[go: up one dir, main page]

TW201533605A - Integrated smart card UNIX authentication management system and method - Google Patents

Integrated smart card UNIX authentication management system and method Download PDF

Info

Publication number
TW201533605A
TW201533605A TW103106393A TW103106393A TW201533605A TW 201533605 A TW201533605 A TW 201533605A TW 103106393 A TW103106393 A TW 103106393A TW 103106393 A TW103106393 A TW 103106393A TW 201533605 A TW201533605 A TW 201533605A
Authority
TW
Taiwan
Prior art keywords
authentication
user
smart card
password
unix
Prior art date
Application number
TW103106393A
Other languages
Chinese (zh)
Inventor
Shih-Jie Yen
Original Assignee
Chunghwa Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chunghwa Telecom Co Ltd filed Critical Chunghwa Telecom Co Ltd
Priority to TW103106393A priority Critical patent/TW201533605A/en
Publication of TW201533605A publication Critical patent/TW201533605A/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

This invention relates to an integrated smart card UNIX authentication management system and method, which mainly comprises a main control operation module that interacts with users, a kernel management module for processing account management and password management, and a client end agency module responsible for interpreting instructions and communicating with management server. Furthermore, for the open secure shell (Open SSH) commonly used by UNIX systems, an authentication management system based on smart cards is designed, wherein the coding and decoding verification of the smart card is used to perform identity authentication, in conjunction with the open secure shell (Open SSH) public key authentication method to perform identity authentication for login the UNIX system, thereby using the physical smart cards for authentication in an indirect way.

Description

整合式智慧卡UNIX認證管理系統與方法 Integrated smart card UNIX authentication management system and method

本發明係為一種UNIX認證管理系統與方法有關;具體而言,特別是關於一種以整合式智慧卡登入UNIX系統,並進行認證及管理之系統與方法,係動態產生一認證碼,以使用者之智慧卡之加密憑證加密後傳輸到使用者端,再以智慧卡解密並回傳至系統以驗證使用者之身分。再上傳並動態佈署用戶端以非對稱式密鑰演算法(Rivest Shamir Adleman,RSA)產生之公鑰至UNIX端,再以開源式安全殼套件(Open Secure Shell,OPENSSH)的公鑰認證方法(Public key Authentication)進行認證以登入UNIX系統。係以間接的方式達成利用實體智慧卡進行認證的方法。 The present invention relates to a UNIX authentication management system and method; in particular, a system and method for logging in to a UNIX system with an integrated smart card and performing authentication and management, dynamically generating an authentication code for the user The encrypted certificate of the smart card is encrypted and transmitted to the user end, and then decrypted by the smart card and transmitted back to the system to verify the identity of the user. Then upload and dynamically deploy the public key generated by the user's asymmetric key algorithm (Rivest Shamir Adleman, RSA) to the UNIX side, and then use the public key authentication method of Open Secure Shell (OPENSSH). (Public key Authentication) authenticates to log in to the UNIX system. Indirect ways to achieve authentication using physical smart cards.

於專利前案具有供用戶確認交易資料之一次性密碼認證方法(申請日期:2011/10/14,申請案號:100137295),係供用戶端將交易資料傳送至銀行端,令銀行端再將部分交易資料傳送至認證服務端以依據該部分交易資料產生用戶複核碼、銀行認證碼及交易認證碼,其中,用戶端會收到用戶複核 碼、銀行認證碼及部分交易資料,俾供用戶端在確認部分交易資料後,透過交易提供端將相關資料送回認證服務端進行認證,並在認證無誤後通知銀行端進行交易,最後,銀行端將交易結果傳送到用戶端以供用戶端再確認,以透過對交易資料之多次檢核,確保用戶交易之安全性。此外,透過交易資料所產生的一次性密碼可提供交易後不可否認性的依據。 In the pre-patent case, there is a one-time password authentication method for the user to confirm the transaction data (application date: 2011/10/14, application number: 100137295), which is for the client to transmit the transaction data to the bank, so that the bank will Part of the transaction data is transmitted to the authentication server to generate a user review code, a bank authentication code and a transaction authentication code according to the part of the transaction data, wherein the user terminal receives the user review. The code, the bank authentication code and part of the transaction data, after the client confirms part of the transaction data, send the relevant data back to the certification server for authentication through the transaction provider, and notify the bank to conduct the transaction after the authentication is correct, and finally, the bank The terminal transmits the transaction result to the client for re-confirmation by the client to ensure the security of the user transaction through multiple checks on the transaction data. In addition, a one-time password generated through transaction data provides a basis for non-repudiation after the transaction.

於專利前案視窗作業系統之多因子認證系統與登 入方法(申請日期:2006/10/27,申請案號:095139806),用於視窗Vista TM作業系統中客製化的系統登入與認證方法,在不影響使用者使用習慣下,於視窗Vista TM作業系統登入畫面上產生一多因子的認證視窗,使產生更安全與方便的登入方式,其中系統功能包括利用視窗登入程式(Winlogon.exe)建立視窗登入程序之視窗登入手段、由視窗登入程序呼叫登入使用者介面程式(LogonUI.exe)之登入使用者介面手段、利用憑證提供者(credential provider)管理使用者的認證手段、產生包括多因子認證視窗的視窗登入畫面之登入畫面顯示手段、產生多因子認證程序之多因子認證手段、對多因子認證程序產生的使用者識別資料與資料庫中的使用者資料進行比對的使用者身份比對手段、回填使用者識別碼/密碼的使用者識別碼/密碼回填手段,以及一訊息傳遞手段。此專利前案針對微軟Windows作業系統提出一種新的認證模型,使登入的畫面(LogonUI)與管理視窗登入程序的Winlogon程序直接溝通,視窗Vista TM作業系統係提供一種聯繫視窗登入畫面的憑證提供者(credential provider)模組,藉擷取使用者憑證(credential),並傳至Winlogon登入程序,進行系統登入。 Multi-factor authentication system and access to the pre-patent window operating system Entry method (application date: 2006/10/27, application number: 095139806), used for customized system login and authentication methods in Windows VistaTM operating system, without affecting user usage habits, in Windows Vista TM A multi-factor authentication window is generated on the operating system login screen, which results in a safer and more convenient login method. The system functions include using the Windows login program (Winlogon.exe) to create a Windows login program window login method, and the Windows login program calls. Log in to the user interface (LogonUI.exe) login user interface, use the credential provider to manage the user's authentication means, generate a login screen display means including a multi-factor authentication window, and generate more The multi-factor authentication method of the factor authentication program, the user identity comparison method for comparing the user identification data generated by the multi-factor authentication program with the user data in the database, and the user identification of the backfill user identifier/password Code/password backfilling means, as well as a means of message delivery. This patent proposal proposes a new authentication model for Microsoft Windows operating system, which enables the login screen (LogonUI) to communicate directly with the Winlogon program of the management window login program. The Windows VistaTM operating system provides a credential provider that contacts the window login screen. (credential provider) module, by taking the user credentials (credential), and passed to the Winlogon login program for system login.

