM作業系統係提供一種聯繫視窗登入畫面的憑證提供者(credential provider)模組,藉擷取使用者憑證(credential),並傳至Winlogon登入程序,進行系統登入。 Multi-factor authentication system and access to the pre-patent window operating system Entry method (application date: 2006/10/27, application number: 095139806), used for customized system login and authentication methods in Windows VistaTM operating system, without affecting user usage habits, in Windows Vista TM A multi-factor authentication window is generated on the operating system login screen, which results in a safer and more convenient login method. The system functions include using the Windows login program (Winlogon.exe) to create a Windows login program window login method, and the Windows login program calls. Log in to the user interface (LogonUI.exe) login user interface, use the credential provider to manage the user's authentication means, generate a login screen display means including a multi-factor authentication window, and generate more The multi-factor authentication method of the factor authentication program, the user identity comparison method for comparing the user identification data generated by the multi-factor authentication program with the user data in the database, and the user identification of the backfill user identifier/password Code/password backfilling means, as well as a means of message delivery. This patent proposal proposes a new authentication model for Microsoft Windows operating system, which enables the login screen (LogonUI) to communicate directly with the Winlogon program of the management window login program. The Windows VistaTM operating system provides a credential provider that contacts the window login screen. (credential provider) module, by taking the user credentials (credential), and passed to the Winlogon login program for system login.
傳統UNIX認證是透過帳號密碼驗證的方式來進行, 在資訊安全日益受到重視,各企業組織開始紛紛要求提高密碼長度與複雜度。但傳統的密碼都是交由使用者自行管理,密碼越長越複雜,對使用者而言就越難記憶,因此部分使用者會使用取巧之方式來設定符合複雜度規則但實質密碼強度低之密碼,如常見之「1qaz2wsx」,或者以紙筆記錄密碼等等。這些行為都讓高強度密碼的原則失去效果。因此,在資訊安全與使用者抗爭的衝突中,建構一個安全性足夠,又方便使用者操作的認證系統是比較可行的方案。 Traditional UNIX authentication is performed by means of account password verification. As information security is increasingly valued, organizations are beginning to demand increased password length and complexity. However, the traditional passwords are managed by the user. The longer the password is, the more complicated it is, and the harder it is for the user to remember. Therefore, some users will use the trick to set the complexity rule but the real password strength is low. Password, such as the common "1qaz2wsx", or record the password with a pen and paper. These behaviors make the principle of high-intensity passwords useless. Therefore, in the conflict between information security and user resistance, it is more feasible to construct an authentication system with sufficient security and user-friendly operation.
g10 code公司於2004年推出智慧卡片認證系統, 係以安全殼協定(Secure Shell,SSH)client直接與智慧卡內的RSA(Rivest Shamir Adleman)金鑰溝通,直接透過智慧卡片進行SSH公鑰認證(Public key Authentication),但其必須使用符合ISO 7816-4,-8之特製OpenPGP卡片才能應用此認證模式。 G10 code launched the smart card authentication system in 2004. The Secure Shell (SSH) client communicates directly with the RSA (Rivest Shamir Adleman) key in the smart card, and the SSH public key authentication is performed directly through the smart card, but it must be used in accordance with ISO 7816. -4,-8 special OpenPGP cards can apply this authentication mode.
由此可見,上述習用方式仍有所不足,,而亟待加以改良。 It can be seen that the above-mentioned conventional methods are still insufficient, and it needs to be improved.
本案發明人鑑於上述習用方式所欠缺的各項要素,乃亟思加以改良創新,並經多年苦心孤詣潛心研究後,終於成功研發完成本件發明。 In view of the various elements that are lacking in the above-mentioned conventional methods, the inventors of the present invention have improved and innovated, and after years of painstaking research, they finally succeeded in researching and developing this invention.
本發明係針對UNIX系統普遍使用的開源式安全客套件(Open Secure Shell,OPENSSH)設計了一種利用智慧卡為主之認證管理系統,係動態產生一認證碼,以使用者之智慧卡之加密憑證加密後傳輸到使用者端,再以智慧卡解密並回傳至系統以驗證使用者之身分。再上傳並動態佈署用戶端以非對稱 式密鑰演算法(Rivest Shamir Adleman,RSA)產生之公鑰至UNIX端,再以OPENSSH的公鑰認證方法(Public key Authentication)進行認證以登入UNIX系統。係以間接的方式達成利用實體智慧卡進行認證的方法。此方法可相容於包含自然人憑證等台灣常見之智慧卡片,不需使用特殊規格之智慧卡片。 The invention designs an authentication management system based on smart card for the open source security suite (OPENSSH) commonly used in UNIX systems, and dynamically generates an authentication code to encrypt the credentials of the user's smart card. After being encrypted, it is transmitted to the user end, and then decrypted by the smart card and transmitted back to the system to verify the identity of the user. Upload and dynamically deploy the client to be asymmetric The public key generated by the Rivest Shamir Adleman (RSA) is sent to the UNIX side, and then authenticated by the OPENSSH public key authentication method to log in to the UNIX system. Indirect ways to achieve authentication using physical smart cards. This method is compatible with smart cards commonly used in Taiwan, including natural person certificates, and does not require the use of smart cards of special specifications.
本系統將使用者來源位址分為高風險區與低風險 區,例如:以來源位址是否為信任區判別風險等級,根據風險給與差異化之認證層級。於高風險區本專利之認證模式將以提升系統安全性為目標,因此除了傳統認證模式外尚需搭配智慧卡認證模式。於低風險區時本系統將以提升操作便利為目標,是採用智慧卡認證為主。 The system divides the user source address into high risk area and low risk Zone, for example, whether the source address is the trust zone to discriminate the risk level, and the differentiated authentication level is given according to the risk. In the high-risk area, the patent's certification model will aim to improve system security. Therefore, in addition to the traditional authentication mode, it is necessary to match the smart card authentication mode. In the low-risk area, the system will aim at improving the convenience of operation, and it is mainly based on smart card authentication.
智慧卡認證乃是使用實體智慧卡片物件進行認證,但使用實體物件進行驗證就有遺失或忘了攜帶的可能,本發明在特殊情況下無法取得智慧卡時設計了幾種配套措施,共有下列四種認證模式: Smart card authentication is the use of physical smart card objects for authentication, but the use of physical objects for verification may be lost or forgotten to carry. The invention has several supporting measures when it is unable to obtain a smart card under special circumstances. Authentication mode:
1.智慧卡認證,以智慧卡之實體卡片進行認證程序,可加強資訊安全層級。 1. Smart card authentication, with the physical card of the smart card for the authentication process, can strengthen the information security level.
2.同僚佐證認證,未攜帶智慧卡時,可透過兩個同部門同僚之智慧卡片進行認證。 2. Co-certification certification, when not carrying a smart card, it can be authenticated through two smart cards of the same department.
3.主管授權認證,未攜帶智慧卡時,且工作環境無法進行同僚佐證時,可透過主管授權方式進行認證。 3. When the competent authority is certified, if the smart card is not carried, and the working environment cannot be accompanied by the same, the certification can be carried out through the competent authority.
臨時通行碼認證,未攜帶智慧卡時,若通過同僚佐證或主管授權認證後,可自訂一組臨時之通行碼,為短時間內需重複認證時簡化之認證程序。 Temporary passcode authentication. If you do not carry a smart card, you can customize a set of temporary passcodes after you have passed the certification of the peer or the authorization of the supervisor. This is a simplified authentication procedure that needs to be repeated for a short period of time.
本發明係為一種整合式智慧卡UNIX認證管理系統,其主要包括操作主控模組、核心管理模組以及客端代理模組。請參閱第1圖,第1圖為本發明之整合式智慧卡UNIX認證管理系統之架構圖。如第1圖所示,該操作主控模組103係為提供使用者105與後端互通之中介,並提供實際與列管伺服器進行溝通認證之操作平台。核心管理模組102為負責處理使用者之需求,並管理UNIX主機群資訊之主控台。客端代理模組101負責實際操作管理列管伺服器之代理平台,接收與轉譯系統管理之相關命令,執行並回報結果,達到跨平台之需求。 The invention is an integrated smart card UNIX authentication management system, which mainly comprises an operation main control module, a core management module and a client agent module. Please refer to FIG. 1. FIG. 1 is a structural diagram of an integrated smart card UNIX authentication management system according to the present invention. As shown in FIG. 1 , the operation main control module 103 is an intermediary for providing communication between the user 105 and the back end, and provides an operation platform for actually communicating and authenticating with the management server. The core management module 102 is a console that is responsible for processing the needs of the user and managing the information of the UNIX host group. The client agent module 101 is responsible for actually operating the agent platform of the management server, receiving commands related to the translation system management, executing and reporting the results, and achieving cross-platform requirements.
操作主控模組103更包含智慧卡、人機介面元件1031、智慧卡(IC)中介元件1032及SSH用戶端元件1033。其中,人機介面元件1031提供使用者105與核心管理模組102溝通之應用程式,提供UNIX主機群104列表,以供使用者105選擇連線UNIX主機之介面。接著,智慧卡(IC)中介元件1032負責與智慧卡溝通之中介元件。然後,SSH用戶端元件1033負責實作安全殼協定(Secure shell,SSH)並與UNIX主機群溝通,依人機介面元件所選之UNIX主機為使用者連線,並進行登入認證與遠端操作之終端機應用程式。 The operation main control module 103 further includes a smart card, a human interface component 1031, a smart card (IC) mediation component 1032, and an SSH client component 1033. The human interface component 1031 provides an application for the user 105 to communicate with the core management module 102, and provides a list of UNIX host groups 104 for the user 105 to select an interface for connecting to the UNIX host. Next, the smart card (IC) mediation component 1032 is responsible for communicating with the smart card. Then, the SSH client component 1033 is responsible for implementing the Secure Shell (SSH) and communicating with the UNIX host group, and connecting the UNIX host selected by the human interface component to the user for login authentication and remote operation. Terminal application.
核心管理模組102更包含管理資料庫1021、帳號管理元件1022、通行碼管理元件1023及排程管理元件1024。其中,管理資料庫1021儲存使用者資訊與UNIX主機群資料之資料庫,而個人資料檔為設定使用者之個人基本資料。使用者資訊可分為個人資料檔及帳號權限檔。帳號權限檔為設定使用者可使用之權限,做為判定使用者來源位址之風險等級、以及登入系統帳號與時點之適當性的依據。接著,帳號管理元件1022提供進行UNIX主機群之帳號權限的新增/異動/刪除,並 與客端代理模組溝通以進行帳號權限佈署,由管理資料庫讀取個人資料檔與帳號權限檔,並呼叫客端代理模組的命令轉譯元件,將個人資料檔與帳號權限檔之資訊轉譯為該UNIX主機作業系統之合法指令,以進行帳號權限佈署。然後,通行碼管理元件1023依據密碼原則產生亂數密碼與金鑰之元件,並與客端代理模組溝通進行通行碼佈署。最後,排程管理元件1024定期驅動通行碼管理元件進行密碼與金鑰更新之元件,另提供臨時通行碼認證及動態密碼認證之排程需求。 The core management module 102 further includes a management database 1021, an account management component 1022, a passcode management component 1023, and a schedule management component 1024. The management database 1021 stores a database of user information and UNIX host group data, and the personal data file is a personal basic data of the user. User information can be divided into personal data files and account permission files. The account permission file is used to set the user's available permissions, as the basis for determining the risk level of the user's source address and the appropriateness of logging in to the system account and time. Next, the account management component 1022 provides new/transfer/delete of the account authority for the UNIX host group, and Communicate with the client agent module to deploy the account rights, read the personal data file and the account permission file from the management database, and call the command translation component of the client agent module, and the information of the personal data file and the account permission file. Translated into the legal instructions of the UNIX host operating system for account rights deployment. Then, the passcode management component 1023 generates the components of the random number password and the key according to the cryptographic principle, and communicates with the client proxy module to perform the pass code deployment. Finally, the schedule management component 1024 periodically drives the passcode management component to perform the cryptographic and key update components, as well as the scheduling requirements for temporary passcode authentication and dynamic password authentication.
其中,個人資料檔為設定使用者之個人基本資料,可係為申請之帳號代碼、電子郵件信箱位址、行動電話號碼、主管電子郵件信箱位址、主管行動電話位址或部門代號。接著,帳號權限檔為設定使用者可使用之權限,做為判定使用者來源位址之風險等級、以及登入系統帳號與時點之適當性的依據,可係為: The personal data file is a personal basic data of the user, and may be an application account code, an email address, a mobile phone number, a competent email address, a competent mobile phone address, or a department code. Then, the account permission file is a setting for the user to use the permission, as the basis for determining the risk level of the user source address and the appropriateness of the login system account and the time point, which can be:
(1)可信任之工作區域,視系統環境需求可以IP、子網路或其他可辨識之網路位址表示之。 (1) A trusted work area, which can be represented by IP, subnet or other identifiable network address depending on the needs of the system environment.
(2)可登入之系統別與帳號代碼。 (2) The system and account code that can be logged in.
(3)可登入該系統之時間限制。 (3) The time limit for logging into the system.
客端代理模組101操作管理列管伺服器之代理平台,負責接收與轉譯系統管理之相關命令,執行並回報結果,達到跨平台之需求。其中,更包含公鑰管理元件1011、命令轉譯元件1012及鏈結通訊元件1013。其中,公鑰管理元件1011管理UNIX主機之信任公鑰,並根據需求增刪信任公鑰。接著,鏈結通訊元件1013與核心管理模組102鏈結溝通之元件,處理資料傳輸與命令接收之需求。然後,命令轉譯元件1012根 據所在UNIX主機,將核心管理模組之需求轉換為適當之指令,以及不同資料格式轉換為標準化文件之元件。 The client agent module 101 operates and manages the proxy platform of the server, and is responsible for receiving and translating the commands related to the translation system management, and executing and reporting the results to meet the requirements of cross-platform. The public key management component 1011, the command translation component 1012, and the link communication component 1013 are further included. The public key management component 1011 manages the trusted public key of the UNIX host, and adds or deletes the trusted public key according to requirements. Then, the link communication component 1013 and the core management module 102 link the components to handle the data transmission and command reception requirements. Then, command the translation component 1012 According to the UNIX host, the requirements of the core management module are converted into appropriate instructions, and the different data formats are converted into components of standardized files.
本發明之整合式智慧卡UNIX認證管理方法,其主 要為使用者登入操作主控模組,系統將檢查使用者登入區域之風險等級,若為可信任之工作區域則為低風險,反之則為高風險;經登入區域風險判斷後,將再檢查智慧卡狀態與驗證卡片用戶個人識別號碼(Personal Identification Number code,pin code)。在啟動操作主控模組,先檢查使用者登入區域之風險等級及檢查智慧卡片是否存在,進行認證模式選擇程序。 The integrated smart card UNIX authentication management method of the present invention is mainly To log in to the user control module, the system will check the risk level of the user's login area. If it is a trusted work area, it is low risk, otherwise it is high risk; after the login area risk judgment, it will be checked again. Smart card status and verification card user identification number (Personal Identification Number code, pin code). After starting the operation main control module, first check the risk level of the user login area and check whether the smart card exists, and perform the authentication mode selection process.
A.若智慧卡存在,且使用者為卡片擁有者採行『智慧卡認證』,再進行動態密碼認證,方屬認證完成。 A. If the smart card exists, and the user adopts the "smart card authentication" for the card owner, and then performs dynamic password authentication, the authentication is completed.
B.若智慧卡存在,但使用者非卡片擁有者採行『同僚佐證認證』,再進行動態密碼認證,方屬認證完成。 B. If the smart card exists, but the user is not the card owner to adopt the "same certification certification", and then the dynamic password authentication, the party certification is completed.
C.若智慧卡不存在,但存在有效之暫時RSA金鑰採行『臨時通行碼認證』,再進行動態密碼認證,方屬認證完成。 C. If the smart card does not exist, but there is a valid temporary RSA key, the "temporary pass code authentication" is adopted, and then the dynamic password authentication is performed, and the authentication is completed.