傳統UNIX認證是透過帳號密碼驗證的方式來進行, 在資訊安全日益受到重視,各企業組織開始紛紛要求提高密碼長度與複雜度。但傳統的密碼都是交由使用者自行管理,密碼越長越複雜,對使用者而言就越難記憶,因此部分使用者會使用取巧之方式來設定符合複雜度規則但實質密碼強度低之密碼,如常見之「1qaz2wsx」,或者以紙筆記錄密碼等等。這些行為都讓高強度密碼的原則失去效果。因此,在資訊安全與使用者抗爭的衝突中,建構一個安全性足夠,又方便使用者操作的認證系統是比較可行的方案。 Traditional UNIX authentication is performed by means of account password verification. As information security is increasingly valued, organizations are beginning to demand increased password length and complexity. However, the traditional passwords are managed by the user. The longer the password is, the more complicated it is, and the harder it is for the user to remember. Therefore, some users will use the trick to set the complexity rule but the real password strength is low. Password, such as the common "1qaz2wsx", or record the password with a pen and paper. These behaviors make the principle of high-intensity passwords useless. Therefore, in the conflict between information security and user resistance, it is more feasible to construct an authentication system with sufficient security and user-friendly operation.

g10 code公司於2004年推出智慧卡片認證系統, 係以安全殼協定(Secure Shell,SSH)client直接與智慧卡內的RSA(Rivest Shamir Adleman)金鑰溝通,直接透過智慧卡片進行SSH公鑰認證(Public key Authentication),但其必須使用符合ISO 7816-4,-8之特製OpenPGP卡片才能應用此認證模式。 G10 code launched the smart card authentication system in 2004. The Secure Shell (SSH) client communicates directly with the RSA (Rivest Shamir Adleman) key in the smart card, and the SSH public key authentication is performed directly through the smart card, but it must be used in accordance with ISO 7816. -4,-8 special OpenPGP cards can apply this authentication mode.

由此可見,上述習用方式仍有所不足,,而亟待加以改良。 It can be seen that the above-mentioned conventional methods are still insufficient, and it needs to be improved.

本案發明人鑑於上述習用方式所欠缺的各項要素,乃亟思加以改良創新,並經多年苦心孤詣潛心研究後,終於成功研發完成本件發明。 In view of the various elements that are lacking in the above-mentioned conventional methods, the inventors of the present invention have improved and innovated, and after years of painstaking research, they finally succeeded in researching and developing this invention.

本發明係針對UNIX系統普遍使用的開源式安全客套件(Open Secure Shell,OPENSSH)設計了一種利用智慧卡為主之認證管理系統,係動態產生一認證碼,以使用者之智慧卡之加密憑證加密後傳輸到使用者端,再以智慧卡解密並回傳至系統以驗證使用者之身分。再上傳並動態佈署用戶端以非對稱 式密鑰演算法(Rivest Shamir Adleman,RSA)產生之公鑰至UNIX端,再以OPENSSH的公鑰認證方法(Public key Authentication)進行認證以登入UNIX系統。係以間接的方式達成利用實體智慧卡進行認證的方法。此方法可相容於包含自然人憑證等台灣常見之智慧卡片,不需使用特殊規格之智慧卡片。 The invention designs an authentication management system based on smart card for the open source security suite (OPENSSH) commonly used in UNIX systems, and dynamically generates an authentication code to encrypt the credentials of the user's smart card. After being encrypted, it is transmitted to the user end, and then decrypted by the smart card and transmitted back to the system to verify the identity of the user. Upload and dynamically deploy the client to be asymmetric The public key generated by the Rivest Shamir Adleman (RSA) is sent to the UNIX side, and then authenticated by the OPENSSH public key authentication method to log in to the UNIX system. Indirect ways to achieve authentication using physical smart cards. This method is compatible with smart cards commonly used in Taiwan, including natural person certificates, and does not require the use of smart cards of special specifications.

本系統將使用者來源位址分為高風險區與低風險 區,例如:以來源位址是否為信任區判別風險等級,根據風險給與差異化之認證層級。於高風險區本專利之認證模式將以提升系統安全性為目標,因此除了傳統認證模式外尚需搭配智慧卡認證模式。於低風險區時本系統將以提升操作便利為目標,是採用智慧卡認證為主。 The system divides the user source address into high risk area and low risk Zone, for example, whether the source address is the trust zone to discriminate the risk level, and the differentiated authentication level is given according to the risk. In the high-risk area, the patent's certification model will aim to improve system security. Therefore, in addition to the traditional authentication mode, it is necessary to match the smart card authentication mode. In the low-risk area, the system will aim at improving the convenience of operation, and it is mainly based on smart card authentication.

智慧卡認證乃是使用實體智慧卡片物件進行認證,但使用實體物件進行驗證就有遺失或忘了攜帶的可能,本發明在特殊情況下無法取得智慧卡時設計了幾種配套措施,共有下列四種認證模式: Smart card authentication is the use of physical smart card objects for authentication, but the use of physical objects for verification may be lost or forgotten to carry. The invention has several supporting measures when it is unable to obtain a smart card under special circumstances. Authentication mode:

1.智慧卡認證,以智慧卡之實體卡片進行認證程序,可加強資訊安全層級。 1. Smart card authentication, with the physical card of the smart card for the authentication process, can strengthen the information security level.

2.同僚佐證認證,未攜帶智慧卡時,可透過兩個同部門同僚之智慧卡片進行認證。 2. Co-certification certification, when not carrying a smart card, it can be authenticated through two smart cards of the same department.

3.主管授權認證,未攜帶智慧卡時,且工作環境無法進行同僚佐證時,可透過主管授權方式進行認證。 3. When the competent authority is certified, if the smart card is not carried, and the working environment cannot be accompanied by the same, the certification can be carried out through the competent authority.

臨時通行碼認證,未攜帶智慧卡時,若通過同僚佐證或主管授權認證後,可自訂一組臨時之通行碼,為短時間內需重複認證時簡化之認證程序。 Temporary passcode authentication. If you do not carry a smart card, you can customize a set of temporary passcodes after you have passed the certification of the peer or the authorization of the supervisor. This is a simplified authentication procedure that needs to be repeated for a short period of time.