D.若智慧卡不存在,且不存在有效之暫時RSA金鑰採行『主管授權認證』,再進行動態密碼認證,方屬認證完成。 D. If the smart card does not exist, and there is no valid temporary RSA key to adopt the “supervisor certification”, then the dynamic password authentication is performed, and the authentication is completed.
A.若智慧卡存在,且使用者為卡片擁有者採行『智慧卡認證』,即可認證完成。 A. If the smart card exists and the user adopts the "smart card authentication" for the card owner, the authentication can be completed.
B.若智慧卡存在,但使用者非卡片擁有者採行『同僚佐證認證』,即可認證完成。 B. If the smart card exists, but the user non-card owner adopts the “same certification certification”, the authentication can be completed.
C.若智慧卡不存在,但存在有效之暫時RSA金鑰採行『臨時通行碼認證』,即可認證完成。 C. If the smart card does not exist, but there is a valid temporary RSA key to adopt "temporary pass code authentication", the certification can be completed.
D.若智慧卡不存在,且不存在有效之暫時RSA金鑰採行『主管授權認證』,即可認證完成。 D. If the smart card does not exist and there is no valid temporary RSA key to adopt the “supervisor certification”, the certification can be completed.
請參閱第2圖,第2圖為本發明之整合式智慧卡UNIX認證管理方法之流程圖。如第2圖所示,其方法步驟可包括: Please refer to FIG. 2, which is a flow chart of the integrated authentication method for the smart card UNIX authentication according to the present invention. As shown in Figure 2, the method steps can include:
S210針對使用者登入IP進行風險分類,判斷是否加強認證控管。認證模式選擇程序,系統需根據智慧卡片狀態決定認證模式。 S210 classifies the risk of the user's login IP and determines whether to strengthen the authentication control. The authentication mode selection procedure, the system needs to determine the authentication mode according to the smart card status.
S220智慧卡認證模式,在預設情況下使用者應使用智慧卡登入系統,透過實體智慧卡片的保護,達到強化資安的目的。 In the S220 smart card authentication mode, the user should use the smart card to log in to the system under the preset conditions, and the protection of the physical smart card can be used to enhance the security.
S230同僚佐證認證模式,使用者在特殊情況下無法取得智慧卡時,可透過兩個相同部門之同僚的智慧卡進行認證,以取得臨時通行碼。 The S230 is accompanied by the certification mode. When the user cannot obtain the smart card under special circumstances, the user can authenticate with the same smart card of the same department to obtain the temporary access code.
S240臨時通行碼認證模式,當使用者透過同僚認證或主管授權認證後,可自訂一組臨時密碼,利用臨時通行碼認證的方式,簡化通行碼有效期間內認證的流程。 S240 temporary passcode authentication mode, when the user passes the peer authentication or the supervisor authorization authentication, the user can customize a set of temporary passwords and use the temporary passcode authentication method to simplify the authentication process during the valid period of the passcode.
S250主管授權認證模式,透過主管授權方式進行認證時,系統將會發送授權碼給主管,使用者必須經主管同意並取得授權碼。 The S250 is in charge of the authorization authentication mode. When the authentication is performed by the supervisor authorization method, the system will send an authorization code to the supervisor, and the user must obtain the authorization code and obtain the authorization code.
S260判斷是否加強認證控管。 S260 determines whether to strengthen the authentication control.
S270動態密碼認證程序,由於密碼交由系統進行管理,因此 使用者需要密碼時必須線上申請密碼。 S270 dynamic password authentication program, because the password is managed by the system, Users must apply for a password online when they need a password.
S280通行碼更新程序,係為在不夠安全的外在環境,密碼難免會有外流的情況,若有足夠之時間,任何演算法都有遭到破解之可能性。為了降低密碼外流或金鑰遭到破解之威脅性,通行碼必須定期更新是普遍宣導的策略。由於本發明將通行碼管理之權責交由系統管理,排除人的因素影響,因此可視現場環境之資訊安全強度需求,縮短通行碼更新時間。 The S280 passcode update program is a situation in which the password is inevitably outflowed in an environment that is not secure enough. If there is enough time, any algorithm may be cracked. In order to reduce the threat of password outflow or key cracking, it is a common propaganda strategy that the passcode must be updated regularly. Since the invention administers the rights and responsibilities of the pass code management to the system management and excludes the influence of human factors, the information security strength requirement of the on-site environment can be visually shortened, and the transit code update time is shortened.
請參閱第3圖,第3圖為本發明之整合式智慧卡UNIX認證管理方法之認證模式選擇程序之流程圖。如第3圖所示,認證模式選擇程序更可包含下列步驟: Please refer to FIG. 3, which is a flow chart of the authentication mode selection procedure of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 3, the authentication mode selection program can further include the following steps:
S21001依據登入IP風險分類,判別是否需加強認證控管。依據IP之位置將權限依IP風險進行設定。 Based on the login IP risk classification, S21001 determines whether authentication control needs to be strengthened. The permissions are set according to the IP risk based on the location of the IP.
S21002判別卡片是否仍存在,若是,進行S21006智慧卡用戶個人識別號碼(Personal Identification Number code,pin code)驗證;若否,進行S21003是否為有效之暫時RSA金鑰。 S21002 determines whether the card still exists. If yes, perform S21006 smart card user identification number (Personal Identification Number code, pin code) verification; if not, perform S21003 whether it is a valid temporary RSA key.
S21003判斷是否為有效之暫時RSA金鑰,若是,進行S21004認證模式設定;若否,進行其他認證模式設定。 S21003 determines whether it is a valid temporary RSA key, and if so, performs S21004 authentication mode setting; if not, performs other authentication mode setting.
S21004依據S21003判斷認證模式設定,於實際運用中可為臨時通行碼認證等。 S21004 determines the authentication mode setting according to S21003, and can be temporary passcode authentication in actual operation.
S21005依據S21003判斷為其他認證模式設定,於實際運用中可為主管授權認證等。 S21005 is judged to be set to other authentication modes according to S21003, and may be authorized for authentication in actual use.
S21006智慧卡驗證用戶個人識別號碼(Personal Identification Number code,pin code);若是,進行S21007查詢卡片是否有登入紀錄;若否,重回S21002步驟。 S21006 smart card verification user personal identification number (Personal Identification Number code, pin code); If yes, check if the S21007 query card has a login record; if not, return to step S21002.
S21007查詢智慧卡是否有登錄過之資料紀錄,若是,進行S21008判斷智慧卡擁有者與使用者是否相符;若否,進行S21009上傳智慧卡加密憑證。 S21007 queries whether the smart card has a recorded data record. If yes, S21008 determines whether the smart card owner matches the user; if not, performs S21009 to upload the smart card encryption credential.
S21008判斷智慧卡擁有者與使用者是否相符,若是,進行S21010設定智慧卡認證模式;若否,進行S21011設定智慧卡其他認證模式。 S21008 determines whether the smart card owner matches the user, and if so, performs S21010 to set the smart card authentication mode; if not, performs S21011 to set the smart card other authentication mode.
S21009上傳智慧卡加密憑證,接著,並執行S21008判斷智慧卡擁有者與使用者是否相符。 S21009 uploads the smart card encryption credential, and then executes S21008 to determine whether the smart card owner matches the user.
S21010設定智慧卡認證模式,於實際運用中可為智慧卡認證等。 S21010 sets the smart card authentication mode, which can be used for smart card authentication in actual use.
S21011設定智慧卡其他認證模式,於實際運用中可為同僚佐證認證等。 S21011 sets the other authentication mode of the smart card, and in the actual application, it can be the same as the certification.
請參閱第4圖,第4圖為本發明之整合式智慧卡UNIX認證管理方法之智慧卡認證之流程圖。如第4圖所示,智慧卡認證可包含下列步驟: Please refer to FIG. 4, which is a flow chart of the smart card authentication of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 4, smart card authentication can include the following steps:
S22001產生認證碼,以使用者加密憑證加密並傳送至使用者端。 S22001 generates an authentication code, which is encrypted by the user encrypted credential and transmitted to the user end.
S22002接收使用者輸入之用戶個人識別號碼(Personal Identification Number code,pin code),以智慧卡解密並回傳認證碼。 S22002 receives the user identification number (Personal Identification Number code, pin code) input by the user, decrypts the smart card and returns the authentication code.
S22003回傳認證碼確認是否相符,若是,進行S2204顯示UNIX主機列表;若否,結束。 S22003 returns the authentication code to confirm whether it matches. If yes, S2204 displays the list of UNIX hosts; if not, it ends.
S22004接收管理資料庫之資料並顯示UNIX主機列表。 S22004 receives the data of the management database and displays a list of UNIX hosts.
S22005判斷連線之UNIX主機進行連線。 S22005 determines the connection of the UNIX host to connect.
S22006判斷客戶端是否存在認證金鑰檔,若是,進行S22009使用智慧卡解密認證用私鑰與公鑰;若否,進行S22007產生配對認證用之公私鑰。 S22006 determines whether the client has a certificate key file, and if so, performs a smart card decryption authentication private key and a public key in S22009; if not, performs a public-private key for pair authentication in S22007.
S22007產生配對認證用之公私鑰,同時進行S22008使用智慧卡加密認證私鑰,並存放於用戶端,以及S22011上傳認證公鑰。 S22007 generates the public and private keys for pairing authentication. At the same time, S22008 uses the smart card encryption authentication private key and stores it on the user side, and S22011 uploads the authentication public key.
S22008使用智慧卡加密認證私鑰,並存放於用戶端。 S22008 uses a smart card to encrypt the private key and store it on the client.
S22009使用智慧卡解密認證用私鑰與公鑰,進行S22010判斷認證用私鑰與公鑰是否相符。 S22009 uses the smart card to decrypt the authentication private key and the public key, and performs S22010 to determine whether the authentication private key matches the public key.
S22010判斷認證用私鑰與公鑰是否相符,若是,進行S22013啟動SSH Client連線至伺服器;若否,進行S22007產生配對認證用之公私鑰。 S22010 determines whether the authentication private key matches the public key. If yes, the S22013 starts the SSH client connection to the server; if not, the S22007 generates the public and private key for pairing authentication.
S22011上傳認證公鑰,接著,進行S22012將認證公鑰佈署至連線之UNIX伺服器。 S22011 uploads the authentication public key, and then performs S22012 to deploy the authentication public key to the connected UNIX server.
S22012將認證公鑰佈署至連線之UNIX伺服器,該UNIX伺服器之選擇可為使用者申請為主。接著,進行S22013啟動SSH Client連線至伺服器。 S22012 deploys the certified public key to the connected UNIX server. The choice of the UNIX server can be applied for the user. Next, start S22013 to start the SSH Client connection to the server.
S22013啟動SSH Client連線至伺服器。 S22013 starts the SSH client connection to the server.
S22014利用RSA私鑰進行SSH公鑰認證。 S22014 uses the RSA private key for SSH public key authentication.
請參閱第5圖,第5圖為本發明之整合式智慧卡UNIX認證管理方法之同僚佐證認證之流程圖。如第5圖所示, 同僚佐證認證可包含下列步驟: Please refer to FIG. 5, which is a flow chart of the same as the certification certification of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 5, Peer certification can include the following steps:
S23001同僚認證程序。 S23001 peer certification program.
S23002接收同僚之智慧卡認證並接收用戶個人識別號碼(Personal Identification Number code,pin code)。 S23002 receives the smart card authentication of the peer and receives the personal identification number code (pin code).
S23003是否抽換智慧卡,若是,進行S23004用戶個人識別號碼(Personal Identification Number code,pin code)驗證;若否,重回S23002。 S23003 Whether to replace the smart card, if yes, perform S23004 Personal Identification Number code (pin code) verification; if not, return to S23002.
S23004是否用戶個人識別號碼(Personal Identification Number code,pin code)驗證通過,若是,進行S23005判斷智慧卡擁有者與使用者是否為同部門;若否,重回S23003。 S23004: If the user identification number (Personal Identification Number code, pin code) is verified, if yes, S23005 determines whether the smart card owner and the user are in the same department; if not, return to S23003.
S23005判斷智慧卡擁有者與使用者是否為同部門,若是,進行23006產生臨時通行碼;若否,重回S23002。 S23005 determines whether the smart card owner and the user are in the same department. If yes, the 23006 generates a temporary pass code; if not, returns to S23002.
S23006產生臨時通行碼,於實際運用時可接收使用者之資料輸入而產生臨時通行碼。 S23006 generates a temporary pass code, which can receive the data input of the user during actual use to generate a temporary pass code.
S23007以臨時通行碼為通行碼(passphrase),產生配對之認證金鑰,並儲存於本機端。 S23007 uses the temporary pass code as the passphrase to generate the paired authentication key and store it on the local end.
S23008上傳認證公鑰。 S23008 uploads the authentication public key.
S23009下載並顯示伺服器列表。 S23009 downloads and displays the server list.
S23010接收資料,並依資料選擇連線之伺服器。於實際運用時可接收使用者輸入之資料。 S23010 receives the data and selects the connected server according to the data. The data input by the user can be received in actual use.
S23011將認證公鑰佈署至連線之伺服器並同時進行下列步驟。 S23011 deploys the authentication public key to the connected server and performs the following steps at the same time.
S23012以臨時通行碼為通行碼(passphrase),搭配RSA私鑰進行SSH公鑰認證。 S23012 uses the temporary pass code as the passphrase and uses the RSA private key for SSH public key authentication.
S23013設定排程元件並移除該筆認證公鑰。 S23013 sets the scheduling component and removes the authentication public key.
請參閱第6圖,第6圖為本發明之整合式智慧卡UNIX認證管理方法之臨時通行碼認證之流程圖。如第6圖所示,臨時通行碼認證程序可包含下列步驟: Please refer to FIG. 6. FIG. 6 is a flow chart of the temporary passcode authentication of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 6, the temporary passcode authentication procedure can include the following steps:
S24001臨時通行碼認證程序。 S24001 temporary passcode authentication procedure.
S24002判斷畚箕是否存在臨時通行碼,若是,進行S24004接收臨時通行碼;若否,進入其他認證模式流程。 S24002 determines whether there is a temporary pass code, and if so, performs a temporary pass code on S24004; if not, enters another authentication mode process.
S24003進入其他認證模式流程,於實際運用時可為主管授權認證流程等。 S24003 enters other authentication mode processes, and can be used to authorize the authentication process in actual use.
S24004接收臨時通行碼,可由使用者端接收資料,輸入該臨時通行碼。 S24004 receives the temporary pass code, and the user can receive the data and input the temporary pass code.
S24005以臨時通行碼為通行碼(passphrase),使用臨時認證金鑰驗證並判斷通行碼是否符合。 The S24005 uses the temporary pass code as the passphrase and uses the temporary authentication key to verify and determine whether the pass code matches.
S24006通行碼是否正確,若是,進行S24007下載並顯示連線伺服器;若否,結束。 If the S24006 passcode is correct, if yes, download S24007 and display the connection server; if not, end.
S24007下載並顯示連線伺服器。 S24007 downloads and displays the connection server.
S24008接收使用者端之資料,選擇連線之伺服器。 S24008 receives the data of the user terminal and selects the connected server.
S24009將認證公鑰佈署至連線之伺服器,同時進行下列步驟。 S24009 deploys the authentication public key to the connected server and performs the following steps.
S24010以臨時通行碼為通行碼(passphrase),搭配RSA私鑰進行SSH公鑰認證。 The S24010 uses the temporary pass code as the passphrase and uses the RSA private key for SSH public key authentication.
S24011設定排程元件並移除該筆認證公鑰。 S24011 sets the scheduling component and removes the authentication public key.
請參閱第7圖,第7圖為本發明之整合式智慧卡UNIX認證管理方法之主管授權認證之流程圖。如第7圖所示,主管授權認證可包含下列步驟: Please refer to FIG. 7. FIG. 7 is a flow chart of the main authority authorization authentication of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 7, the supervisory certification can include the following steps:
S25001主管授權認證程序。 S25001 is responsible for the authorization certification process.
S25002產生主管授權碼。 S25002 generates the supervisor authorization code.