本發明係為一種整合式智慧卡UNIX認證管理系統,其主要包括操作主控模組、核心管理模組以及客端代理模組。請參閱第1圖,第1圖為本發明之整合式智慧卡UNIX認證管理系統之架構圖。如第1圖所示,該操作主控模組103係為提供使用者105與後端互通之中介,並提供實際與列管伺服器進行溝通認證之操作平台。核心管理模組102為負責處理使用者之需求,並管理UNIX主機群資訊之主控台。客端代理模組101負責實際操作管理列管伺服器之代理平台,接收與轉譯系統管理之相關命令,執行並回報結果,達到跨平台之需求。 The invention is an integrated smart card UNIX authentication management system, which mainly comprises an operation main control module, a core management module and a client agent module. Please refer to FIG. 1. FIG. 1 is a structural diagram of an integrated smart card UNIX authentication management system according to the present invention. As shown in FIG. 1 , the operation main control module 103 is an intermediary for providing communication between the user 105 and the back end, and provides an operation platform for actually communicating and authenticating with the management server. The core management module 102 is a console that is responsible for processing the needs of the user and managing the information of the UNIX host group. The client agent module 101 is responsible for actually operating the agent platform of the management server, receiving commands related to the translation system management, executing and reporting the results, and achieving cross-platform requirements.

操作主控模組103更包含智慧卡、人機介面元件1031、智慧卡(IC)中介元件1032及SSH用戶端元件1033。其中,人機介面元件1031提供使用者105與核心管理模組102溝通之應用程式,提供UNIX主機群104列表,以供使用者105選擇連線UNIX主機之介面。接著,智慧卡(IC)中介元件1032負責與智慧卡溝通之中介元件。然後,SSH用戶端元件1033負責實作安全殼協定(Secure shell,SSH)並與UNIX主機群溝通,依人機介面元件所選之UNIX主機為使用者連線,並進行登入認證與遠端操作之終端機應用程式。 The operation main control module 103 further includes a smart card, a human interface component 1031, a smart card (IC) mediation component 1032, and an SSH client component 1033. The human interface component 1031 provides an application for the user 105 to communicate with the core management module 102, and provides a list of UNIX host groups 104 for the user 105 to select an interface for connecting to the UNIX host. Next, the smart card (IC) mediation component 1032 is responsible for communicating with the smart card. Then, the SSH client component 1033 is responsible for implementing the Secure Shell (SSH) and communicating with the UNIX host group, and connecting the UNIX host selected by the human interface component to the user for login authentication and remote operation. Terminal application.

核心管理模組102更包含管理資料庫1021、帳號管理元件1022、通行碼管理元件1023及排程管理元件1024。其中,管理資料庫1021儲存使用者資訊與UNIX主機群資料之資料庫,而個人資料檔為設定使用者之個人基本資料。使用者資訊可分為個人資料檔及帳號權限檔。帳號權限檔為設定使用者可使用之權限,做為判定使用者來源位址之風險等級、以及登入系統帳號與時點之適當性的依據。接著,帳號管理元件1022提供進行UNIX主機群之帳號權限的新增/異動/刪除,並 與客端代理模組溝通以進行帳號權限佈署,由管理資料庫讀取個人資料檔與帳號權限檔,並呼叫客端代理模組的命令轉譯元件,將個人資料檔與帳號權限檔之資訊轉譯為該UNIX主機作業系統之合法指令,以進行帳號權限佈署。然後,通行碼管理元件1023依據密碼原則產生亂數密碼與金鑰之元件,並與客端代理模組溝通進行通行碼佈署。最後,排程管理元件1024定期驅動通行碼管理元件進行密碼與金鑰更新之元件,另提供臨時通行碼認證及動態密碼認證之排程需求。 The core management module 102 further includes a management database 1021, an account management component 1022, a passcode management component 1023, and a schedule management component 1024. The management database 1021 stores a database of user information and UNIX host group data, and the personal data file is a personal basic data of the user. User information can be divided into personal data files and account permission files. The account permission file is used to set the user's available permissions, as the basis for determining the risk level of the user's source address and the appropriateness of logging in to the system account and time. Next, the account management component 1022 provides new/transfer/delete of the account authority for the UNIX host group, and Communicate with the client agent module to deploy the account rights, read the personal data file and the account permission file from the management database, and call the command translation component of the client agent module, and the information of the personal data file and the account permission file. Translated into the legal instructions of the UNIX host operating system for account rights deployment. Then, the passcode management component 1023 generates the components of the random number password and the key according to the cryptographic principle, and communicates with the client proxy module to perform the pass code deployment. Finally, the schedule management component 1024 periodically drives the passcode management component to perform the cryptographic and key update components, as well as the scheduling requirements for temporary passcode authentication and dynamic password authentication.

其中,個人資料檔為設定使用者之個人基本資料,可係為申請之帳號代碼、電子郵件信箱位址、行動電話號碼、主管電子郵件信箱位址、主管行動電話位址或部門代號。接著,帳號權限檔為設定使用者可使用之權限,做為判定使用者來源位址之風險等級、以及登入系統帳號與時點之適當性的依據,可係為: The personal data file is a personal basic data of the user, and may be an application account code, an email address, a mobile phone number, a competent email address, a competent mobile phone address, or a department code. Then, the account permission file is a setting for the user to use the permission, as the basis for determining the risk level of the user source address and the appropriateness of the login system account and the time point, which can be:

(1)可信任之工作區域,視系統環境需求可以IP、子網路或其他可辨識之網路位址表示之。 (1) A trusted work area, which can be represented by IP, subnet or other identifiable network address depending on the needs of the system environment.

(2)可登入之系統別與帳號代碼。 (2) The system and account code that can be logged in.

(3)可登入該系統之時間限制。 (3) The time limit for logging into the system.

客端代理模組101操作管理列管伺服器之代理平台,負責接收與轉譯系統管理之相關命令,執行並回報結果,達到跨平台之需求。其中,更包含公鑰管理元件1011、命令轉譯元件1012及鏈結通訊元件1013。其中,公鑰管理元件1011管理UNIX主機之信任公鑰,並根據需求增刪信任公鑰。接著,鏈結通訊元件1013與核心管理模組102鏈結溝通之元件,處理資料傳輸與命令接收之需求。然後,命令轉譯元件1012根 據所在UNIX主機,將核心管理模組之需求轉換為適當之指令,以及不同資料格式轉換為標準化文件之元件。 The client agent module 101 operates and manages the proxy platform of the server, and is responsible for receiving and translating the commands related to the translation system management, and executing and reporting the results to meet the requirements of cross-platform. The public key management component 1011, the command translation component 1012, and the link communication component 1013 are further included. The public key management component 1011 manages the trusted public key of the UNIX host, and adds or deletes the trusted public key according to requirements. Then, the link communication component 1013 and the core management module 102 link the components to handle the data transmission and command reception requirements. Then, command the translation component 1012 According to the UNIX host, the requirements of the core management module are converted into appropriate instructions, and the different data formats are converted into components of standardized files.