S25003傳送主管授權碼與使用者資訊至主管行動裝置。 S25003 transmits the supervisor authorization code and user information to the competent mobile device.
S25004使用者透過主管接收該授權碼,並傳送該授權碼至本系統進行認證。 The user of S25004 receives the authorization code through the supervisor and transmits the authorization code to the system for authentication.
S25005判斷該授權碼是否有效及正確,若是,進行S25006變更臨時通行碼;若否,重回S25002。 S25005 determines whether the authorization code is valid and correct. If yes, perform S25006 to change the temporary password; if not, return to S25002.
S25006接收使用者之新臨時通行碼。 S25006 receives the user's new temporary passcode.
S25007以此新臨時通行碼為通行碼(passphrase),產生配對之認證金鑰,儲存於本機端。 S25007 uses this new temporary pass code as a passphrase to generate a paired authentication key, which is stored on the local end.
S25008上傳認證公鑰。 S25008 uploads the authentication public key.
S25009下載並顯示伺服器列表。 S25009 downloads and displays the server list.
S25010依據使用者之資料連線至伺服器。 The S25010 connects to the server based on the user's data.
S25011將認證公鑰佈署至連線伺服器,同時進行下列步驟。 The S25011 deploys the authentication public key to the connection server and performs the following steps.
S25012以臨時通行碼為通行碼(passphrase),搭配RSA私鑰進行SSH公鑰認證。 The S25012 uses the temporary pass code as the passphrase and uses the RSA private key for SSH public key authentication.
S25013設定排程元件並移除該筆認證公鑰。 S25013 sets the scheduling component and removes the authentication public key.
請參閱第8圖,第8圖為本發明之整合式智慧卡 UNIX認證管理方法之申請動態密碼之流程圖。如第8圖所示,由於密碼交由系統進行管理,因此使用者需要密碼時必須線上申請密碼。其中,可包含下列步驟: Please refer to FIG. 8. FIG. 8 is an integrated smart card of the present invention. Flowchart of the application dynamic password for the UNIX certification management method. As shown in Figure 8, since the password is managed by the system, the user must apply for a password online when the password is required. Among them, the following steps can be included:
S27101申請動態密碼。 S27101 applies for a dynamic password.
S27102是否有動態密碼申請程序尚未逾期,若是,進行S27104發送動態密碼申請通知至使用者主管;若否,進行S27103提示該動態密碼正受理申請中。 S27102 Whether the dynamic password application procedure has not expired, if yes, S27104 sends a dynamic password application notification to the user supervisor; if not, S27103 prompts the dynamic password to be accepted.
S27103提示該動態密碼正受理申請中。 S27103 indicates that the dynamic password is being accepted in the application.
S27104發送動態密碼申請通知至使用者主管。 S27104 sends a dynamic password application notification to the user supervisor.
S27105發送動態密碼至使用者行動裝置,同時進行下列步驟。 The S27105 sends a dynamic password to the user's mobile device while performing the following steps.
S27106重新產生密碼,並進入密碼佈署流程。 The S27106 regenerates the password and enters the password deployment process.
S27107接收使用者密碼 S27107 receives the user password
S27108判斷密碼是否正確,若是,進行S27109登入UNIX系統;若否,重回S27107重新輸入密碼或結束。 S27108 determines whether the password is correct. If yes, perform S27109 to log in to the UNIX system; if not, return to S27107 to re-enter the password or end.
S27109若密碼正確,則登入UNIX系統。 S27109 If the password is correct, log in to the UNIX system.
請參閱第9圖,第9圖為本發明之整合式智慧卡UNIX認證管理方法之通行碼更新之流程圖。如第9圖所示,在不夠安全的外在環境,密碼難免會有外流的情況,若有足夠之時間,任何演算法都有遭到破解之可能性。為了降低密碼外流或金鑰遭到破解之威脅性,通行碼必須定期更新是普遍宣導的策略。由於本發明將通行碼管理之權責交由系統管理,排除人的因素影響,因此可視現場環境之資訊安全強度需求,縮短 通行碼更新時間。其中,可包含下列步驟: Please refer to FIG. 9. FIG. 9 is a flow chart of the update of the pass code of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 9, in an external environment that is not secure enough, passwords will inevitably have an outflow. If there is enough time, any algorithm may be cracked. In order to reduce the threat of password outflow or key cracking, it is a common propaganda strategy that the passcode must be updated regularly. Since the present invention transfers the rights and responsibilities of the pass code management to the system management and excludes the influence of human factors, the information security strength requirement of the on-site environment can be shortened. Passcode update time. Among them, the following steps can be included:
S27201通行碼定期更新。 The S27201 pass code is updated regularly.
S27202讀取所有列管伺服器之帳號列表與對應之使用者加密憑證。 S27202 reads the account list of all the tube server and the corresponding user encryption certificate.
S27203批次處理通行碼更新作業。 The S27203 batch processes the passcode update job.
S27204移除逾期信任公鑰。 S27204 removes the overdue trust public key.
S27205是否成功移除逾期信任公鑰,若是,進行S27206標記信任公鑰移除時間;若否,進行S27207通知管理員逾時公鑰移除異常。 Whether the S27205 successfully removes the overdue trust public key. If yes, the S27206 marks the trusted public key removal time; if not, the S27207 notifies the administrator of the timeout public key removal exception.
S27206標記信任公鑰移除時間,並儲存於資料庫。 The S27206 flag trusts the public key removal time and stores it in the database.
S27207通知管理員逾時公鑰移除異常。 S27207 notifies the administrator of the timeout public key removal exception.
S27208產生亂數密碼。 S27208 generates a random number password.
S27209將亂數之密碼設定至對應之列管主機。 S27209 sets the password of the random number to the corresponding host.
S27210判斷密碼設定是否成功,若是,重回S27203批次處理通行碼更新作業;若否,進行S27211通知管理者密碼更新失敗。 S27210 determines whether the password setting is successful, and if so, returns to the S27203 batch processing pass code update operation; if not, performs S27211 to notify the administrator that the password update fails.
S27211通知管理者密碼更新失敗,並重回S27203批次處理通行碼更新作業。 S27211 notifies the administrator that the password update has failed, and returns to the S27203 batch processing passcode update operation.
本發明所提供之技術特徵,與其他習用技術相互比較時,更具備下列優點: The technical features provided by the present invention have the following advantages when compared with other conventional technologies:
1.提出智慧卡認證UNIX系統模式。傳統認證方式多仰賴使用者自行保管帳號密碼,若使用者遺忘密碼或者輸入錯誤密碼次數過多,則帳號將被鎖定而無法使用。本發明之特 點在於使用智慧卡來加強或取代密碼認證之方法。智慧卡認證方法可用在簡化登入程序,或強化認證安全性。若用來簡化登入程序,則使用者使需插入智慧卡並輸入用戶個人識別號碼(Personal Identification Number code,pin code)即可登入系統,可避免因密碼輸入錯誤造成的帳號鎖定無法登入之問題。若用來強化認證安全性,則使用者輸入智慧卡並輸入用戶個人識別號碼(Personal Identification Number code,pin code)後,仍需進行帳號密碼認證,可提升資訊安全之層級。 1. Propose a smart card authentication UNIX system mode. The traditional authentication method relies on the user to keep the account password. If the user forgets the password or enters the wrong password too many times, the account will be locked and cannot be used. Special feature of the invention The point is to use smart cards to enhance or replace the method of password authentication. Smart card authentication methods can be used to simplify the login process or to enhance authentication security. If it is used to simplify the login process, the user can insert the smart card and input the user identification number (Personal Identification Number code, pin code) to log in to the system, so as to avoid the problem that the account lock cannot be logged in due to the password input error. If the authentication security is used, the user still needs to perform account password authentication after inputting the smart card and inputting the personal identification number code (pin code), which can improve the level of information security.
2.不需使用特殊規格之智慧卡片。本發明係針對UNIX系統普遍使用的OPENSSH套件設計了一種利用智慧卡為主之認證管理系統,係動態產生一認證碼,以使用者之智慧卡之加密憑證加密後傳輸到使用者端,再以智慧卡解密並回傳至系統以驗證使用者之身分。並亂數產生RSA公鑰,動態佈署至UNIX端,使用者再以SSH公鑰認證方法進行認證以登入UNIX系統。係以間接的方式達成利用實體智慧卡進行認證的方法,此方法可相容於包含自然人憑證等台灣常見之智慧卡片,不需使用特殊規格之智慧卡片。 2. No need to use smart cards with special specifications. The invention designs an authentication management system based on the popular card of the OPENSSH suite commonly used in UNIX systems, dynamically generates an authentication code, encrypts the encrypted certificate of the user's smart card, and transmits it to the user end, and then transmits The smart card is decrypted and passed back to the system to verify the identity of the user. And the random number generates the RSA public key, dynamically deployed to the UNIX end, and the user authenticates by SSH public key authentication method to log in to the UNIX system. Indirect way to achieve the use of physical smart card for authentication, this method can be compatible with Taiwan's common smart cards including natural person credentials, without the need for special specifications of smart cards.
3.以系統管理密碼代替人工管理密碼。現有密碼管理方法仰賴使用者自行管理,為求方便使用者往往使用符合密碼規則,但實質密碼強度低之密碼。本系統設計密碼由系統管理,系統將定時變更並產生亂數密碼。使用者需要密碼時必須上線申請,系統將透過簡訊與電子郵件方式告知使用者最新密碼。由於不需使用者記憶,故可使用較長之密碼長度。 3. Replace the manual management password with the system management password. The existing password management method relies on the user's own management. For the convenience of the user, the password that meets the password rule but has a low physical strength is often used. The system design password is managed by the system, and the system will change periodically and generate random passwords. Users must apply online when they need a password. The system will inform users of the latest password through SMS and email. A longer password length can be used since no user memory is required.
4.硬體防護加上密碼防護,三重認證防護模式。傳統密碼認 證只要帳號與密碼正確即可登入系統,若遭到側錄或密碼外流之情況則有遭到非法登入的疑慮。本系統除傳統密碼認證方法外,另外增加智慧卡與用戶個人識別號碼(Personal Identification Number code,pin code)認證流程。即使遭到監聽側錄,帳號密碼、甚至用戶個人識別號碼(Personal Identification Number code,pin code)外流,只要實體智慧卡本身不要遭竊,有心人士亦無法登入系統。 4. Hardware protection plus password protection, triple authentication protection mode. Traditional password recognition As long as the account number and password are correct, you can log in to the system. If you are subject to side recording or password outflow, you will be suspected of illegal login. In addition to the traditional password authentication method, the system adds a smart card and a personal identification number code (pin code) authentication process. Even if it is monitored, the account password and even the Personal Identification Number code (pin code) are outflowed. As long as the physical smart card itself is not stolen, people who are interested can not log in to the system.
100‧‧‧整合式智慧卡UNIX認證管理系統 100‧‧‧Integrated Smart Card UNIX Authentication Management System
101‧‧‧客端代理模組 101‧‧‧Client Agent Module
1011‧‧‧公鑰管理元件 1011‧‧‧ Public Key Management Components
1012‧‧‧命令轉譯元件 1012‧‧‧Command translation component
1013‧‧‧鏈結通訊元件 1013‧‧‧ Link communication components
102‧‧‧核心管理模組 102‧‧‧Core Management Module
1021‧‧‧管理資料庫 1021‧‧‧Management database
1022‧‧‧帳號管理元件 1022‧‧‧ Account Management Components
1023‧‧‧通行碼管理元件 1023‧‧‧pass code management component
1024‧‧‧排程管理元件 1024‧‧‧ Schedule Management Components
103‧‧‧操作主控模組 103‧‧‧Operation master module
1031‧‧‧人機介面元件 1031‧‧‧Human Machine Interface Components
1032‧‧‧智慧IC卡中介元件 1032‧‧‧Smart IC card intermediary components
1033‧‧‧SSH用戶端元件 1033‧‧‧SSH client component
104‧‧‧UNIX主機群 104‧‧‧UNIX host group
105‧‧‧使用者 105‧‧‧Users
S210~S280‧‧‧整合式智慧卡UNIX認證管理方法 S210~S280‧‧‧Integrated smart card UNIX authentication management method
S21001~S21011‧‧‧認證模式選擇程序之流程步驟 S21001~S21011‧‧‧Procedure mode selection procedure
S22001~S22014‧‧‧智慧卡認證之流程步驟 S22001~S22014‧‧‧Smart Card Certification Process Steps
S23001~S23013‧‧‧同僚佐證認證之流程步驟 S23001~S23013‧‧‧Committed certification process steps
S24001~24011‧‧‧臨時通行碼認證之流程步驟 S24001~24011‧‧‧Procedures for the process of temporary passcode authentication
S25001~S25013‧‧‧主管授權認證之流程步驟 S25001~S25013‧‧‧ Process steps for authorization certification
S27101~S27109‧‧‧申請動態密碼之流程步驟 S27101~S27109‧‧‧ Process steps for applying for a dynamic password
S27201~S27211‧‧‧通行碼更新之流程步驟 S27201~S27211‧‧‧Procedures for updating the passcode
請參閱有關本發明之詳細說明及其附圖,將可進一步瞭解本發明之技術內容及其目的功效;有關附圖為:第1圖為本發明之整合式智慧卡UNIX認證管理系統之架構圖。 Please refer to the detailed description of the present invention and the accompanying drawings for further understanding of the technical contents of the present invention and the functions thereof. The related drawings are: FIG. 1 is a structural diagram of the integrated smart card UNIX authentication management system of the present invention. .
第2圖為本發明之整合式智慧卡UNIX認證管理方法之流程圖。 2 is a flow chart of a method for managing an integrated smart card UNIX authentication according to the present invention.
第3圖為本發明之整合式智慧卡UNIX認證管理方法之認證模式選擇程序之流程圖。 FIG. 3 is a flow chart of the authentication mode selection procedure of the integrated smart card UNIX authentication management method of the present invention.
第4圖為本發明之整合式智慧卡UNIX認證管理方法之智慧卡認證之流程圖。 FIG. 4 is a flow chart of the smart card authentication of the integrated smart card UNIX authentication management method of the present invention.
第5圖為本發明之整合式智慧卡UNIX認證管理方法之同僚佐證認證之流程圖。 FIG. 5 is a flow chart of the same as the certification certification of the integrated smart card UNIX authentication management method of the present invention.
第6圖為本發明之整合式智慧卡UNIX認證管理方法之臨時通行碼認證之流程圖。 Figure 6 is a flow chart of the temporary pass code authentication of the integrated smart card UNIX authentication management method of the present invention.
第7圖為本發明之整合式智慧卡UNIX認證管理方法之主管授權認證之流程圖。 Figure 7 is a flow chart of the authority authorization authentication of the integrated smart card UNIX authentication management method of the present invention.
第8圖為本發明之整合式智慧卡UNIX認證管理方法之申請動態密碼之流程圖。 FIG. 8 is a flow chart of the application dynamic password of the integrated smart card UNIX authentication management method of the present invention.
第9圖為本發明之整合式智慧卡UNIX認證管理方法之通行碼更新之流程圖。 FIG. 9 is a flow chart of the update of the pass code of the integrated smart card UNIX authentication management method of the present invention.
為了使本發明的目的、技術方案及優點更加清楚明白,下面結合實施例,對本發明進行進一步詳細說明。應當理解,此處所描述的具體實施例僅用以解釋本發明,但並不用於限定本發明。 In order to make the objects, technical solutions and advantages of the present invention more comprehensible, the present invention will be further described in detail below with reference to the embodiments. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
情境一、信任區智慧卡認證,使用者首次使用本系統,欲申請Host A 的帳號Account A ,並於信任區以智慧卡認證登入Host A 的Account A 。 Scenario 1, the zone of confidence smart card authentication, users first use of the system, want to apply for an account of Host A Account A, and in the zone of confidence to Host A smart card login authentication of Account A.
1.系統管理者透過核心管理模組的帳號管理元件完成個人資料檔與帳號權限檔,並啟動帳號佈署程序。 1. The system administrator completes the personal data file and the account permission file through the account management component of the core management module, and starts the account deployment process.