本發明之整合式智慧卡UNIX認證管理方法,其主 要為使用者登入操作主控模組,系統將檢查使用者登入區域之風險等級,若為可信任之工作區域則為低風險,反之則為高風險;經登入區域風險判斷後,將再檢查智慧卡狀態與驗證卡片用戶個人識別號碼(Personal Identification Number code,pin code)。在啟動操作主控模組,先檢查使用者登入區域之風險等級及檢查智慧卡片是否存在,進行認證模式選擇程序。 The integrated smart card UNIX authentication management method of the present invention is mainly To log in to the user control module, the system will check the risk level of the user's login area. If it is a trusted work area, it is low risk, otherwise it is high risk; after the login area risk judgment, it will be checked again. Smart card status and verification card user identification number (Personal Identification Number code, pin code). After starting the operation main control module, first check the risk level of the user login area and check whether the smart card exists, and perform the authentication mode selection process.

(1)若為高風險者: (1) If it is a high risk:

A.若智慧卡存在,且使用者為卡片擁有者採行『智慧卡認證』,再進行動態密碼認證,方屬認證完成。 A. If the smart card exists, and the user adopts the "smart card authentication" for the card owner, and then performs dynamic password authentication, the authentication is completed.

B.若智慧卡存在,但使用者非卡片擁有者採行『同僚佐證認證』,再進行動態密碼認證,方屬認證完成。 B. If the smart card exists, but the user is not the card owner to adopt the "same certification certification", and then the dynamic password authentication, the party certification is completed.

C.若智慧卡不存在,但存在有效之暫時RSA金鑰採行『臨時通行碼認證』,再進行動態密碼認證,方屬認證完成。 C. If the smart card does not exist, but there is a valid temporary RSA key, the "temporary pass code authentication" is adopted, and then the dynamic password authentication is performed, and the authentication is completed.

D.若智慧卡不存在,且不存在有效之暫時RSA金鑰採行『主管授權認證』,再進行動態密碼認證,方屬認證完成。 D. If the smart card does not exist, and there is no valid temporary RSA key to adopt the “supervisor certification”, then the dynamic password authentication is performed, and the authentication is completed.

(2)若為低風險者: (2) If it is a low risk person:

A.若智慧卡存在,且使用者為卡片擁有者採行『智慧卡認證』,即可認證完成。 A. If the smart card exists and the user adopts the "smart card authentication" for the card owner, the authentication can be completed.

B.若智慧卡存在,但使用者非卡片擁有者採行『同僚佐證認證』,即可認證完成。 B. If the smart card exists, but the user non-card owner adopts the “same certification certification”, the authentication can be completed.

C.若智慧卡不存在,但存在有效之暫時RSA金鑰採行『臨時通行碼認證』,即可認證完成。 C. If the smart card does not exist, but there is a valid temporary RSA key to adopt "temporary pass code authentication", the certification can be completed.

D.若智慧卡不存在,且不存在有效之暫時RSA金鑰採行『主管授權認證』,即可認證完成。 D. If the smart card does not exist and there is no valid temporary RSA key to adopt the “supervisor certification”, the certification can be completed.

請參閱第2圖,第2圖為本發明之整合式智慧卡UNIX認證管理方法之流程圖。如第2圖所示,其方法步驟可包括: Please refer to FIG. 2, which is a flow chart of the integrated authentication method for the smart card UNIX authentication according to the present invention. As shown in Figure 2, the method steps can include:

S210針對使用者登入IP進行風險分類,判斷是否加強認證控管。認證模式選擇程序,系統需根據智慧卡片狀態決定認證模式。 S210 classifies the risk of the user's login IP and determines whether to strengthen the authentication control. The authentication mode selection procedure, the system needs to determine the authentication mode according to the smart card status.

S220智慧卡認證模式,在預設情況下使用者應使用智慧卡登入系統,透過實體智慧卡片的保護,達到強化資安的目的。 In the S220 smart card authentication mode, the user should use the smart card to log in to the system under the preset conditions, and the protection of the physical smart card can be used to enhance the security.

S230同僚佐證認證模式,使用者在特殊情況下無法取得智慧卡時,可透過兩個相同部門之同僚的智慧卡進行認證,以取得臨時通行碼。 The S230 is accompanied by the certification mode. When the user cannot obtain the smart card under special circumstances, the user can authenticate with the same smart card of the same department to obtain the temporary access code.

S240臨時通行碼認證模式,當使用者透過同僚認證或主管授權認證後,可自訂一組臨時密碼,利用臨時通行碼認證的方式,簡化通行碼有效期間內認證的流程。 S240 temporary passcode authentication mode, when the user passes the peer authentication or the supervisor authorization authentication, the user can customize a set of temporary passwords and use the temporary passcode authentication method to simplify the authentication process during the valid period of the passcode.

S250主管授權認證模式,透過主管授權方式進行認證時,系統將會發送授權碼給主管,使用者必須經主管同意並取得授權碼。 The S250 is in charge of the authorization authentication mode. When the authentication is performed by the supervisor authorization method, the system will send an authorization code to the supervisor, and the user must obtain the authorization code and obtain the authorization code.

S260判斷是否加強認證控管。 S260 determines whether to strengthen the authentication control.

S270動態密碼認證程序,由於密碼交由系統進行管理,因此 使用者需要密碼時必須線上申請密碼。 S270 dynamic password authentication program, because the password is managed by the system, Users must apply for a password online when they need a password.

S280通行碼更新程序,係為在不夠安全的外在環境,密碼難免會有外流的情況,若有足夠之時間,任何演算法都有遭到破解之可能性。為了降低密碼外流或金鑰遭到破解之威脅性,通行碼必須定期更新是普遍宣導的策略。由於本發明將通行碼管理之權責交由系統管理,排除人的因素影響,因此可視現場環境之資訊安全強度需求,縮短通行碼更新時間。 The S280 passcode update program is a situation in which the password is inevitably outflowed in an environment that is not secure enough. If there is enough time, any algorithm may be cracked. In order to reduce the threat of password outflow or key cracking, it is a common propaganda strategy that the passcode must be updated regularly. Since the invention administers the rights and responsibilities of the pass code management to the system management and excludes the influence of human factors, the information security strength requirement of the on-site environment can be visually shortened, and the transit code update time is shortened.

請參閱第3圖,第3圖為本發明之整合式智慧卡UNIX認證管理方法之認證模式選擇程序之流程圖。如第3圖所示,認證模式選擇程序更可包含下列步驟: Please refer to FIG. 3, which is a flow chart of the authentication mode selection procedure of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 3, the authentication mode selection program can further include the following steps:

S21001依據登入IP風險分類,判別是否需加強認證控管。依據IP之位置將權限依IP風險進行設定。 Based on the login IP risk classification, S21001 determines whether authentication control needs to be strengthened. The permissions are set according to the IP risk based on the location of the IP.

S21002判別卡片是否仍存在,若是,進行S21006智慧卡用戶個人識別號碼(Personal Identification Number code,pin code)驗證;若否,進行S21003是否為有效之暫時RSA金鑰。 S21002 determines whether the card still exists. If yes, perform S21006 smart card user identification number (Personal Identification Number code, pin code) verification; if not, perform S21003 whether it is a valid temporary RSA key.

S21003判斷是否為有效之暫時RSA金鑰,若是,進行S21004認證模式設定;若否,進行其他認證模式設定。 S21003 determines whether it is a valid temporary RSA key, and if so, performs S21004 authentication mode setting; if not, performs other authentication mode setting.

S21004依據S21003判斷認證模式設定,於實際運用中可為臨時通行碼認證等。 S21004 determines the authentication mode setting according to S21003, and can be temporary passcode authentication in actual operation.

S21005依據S21003判斷為其他認證模式設定,於實際運用中可為主管授權認證等。 S21005 is judged to be set to other authentication modes according to S21003, and may be authorized for authentication in actual use.

S21006智慧卡驗證用戶個人識別號碼(Personal Identification Number code,pin code);若是,進行S21007查詢卡片是否有登入紀錄;若否,重回S21002步驟。 S21006 smart card verification user personal identification number (Personal Identification Number code, pin code); If yes, check if the S21007 query card has a login record; if not, return to step S21002.

S21007查詢智慧卡是否有登錄過之資料紀錄,若是,進行S21008判斷智慧卡擁有者與使用者是否相符;若否,進行S21009上傳智慧卡加密憑證。 S21007 queries whether the smart card has a recorded data record. If yes, S21008 determines whether the smart card owner matches the user; if not, performs S21009 to upload the smart card encryption credential.

S21008判斷智慧卡擁有者與使用者是否相符,若是,進行S21010設定智慧卡認證模式;若否,進行S21011設定智慧卡其他認證模式。 S21008 determines whether the smart card owner matches the user, and if so, performs S21010 to set the smart card authentication mode; if not, performs S21011 to set the smart card other authentication mode.

S21009上傳智慧卡加密憑證,接著,並執行S21008判斷智慧卡擁有者與使用者是否相符。 S21009 uploads the smart card encryption credential, and then executes S21008 to determine whether the smart card owner matches the user.

S21010設定智慧卡認證模式,於實際運用中可為智慧卡認證等。 S21010 sets the smart card authentication mode, which can be used for smart card authentication in actual use.

S21011設定智慧卡其他認證模式,於實際運用中可為同僚佐證認證等。 S21011 sets the other authentication mode of the smart card, and in the actual application, it can be the same as the certification.

請參閱第4圖,第4圖為本發明之整合式智慧卡UNIX認證管理方法之智慧卡認證之流程圖。如第4圖所示,智慧卡認證可包含下列步驟: Please refer to FIG. 4, which is a flow chart of the smart card authentication of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 4, smart card authentication can include the following steps:

S22001產生認證碼,以使用者加密憑證加密並傳送至使用者端。 S22001 generates an authentication code, which is encrypted by the user encrypted credential and transmitted to the user end.

S22002接收使用者輸入之用戶個人識別號碼(Personal Identification Number code,pin code),以智慧卡解密並回傳認證碼。 S22002 receives the user identification number (Personal Identification Number code, pin code) input by the user, decrypts the smart card and returns the authentication code.

S22003回傳認證碼確認是否相符,若是,進行S2204顯示UNIX主機列表;若否,結束。 S22003 returns the authentication code to confirm whether it matches. If yes, S2204 displays the list of UNIX hosts; if not, it ends.

S22004接收管理資料庫之資料並顯示UNIX主機列表。 S22004 receives the data of the management database and displays a list of UNIX hosts.

S22005判斷連線之UNIX主機進行連線。 S22005 determines the connection of the UNIX host to connect.

S22006判斷客戶端是否存在認證金鑰檔,若是,進行S22009使用智慧卡解密認證用私鑰與公鑰;若否,進行S22007產生配對認證用之公私鑰。 S22006 determines whether the client has a certificate key file, and if so, performs a smart card decryption authentication private key and a public key in S22009; if not, performs a public-private key for pair authentication in S22007.

S22007產生配對認證用之公私鑰,同時進行S22008使用智慧卡加密認證私鑰,並存放於用戶端,以及S22011上傳認證公鑰。 S22007 generates the public and private keys for pairing authentication. At the same time, S22008 uses the smart card encryption authentication private key and stores it on the user side, and S22011 uploads the authentication public key.

S22008使用智慧卡加密認證私鑰,並存放於用戶端。 S22008 uses a smart card to encrypt the private key and store it on the client.

S22009使用智慧卡解密認證用私鑰與公鑰,進行S22010判斷認證用私鑰與公鑰是否相符。 S22009 uses the smart card to decrypt the authentication private key and the public key, and performs S22010 to determine whether the authentication private key matches the public key.

S22010判斷認證用私鑰與公鑰是否相符,若是,進行S22013啟動SSH Client連線至伺服器;若否,進行S22007產生配對認證用之公私鑰。 S22010 determines whether the authentication private key matches the public key. If yes, the S22013 starts the SSH client connection to the server; if not, the S22007 generates the public and private key for pairing authentication.

S22011上傳認證公鑰,接著,進行S22012將認證公鑰佈署至連線之UNIX伺服器。 S22011 uploads the authentication public key, and then performs S22012 to deploy the authentication public key to the connected UNIX server.

S22012將認證公鑰佈署至連線之UNIX伺服器,該UNIX伺服器之選擇可為使用者申請為主。接著,進行S22013啟動SSH Client連線至伺服器。 S22012 deploys the certified public key to the connected UNIX server. The choice of the UNIX server can be applied for the user. Next, start S22013 to start the SSH Client connection to the server.

S22013啟動SSH Client連線至伺服器。 S22013 starts the SSH client connection to the server.

S22014利用RSA私鑰進行SSH公鑰認證。 S22014 uses the RSA private key for SSH public key authentication.

請參閱第5圖,第5圖為本發明之整合式智慧卡UNIX認證管理方法之同僚佐證認證之流程圖。如第5圖所示, 同僚佐證認證可包含下列步驟: Please refer to FIG. 5, which is a flow chart of the same as the certification certification of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 5, Peer certification can include the following steps:

S23001同僚認證程序。 S23001 peer certification program.

S23002接收同僚之智慧卡認證並接收用戶個人識別號碼(Personal Identification Number code,pin code)。 S23002 receives the smart card authentication of the peer and receives the personal identification number code (pin code).

S23003是否抽換智慧卡,若是,進行S23004用戶個人識別號碼(Personal Identification Number code,pin code)驗證;若否,重回S23002。 S23003 Whether to replace the smart card, if yes, perform S23004 Personal Identification Number code (pin code) verification; if not, return to S23002.