2.系統連結客端代理模組的鏈結通訊系統,透過命令轉譯元件產生符合Host A 環境之帳號創建命令,並實際建立Account A 。同時根據使用者設定建構帳戶屬性與環境。 2. The system links the client communication module's link communication system, generates an account creation command conforming to the Host A environment through the command translation component, and actually establishes Account A. At the same time, the account attributes and environment are constructed according to the user settings.
3.使用者啟動人機介面元件,並透過智慧卡中介元件驗證智慧卡有效性與用戶個人識別號碼(Personal Identification Number code,pin code)正確性。 3. The user activates the human interface component and verifies the validity of the smart card and the correctness of the personal identification number code (pin code) through the smart card intermediary component.
4.確認管理資料庫內無該卡片資訊,須進行首次智慧卡登錄程序。 4. Confirm that there is no such card information in the management database, and the first smart card login procedure is required.
5.系統透過智慧卡中介元件讀取智慧卡資訊與加密憑證encrypt,並上傳至管理資料庫內備存。 5. The system of smart card read by smart card information with the intermediary element encrypted credential encrypt, and uploaded to the management information kept in the library.
6.主控台根據管理資料庫之資訊列出使用者擁有之帳號列表。 6. The console lists the list of accounts owned by the user based on the information in the management database.
7.使用者選擇連線至Host A ,系統產生配對之RSA金鑰publicKey A 與privateKey A 。 7. The user chooses to connect to Host A , and the system generates the paired RSA keys publicKey A and privateKey A.
8.上傳publicKey A ,並透過客端代理模組的公鑰管理元件,將publicKey A 佈署至Host A 的Account A 的信任金鑰列表內。 8. Upload publicKey A and deploy publicKey A to the trust key list of Account A of Host A through the public key management component of the client proxy module.
9.利用encrypt對privateKey A 加密,並存放於本機端供後續使用。 9. Encrypt privateKey A with encrypt and store it on the local machine for later use.
10.啟動SSH用戶端元件,連線至Host A 的Account A 並以privateKey A 進行public key認證。 10. Start the SSH client device to connect to a Account A Host A and to privateKey A public key for authentication.
11.認證成功,確認使用者所屬區域屬於信任區,故省略密碼認證,完成登入認證程序。 11. The authentication is successful, and the area to which the user belongs belongs to the trusted area. Therefore, the password authentication is omitted and the login authentication procedure is completed.
情境二、信任區同僚佐證認證,使用者User B 忘了攜帶智慧卡,須於信任區透過同僚佐證認證登入Host B 的Account B 。 Situation Second, the zone of confidence colleagues evidence certification, users User B forgot to carry smart cards, is required to pass through the zone of confidence colleagues corroborated authentication login Account B Host B's.
1.使用者User B 透過人機介面元件與系統的認證管理元件驗證,登入人機介面元件。並透過智慧卡中介元件驗證智慧卡有效性與用戶個人識別號碼(Personal Identification Number code,pin code)正確性。 1. User User B logs in to the human interface component through the human interface component and the authentication management component of the system. The smart card intermediary component is used to verify the validity of the smart card and the correctness of the personal identification number code (pin code).
2.確認智慧卡擁有者User C 與User B 不符,但隸屬相同單位,進入步驟五同僚認證模式。 2. Confirm that the smart card owner User C does not match User B , but belongs to the same unit and enters step 5 of the same authentication mode.
3.人機介面元件提示須第二位同僚進行協同認證。 3. The man-machine interface component prompts the second peer to perform collaborative authentication.
4.透過智慧卡中介元件確認智慧卡已抽換並通過用戶個人識別號碼(Personal Identification Number code,pin code)驗證,且擁有者User D 與User C 不同。 4. Confirm that the smart card has been exchanged and verified by the Personal Identification Number code (pin code) through the smart card mediation component, and the owner User D is different from User C.
5.確認User D 與User B 隸屬相同單位,通過同僚認證程序。 5. Confirm that User D and User B belong to the same unit and pass the peer authentication procedure.
6.使用者根據人機介面元件提示輸入符合密碼原則之臨時通 行碼passphrase B 。 6. The user enters a temporary pass code passphrase B that conforms to the password principle according to the prompt of the human interface component.
7.利用passphrase B ,產生配對之臨時RSA金鑰publicKey B 與privateKey B 。 7. Using passphrase B , generate the paired temporary RSA keys publicKey B and privateKey B.
8.進入步驟八。 8. Go to step eight.
9.人機介面元件列出使用者擁有之帳號列表。 9. The human interface component lists a list of accounts owned by the user.
10.使用者選擇連線至Host B 。 10. The user chooses to connect to Host B.
11.透過客端代理模組的公鑰管理元件,將publicKey B 佈署至Host B 的Account B 的信任金鑰列表內。 11. Deploy the publicKey B to the Trust Key list of Account B of Host B through the public key management component of the client proxy module.
12.透過通行碼管理元件,於三分鐘後移除Account B 信任金鑰內的publicKey B 。 12. Remove the publicKey B in the Account B trust key after three minutes via the passcode management component.
13.啟動SSH用戶端元件,連線至Host B 的Account B 並以passphrase B 搭配privateKey B 進行public key認證。 13. Start the SSH client device to connect to a Account B Host B passphrase B and to match privateKey B for public key authentication.
14.認證成功,確認使用者所屬區域為信任區,故省略密碼認證,完成登入認證程序。 14. The authentication is successful, and the area to which the user belongs is confirmed as the trust zone. Therefore, the password authentication is omitted and the login authentication procedure is completed.
情境三、非信任區主管授權認證,使用者User C 忘了攜帶智慧卡,須於非信任區透過主管授權認證登入Host C 的Account C 。 Scenario 3: The untrusted zone supervisor authorizes the authentication. User User C forgets to carry the smart card and must log in to Account C of Host C through the authorization authorization in the untrusted zone.
1.使用者User C 透過人機介面元件與系統的認證管理元件驗證,登入人機介面元件。智慧卡中介元件偵測確認智慧卡不存在。 1. User User C logs in to the human interface component through the human interface component and the authentication management component of the system. The smart card mediation component detects that the smart card does not exist.
2.管理資料庫內無屬於User C 有效之臨時RSA金鑰,進入步驟七。 2. There is no temporary RSA key belonging to User C in the management database, go to step 7.
3.通行碼管理元件產生符合密碼原則之亂數授權碼Code C ,將 User C 與Code C 發送至主管的行動裝置。User C 須透過主管取得Code C ,並於時限內輸入系統。 3. The passcode management component generates a random number authorization code Code C that conforms to the password principle, and sends User C and Code C to the mobile device of the supervisor. User C must obtain Code C through the supervisor and enter the system within the time limit.
4.人機介面元件確認使用者輸入之Code C 正確且有效,通過主管授權認證程序。 4. The human interface component confirms that the Code C entered by the user is correct and valid, and passes the authorization authorization procedure.
5.使用者輸入符合密碼原則之臨時通行碼passphrase C 。 5. The user enters a temporary pass code passphrase C that complies with the password principle.
6.利用passphrase C ,產生配對之臨時RSA金鑰publicKey C 與privateKey C 。 6. Using passphrase C , generate paired temporary RSA keys publicKey C and privateKey C.
7.進入步驟八。 7. Go to step eight.
8.人機介面元件列出使用者擁有之帳號列表。 8. The Human Interface component lists a list of accounts owned by the user.
9.使用者選擇連線至Host C 。 9. The user chooses to connect to Host C.
10.透過客端代理模組的公鑰管理元件,將publicKey C 佈署至Host C 的Account C 的信任金鑰列表內。 10. Deploy publicKey C to the list of trust keys in Account C of Host C through the public key management component of the client agent module.
11.透過排程管理元件與通行碼管理元件,於三分鐘後移除Account C 信任金鑰內的publicKey C 。 11. Remove the publicKey C from the Account C trust key after three minutes through the scheduling management component and the passcode management component.
12.啟動SSH用戶端元件,連線至Host C 的Account C 並以passphrase C 搭配privareKey C 進行public key認證。 12. Start the SSH client component, connect to Account C of Host C , and use passphrase C with privareKey C for public key authentication.