S23004是否用戶個人識別號碼(Personal Identification Number code,pin code)驗證通過,若是,進行S23005判斷智慧卡擁有者與使用者是否為同部門;若否,重回S23003。 S23004: If the user identification number (Personal Identification Number code, pin code) is verified, if yes, S23005 determines whether the smart card owner and the user are in the same department; if not, return to S23003.

S23005判斷智慧卡擁有者與使用者是否為同部門,若是,進行23006產生臨時通行碼;若否,重回S23002。 S23005 determines whether the smart card owner and the user are in the same department. If yes, the 23006 generates a temporary pass code; if not, returns to S23002.

S23006產生臨時通行碼,於實際運用時可接收使用者之資料輸入而產生臨時通行碼。 S23006 generates a temporary pass code, which can receive the data input of the user during actual use to generate a temporary pass code.

S23007以臨時通行碼為通行碼(passphrase),產生配對之認證金鑰,並儲存於本機端。 S23007 uses the temporary pass code as the passphrase to generate the paired authentication key and store it on the local end.

S23008上傳認證公鑰。 S23008 uploads the authentication public key.

S23009下載並顯示伺服器列表。 S23009 downloads and displays the server list.

S23010接收資料,並依資料選擇連線之伺服器。於實際運用時可接收使用者輸入之資料。 S23010 receives the data and selects the connected server according to the data. The data input by the user can be received in actual use.

S23011將認證公鑰佈署至連線之伺服器並同時進行下列步驟。 S23011 deploys the authentication public key to the connected server and performs the following steps at the same time.

S23012以臨時通行碼為通行碼(passphrase),搭配RSA私鑰進行SSH公鑰認證。 S23012 uses the temporary pass code as the passphrase and uses the RSA private key for SSH public key authentication.

S23013設定排程元件並移除該筆認證公鑰。 S23013 sets the scheduling component and removes the authentication public key.

請參閱第6圖,第6圖為本發明之整合式智慧卡UNIX認證管理方法之臨時通行碼認證之流程圖。如第6圖所示,臨時通行碼認證程序可包含下列步驟: Please refer to FIG. 6. FIG. 6 is a flow chart of the temporary passcode authentication of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 6, the temporary passcode authentication procedure can include the following steps:

S24001臨時通行碼認證程序。 S24001 temporary passcode authentication procedure.

S24002判斷畚箕是否存在臨時通行碼,若是,進行S24004接收臨時通行碼;若否,進入其他認證模式流程。 S24002 determines whether there is a temporary pass code, and if so, performs a temporary pass code on S24004; if not, enters another authentication mode process.

S24003進入其他認證模式流程,於實際運用時可為主管授權認證流程等。 S24003 enters other authentication mode processes, and can be used to authorize the authentication process in actual use.

S24004接收臨時通行碼,可由使用者端接收資料,輸入該臨時通行碼。 S24004 receives the temporary pass code, and the user can receive the data and input the temporary pass code.

S24005以臨時通行碼為通行碼(passphrase),使用臨時認證金鑰驗證並判斷通行碼是否符合。 The S24005 uses the temporary pass code as the passphrase and uses the temporary authentication key to verify and determine whether the pass code matches.

S24006通行碼是否正確,若是,進行S24007下載並顯示連線伺服器;若否,結束。 If the S24006 passcode is correct, if yes, download S24007 and display the connection server; if not, end.

S24007下載並顯示連線伺服器。 S24007 downloads and displays the connection server.

S24008接收使用者端之資料,選擇連線之伺服器。 S24008 receives the data of the user terminal and selects the connected server.

S24009將認證公鑰佈署至連線之伺服器,同時進行下列步驟。 S24009 deploys the authentication public key to the connected server and performs the following steps.

S24010以臨時通行碼為通行碼(passphrase),搭配RSA私鑰進行SSH公鑰認證。 The S24010 uses the temporary pass code as the passphrase and uses the RSA private key for SSH public key authentication.

S24011設定排程元件並移除該筆認證公鑰。 S24011 sets the scheduling component and removes the authentication public key.

請參閱第7圖,第7圖為本發明之整合式智慧卡UNIX認證管理方法之主管授權認證之流程圖。如第7圖所示,主管授權認證可包含下列步驟: Please refer to FIG. 7. FIG. 7 is a flow chart of the main authority authorization authentication of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 7, the supervisory certification can include the following steps:

S25001主管授權認證程序。 S25001 is responsible for the authorization certification process.

S25002產生主管授權碼。 S25002 generates the supervisor authorization code.

S25003傳送主管授權碼與使用者資訊至主管行動裝置。 S25003 transmits the supervisor authorization code and user information to the competent mobile device.

S25004使用者透過主管接收該授權碼,並傳送該授權碼至本系統進行認證。 The user of S25004 receives the authorization code through the supervisor and transmits the authorization code to the system for authentication.

S25005判斷該授權碼是否有效及正確,若是,進行S25006變更臨時通行碼;若否,重回S25002。 S25005 determines whether the authorization code is valid and correct. If yes, perform S25006 to change the temporary password; if not, return to S25002.

S25006接收使用者之新臨時通行碼。 S25006 receives the user's new temporary passcode.

S25007以此新臨時通行碼為通行碼(passphrase),產生配對之認證金鑰,儲存於本機端。 S25007 uses this new temporary pass code as a passphrase to generate a paired authentication key, which is stored on the local end.

S25008上傳認證公鑰。 S25008 uploads the authentication public key.

S25009下載並顯示伺服器列表。 S25009 downloads and displays the server list.

S25010依據使用者之資料連線至伺服器。 The S25010 connects to the server based on the user's data.

S25011將認證公鑰佈署至連線伺服器,同時進行下列步驟。 The S25011 deploys the authentication public key to the connection server and performs the following steps.

S25012以臨時通行碼為通行碼(passphrase),搭配RSA私鑰進行SSH公鑰認證。 The S25012 uses the temporary pass code as the passphrase and uses the RSA private key for SSH public key authentication.

S25013設定排程元件並移除該筆認證公鑰。 S25013 sets the scheduling component and removes the authentication public key.

請參閱第8圖,第8圖為本發明之整合式智慧卡 UNIX認證管理方法之申請動態密碼之流程圖。如第8圖所示,由於密碼交由系統進行管理,因此使用者需要密碼時必須線上申請密碼。其中,可包含下列步驟: Please refer to FIG. 8. FIG. 8 is an integrated smart card of the present invention. Flowchart of the application dynamic password for the UNIX certification management method. As shown in Figure 8, since the password is managed by the system, the user must apply for a password online when the password is required. Among them, the following steps can be included:

S27101申請動態密碼。 S27101 applies for a dynamic password.

S27102是否有動態密碼申請程序尚未逾期,若是,進行S27104發送動態密碼申請通知至使用者主管;若否,進行S27103提示該動態密碼正受理申請中。 S27102 Whether the dynamic password application procedure has not expired, if yes, S27104 sends a dynamic password application notification to the user supervisor; if not, S27103 prompts the dynamic password to be accepted.

S27103提示該動態密碼正受理申請中。 S27103 indicates that the dynamic password is being accepted in the application.

S27104發送動態密碼申請通知至使用者主管。 S27104 sends a dynamic password application notification to the user supervisor.

S27105發送動態密碼至使用者行動裝置,同時進行下列步驟。 The S27105 sends a dynamic password to the user's mobile device while performing the following steps.

S27106重新產生密碼,並進入密碼佈署流程。 The S27106 regenerates the password and enters the password deployment process.

S27107接收使用者密碼 S27107 receives the user password

S27108判斷密碼是否正確,若是,進行S27109登入UNIX系統;若否,重回S27107重新輸入密碼或結束。 S27108 determines whether the password is correct. If yes, perform S27109 to log in to the UNIX system; if not, return to S27107 to re-enter the password or end.

S27109若密碼正確,則登入UNIX系統。 S27109 If the password is correct, log in to the UNIX system.

請參閱第9圖,第9圖為本發明之整合式智慧卡UNIX認證管理方法之通行碼更新之流程圖。如第9圖所示,在不夠安全的外在環境,密碼難免會有外流的情況,若有足夠之時間,任何演算法都有遭到破解之可能性。為了降低密碼外流或金鑰遭到破解之威脅性,通行碼必須定期更新是普遍宣導的策略。由於本發明將通行碼管理之權責交由系統管理,排除人的因素影響,因此可視現場環境之資訊安全強度需求,縮短 通行碼更新時間。其中,可包含下列步驟: Please refer to FIG. 9. FIG. 9 is a flow chart of the update of the pass code of the integrated smart card UNIX authentication management method of the present invention. As shown in Figure 9, in an external environment that is not secure enough, passwords will inevitably have an outflow. If there is enough time, any algorithm may be cracked. In order to reduce the threat of password outflow or key cracking, it is a common propaganda strategy that the passcode must be updated regularly. Since the present invention transfers the rights and responsibilities of the pass code management to the system management and excludes the influence of human factors, the information security strength requirement of the on-site environment can be shortened. Passcode update time. Among them, the following steps can be included:

S27201通行碼定期更新。 The S27201 pass code is updated regularly.

S27202讀取所有列管伺服器之帳號列表與對應之使用者加密憑證。 S27202 reads the account list of all the tube server and the corresponding user encryption certificate.

S27203批次處理通行碼更新作業。 The S27203 batch processes the passcode update job.

S27204移除逾期信任公鑰。 S27204 removes the overdue trust public key.

S27205是否成功移除逾期信任公鑰,若是,進行S27206標記信任公鑰移除時間;若否,進行S27207通知管理員逾時公鑰移除異常。 Whether the S27205 successfully removes the overdue trust public key. If yes, the S27206 marks the trusted public key removal time; if not, the S27207 notifies the administrator of the timeout public key removal exception.

S27206標記信任公鑰移除時間,並儲存於資料庫。 The S27206 flag trusts the public key removal time and stores it in the database.

S27207通知管理員逾時公鑰移除異常。 S27207 notifies the administrator of the timeout public key removal exception.

S27208產生亂數密碼。 S27208 generates a random number password.

S27209將亂數之密碼設定至對應之列管主機。 S27209 sets the password of the random number to the corresponding host.

S27210判斷密碼設定是否成功,若是,重回S27203批次處理通行碼更新作業;若否,進行S27211通知管理者密碼更新失敗。 S27210 determines whether the password setting is successful, and if so, returns to the S27203 batch processing pass code update operation; if not, performs S27211 to notify the administrator that the password update fails.

S27211通知管理者密碼更新失敗,並重回S27203批次處理通行碼更新作業。 S27211 notifies the administrator that the password update has failed, and returns to the S27203 batch processing passcode update operation.

本發明所提供之技術特徵,與其他習用技術相互比較時,更具備下列優點: The technical features provided by the present invention have the following advantages when compared with other conventional technologies:

1.提出智慧卡認證UNIX系統模式。傳統認證方式多仰賴使用者自行保管帳號密碼,若使用者遺忘密碼或者輸入錯誤密碼次數過多,則帳號將被鎖定而無法使用。本發明之特 點在於使用智慧卡來加強或取代密碼認證之方法。智慧卡認證方法可用在簡化登入程序,或強化認證安全性。若用來簡化登入程序,則使用者使需插入智慧卡並輸入用戶個人識別號碼(Personal Identification Number code,pin code)即可登入系統,可避免因密碼輸入錯誤造成的帳號鎖定無法登入之問題。若用來強化認證安全性,則使用者輸入智慧卡並輸入用戶個人識別號碼(Personal Identification Number code,pin code)後,仍需進行帳號密碼認證,可提升資訊安全之層級。 1. Propose a smart card authentication UNIX system mode. The traditional authentication method relies on the user to keep the account password. If the user forgets the password or enters the wrong password too many times, the account will be locked and cannot be used. Special feature of the invention The point is to use smart cards to enhance or replace the method of password authentication. Smart card authentication methods can be used to simplify the login process or to enhance authentication security. If it is used to simplify the login process, the user can insert the smart card and input the user identification number (Personal Identification Number code, pin code) to log in to the system, so as to avoid the problem that the account lock cannot be logged in due to the password input error. If the authentication security is used, the user still needs to perform account password authentication after inputting the smart card and inputting the personal identification number code (pin code), which can improve the level of information security.

2.不需使用特殊規格之智慧卡片。本發明係針對UNIX系統普遍使用的OPENSSH套件設計了一種利用智慧卡為主之認證管理系統,係動態產生一認證碼,以使用者之智慧卡之加密憑證加密後傳輸到使用者端,再以智慧卡解密並回傳至系統以驗證使用者之身分。並亂數產生RSA公鑰,動態佈署至UNIX端,使用者再以SSH公鑰認證方法進行認證以登入UNIX系統。係以間接的方式達成利用實體智慧卡進行認證的方法,此方法可相容於包含自然人憑證等台灣常見之智慧卡片,不需使用特殊規格之智慧卡片。 2. No need to use smart cards with special specifications. The invention designs an authentication management system based on the popular card of the OPENSSH suite commonly used in UNIX systems, dynamically generates an authentication code, encrypts the encrypted certificate of the user's smart card, and transmits it to the user end, and then transmits The smart card is decrypted and passed back to the system to verify the identity of the user. And the random number generates the RSA public key, dynamically deployed to the UNIX end, and the user authenticates by SSH public key authentication method to log in to the UNIX system. Indirect way to achieve the use of physical smart card for authentication, this method can be compatible with Taiwan's common smart cards including natural person credentials, without the need for special specifications of smart cards.