13.認證成功,確認使用者所屬區域為非信任區,需使用密碼認證,進入步驟九。 13. If the authentication is successful, confirm that the user belongs to the non-trust zone, and you need to use password authentication. Go to Step 9.
14.系統以電子郵件發送密碼申請通知給使用者之主管。 14. The system sends a password request notification to the user's supervisor by email.
15.透過通行碼管理元件,重新產生亂數密碼password C 並設定至Host C 的Account C 上。 15. Through the passcode management component, regenerate the random password password C and set it to Account C of Host C.
16.將password C 發送至使用者的行動裝置,使用者必須在時限內輸入系統以通過驗證。 16. Send password C to the user's mobile device, the user must enter the system within the time limit to pass the verification.
17.系統將設定三分鐘後啟動通行碼佈署程序,重新產生亂數密碼password C2並設定至Host C 的Account C 上,確保使用者申請之密碼將於三分鐘後失效。 17. The system will start the passcode deployment procedure after three minutes, regenerate the random password password C 2 and set it to the Account C of Host C , ensuring that the password applied by the user will expire after three minutes.
非信任區臨時通行碼認證,使用者User C 須於非信任區登入Host C 的Account C ,User C 忘了攜帶智慧卡,但於先前已完成主管授權認證,於臨時通行碼有效期限內需再度登入系統。 Temporary password authentication in the untrusted zone. User User C must log in to Account C of Host C in the untrusted zone. User C forgot to carry the smart card, but has completed the authorization of the supervisor before, and needs to log in again within the validity period of the temporary password. system.
1.使用者User C 透過人機介面元件與系統的認證管理元件驗證,登入人機介面元件。智慧卡中介元件偵測確認智慧卡不存在。 1. User User C logs in to the human interface component through the human interface component and the authentication management component of the system. The smart card mediation component detects that the smart card does not exist.
2.確認管理資料庫內已存在屬於User C 有效之臨時RSA金鑰publicKey C 與privateKey C 。 2. Confirm that the temporary RSA keys publicKey C and privateKey C that are valid for User C already exist in the management database.
3.使用者輸入臨時通行碼passphrase C2,利用privateKey C 驗證passphrase C2是否正確。 3. The user enters the temporary pass code passphrase C 2 and uses privateKey C to verify that the passphrase C 2 is correct.
4.確認passphrase C2正確,人機介面元件列出使用者擁有之帳號列表。 4. Confirm that the passphrase C 2 is correct and the Human Interface component lists the list of accounts owned by the user.
5.使用者選擇連線至Host C 。 5. The user chooses to connect to Host C.
6.透過客端代理模組的公鑰管理元件,將publicKey C 佈署至Host C 的Account C 的信任金鑰列表內。 6. Deploy publicKey C to Host C 's Account C trust key list through the public key management component of the client agent module.
7.透過排程管理元件與通行碼管理元件,於三分鐘後移除Account C 信任金鑰內的publicKey C 。 7. Remove the publicKey C from the Account C trust key after three minutes through the scheduling management component and the passcode management component.
8.啟動SSH用戶端元件,連線至Host C 的Account C 並以passphrase C 搭配privateKey C 進行public key認證。 8. Start SSH client device, to connect to Host C and the Account C passphrase C with privateKey C to perform public key authentication.
9.認證成功,確認使用者所屬區域為非信任區,需使用密碼 認證,進入步驟九。 9. The authentication is successful. Confirm that the user belongs to the non-trust zone. You need to use the password. Certification, go to step 9.
10.系統以電子郵件發送密碼申請通知給使用者之主管。 10. The system sends a password request notification to the user's supervisor by email.
11.透過通行碼管理元件,重新產生亂數密碼password C 並設定至Host C 的Account C 上。 11. Through the passcode management component, regenerate the random password password C and set it to Account C of Host C.
12.將password C 發送至使用者的行動裝置,使用者必須在時限內輸入系統以通過驗證。 12. Send password C to the user's mobile device, the user must enter the system within the time limit to pass the verification.
13.系統將設定三分鐘後啟動通行碼佈署程序,重新產生亂數密碼password C2並設定至Host C 的Account C 上,確保使用者申請之密碼將於三分鐘後失效。 13. The system will start the passcode deployment procedure after three minutes, regenerate the random password password C 2 and set it to the Account C of Host C to ensure that the password applied by the user will expire after three minutes.
上列詳細說明乃針對本發明之一可行實施例進行具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。 The detailed description of the present invention is intended to be illustrative of a preferred embodiment of the invention, and is not intended to limit the scope of the invention. The patent scope of this case.
綜上所述,本案不僅於技術思想上確屬創新,並具備習用之傳統方法所不及之上述多項功效,已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請 貴局核准本件發明專利申請案,以勵發明,至感德便。 To sum up, this case is not only innovative in terms of technical thinking, but also has many of the above-mentioned functions that are not in the traditional methods of the past. It has fully complied with the statutory invention patent requirements of novelty and progressiveness, and applied for it according to law. Approved this invention patent application, in order to invent invention, to the sense of virtue.
S210~S280‧‧‧整合式智慧卡UNIX認證管理方法 S210~S280‧‧‧Integrated smart card UNIX authentication management method
Claims (14)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW103106393A TW201533605A (en) | 2014-02-26 | 2014-02-26 | Integrated smart card UNIX authentication management system and method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW103106393A TW201533605A (en) | 2014-02-26 | 2014-02-26 | Integrated smart card UNIX authentication management system and method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW201533605A true TW201533605A (en) | 2015-09-01 |
Family
ID=54694791
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW103106393A TW201533605A (en) | 2014-02-26 | 2014-02-26 | Integrated smart card UNIX authentication management system and method |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TW201533605A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI793885B (en) * | 2020-12-28 | 2023-02-21 | 日商樂天集團股份有限公司 | Authentication system, authentication method, and program product |
| TWI796853B (en) * | 2020-12-28 | 2023-03-21 | 日商樂天集團股份有限公司 | Authentication system, authentication method, and program product |
-
2014
- 2014-02-26 TW TW103106393A patent/TW201533605A/en unknown
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI793885B (en) * | 2020-12-28 | 2023-02-21 | 日商樂天集團股份有限公司 | Authentication system, authentication method, and program product |
| TWI796853B (en) * | 2020-12-28 | 2023-03-21 | 日商樂天集團股份有限公司 | Authentication system, authentication method, and program product |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11223614B2 (en) | Single sign on with multiple authentication factors | |
| TWI667585B (en) | Method and device for safety authentication based on biological characteristics | |
| KR102689195B1 (en) | Method and device for realizing session identifier synchronization | |
| US10057763B2 (en) | Soft token system | |
| JP6117317B2 (en) | Non-repudiation method, settlement management server for this, and user terminal | |
| CN106462674B (en) | Resource access control using authentication tokens | |
| US20180082050A1 (en) | Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device | |
| JP6609788B1 (en) | Information communication device, authentication program for information communication device, and authentication method | |
| CN113474774A (en) | System and method for approving a new validator | |
| CN109005155B (en) | Identity authentication method and device | |
| CN103119975B (en) | User account recovers | |
| CN104718526A (en) | Secure mobile framework | |
| WO2019226115A1 (en) | Method and apparatus for user authentication | |
| JP7554197B2 (en) | One-click login procedure | |
| CN105100102A (en) | Authority configuration method and device as well as information configuration method and device | |
| JP2017152880A (en) | Authentication system, key processing linkage method, and key processing linkage program | |
| KR102012262B1 (en) | Key management method and fido authenticator software authenticator | |
| CN108768941B (en) | Method and device for remotely unlocking safety equipment | |
| US20140250499A1 (en) | Password based security method, systems and devices | |
| KR101996317B1 (en) | Block chain based user authentication system using authentication variable and method thereof | |
| KR20220167366A (en) | Cross authentication method and system between online service server and client | |
| CN104753886A (en) | Locking method for remote user, unlocking method and device | |
| KR102288445B1 (en) | On-boarding method, apparatus and program of authentication module for organization | |
| KR101651563B1 (en) | Using history-based authentication code management system and method thereof | |
| TW201533605A (en) | Integrated smart card UNIX authentication management system and method |