3.以系統管理密碼代替人工管理密碼。現有密碼管理方法仰賴使用者自行管理,為求方便使用者往往使用符合密碼規則,但實質密碼強度低之密碼。本系統設計密碼由系統管理,系統將定時變更並產生亂數密碼。使用者需要密碼時必須上線申請,系統將透過簡訊與電子郵件方式告知使用者最新密碼。由於不需使用者記憶,故可使用較長之密碼長度。 3. Replace the manual management password with the system management password. The existing password management method relies on the user's own management. For the convenience of the user, the password that meets the password rule but has a low physical strength is often used. The system design password is managed by the system, and the system will change periodically and generate random passwords. Users must apply online when they need a password. The system will inform users of the latest password through SMS and email. A longer password length can be used since no user memory is required.

4.硬體防護加上密碼防護,三重認證防護模式。傳統密碼認 證只要帳號與密碼正確即可登入系統,若遭到側錄或密碼外流之情況則有遭到非法登入的疑慮。本系統除傳統密碼認證方法外,另外增加智慧卡與用戶個人識別號碼(Personal Identification Number code,pin code)認證流程。即使遭到監聽側錄,帳號密碼、甚至用戶個人識別號碼(Personal Identification Number code,pin code)外流,只要實體智慧卡本身不要遭竊,有心人士亦無法登入系統。 4. Hardware protection plus password protection, triple authentication protection mode. Traditional password recognition As long as the account number and password are correct, you can log in to the system. If you are subject to side recording or password outflow, you will be suspected of illegal login. In addition to the traditional password authentication method, the system adds a smart card and a personal identification number code (pin code) authentication process. Even if it is monitored, the account password and even the Personal Identification Number code (pin code) are outflowed. As long as the physical smart card itself is not stolen, people who are interested can not log in to the system.

100‧‧‧整合式智慧卡UNIX認證管理系統 100‧‧‧Integrated Smart Card UNIX Authentication Management System

101‧‧‧客端代理模組 101‧‧‧Client Agent Module

1011‧‧‧公鑰管理元件 1011‧‧‧ Public Key Management Components

1012‧‧‧命令轉譯元件 1012‧‧‧Command translation component

1013‧‧‧鏈結通訊元件 1013‧‧‧ Link communication components

102‧‧‧核心管理模組 102‧‧‧Core Management Module

1021‧‧‧管理資料庫 1021‧‧‧Management database

1022‧‧‧帳號管理元件 1022‧‧‧ Account Management Components

1023‧‧‧通行碼管理元件 1023‧‧‧pass code management component

1024‧‧‧排程管理元件 1024‧‧‧ Schedule Management Components

103‧‧‧操作主控模組 103‧‧‧Operation master module

1031‧‧‧人機介面元件 1031‧‧‧Human Machine Interface Components

1032‧‧‧智慧IC卡中介元件 1032‧‧‧Smart IC card intermediary components

1033‧‧‧SSH用戶端元件 1033‧‧‧SSH client component

104‧‧‧UNIX主機群 104‧‧‧UNIX host group

105‧‧‧使用者 105‧‧‧Users

S210~S280‧‧‧整合式智慧卡UNIX認證管理方法 S210~S280‧‧‧Integrated smart card UNIX authentication management method

S21001~S21011‧‧‧認證模式選擇程序之流程步驟 S21001~S21011‧‧‧Procedure mode selection procedure

S22001~S22014‧‧‧智慧卡認證之流程步驟 S22001~S22014‧‧‧Smart Card Certification Process Steps

S23001~S23013‧‧‧同僚佐證認證之流程步驟 S23001~S23013‧‧‧Committed certification process steps

S24001~24011‧‧‧臨時通行碼認證之流程步驟 S24001~24011‧‧‧Procedures for the process of temporary passcode authentication

S25001~S25013‧‧‧主管授權認證之流程步驟 S25001~S25013‧‧‧ Process steps for authorization certification

S27101~S27109‧‧‧申請動態密碼之流程步驟 S27101~S27109‧‧‧ Process steps for applying for a dynamic password

S27201~S27211‧‧‧通行碼更新之流程步驟 S27201~S27211‧‧‧Procedures for updating the passcode

請參閱有關本發明之詳細說明及其附圖,將可進一步瞭解本發明之技術內容及其目的功效;有關附圖為:第1圖為本發明之整合式智慧卡UNIX認證管理系統之架構圖。 Please refer to the detailed description of the present invention and the accompanying drawings for further understanding of the technical contents of the present invention and the functions thereof. The related drawings are: FIG. 1 is a structural diagram of the integrated smart card UNIX authentication management system of the present invention. .

第2圖為本發明之整合式智慧卡UNIX認證管理方法之流程圖。 2 is a flow chart of a method for managing an integrated smart card UNIX authentication according to the present invention.

第3圖為本發明之整合式智慧卡UNIX認證管理方法之認證模式選擇程序之流程圖。 FIG. 3 is a flow chart of the authentication mode selection procedure of the integrated smart card UNIX authentication management method of the present invention.

第4圖為本發明之整合式智慧卡UNIX認證管理方法之智慧卡認證之流程圖。 FIG. 4 is a flow chart of the smart card authentication of the integrated smart card UNIX authentication management method of the present invention.

第5圖為本發明之整合式智慧卡UNIX認證管理方法之同僚佐證認證之流程圖。 FIG. 5 is a flow chart of the same as the certification certification of the integrated smart card UNIX authentication management method of the present invention.

第6圖為本發明之整合式智慧卡UNIX認證管理方法之臨時通行碼認證之流程圖。 Figure 6 is a flow chart of the temporary pass code authentication of the integrated smart card UNIX authentication management method of the present invention.

第7圖為本發明之整合式智慧卡UNIX認證管理方法之主管授權認證之流程圖。 Figure 7 is a flow chart of the authority authorization authentication of the integrated smart card UNIX authentication management method of the present invention.

第8圖為本發明之整合式智慧卡UNIX認證管理方法之申請動態密碼之流程圖。 FIG. 8 is a flow chart of the application dynamic password of the integrated smart card UNIX authentication management method of the present invention.

第9圖為本發明之整合式智慧卡UNIX認證管理方法之通行碼更新之流程圖。 FIG. 9 is a flow chart of the update of the pass code of the integrated smart card UNIX authentication management method of the present invention.

為了使本發明的目的、技術方案及優點更加清楚明白,下面結合實施例,對本發明進行進一步詳細說明。應當理解,此處所描述的具體實施例僅用以解釋本發明,但並不用於限定本發明。 In order to make the objects, technical solutions and advantages of the present invention more comprehensible, the present invention will be further described in detail below with reference to the embodiments. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.

情境一、信任區智慧卡認證,使用者首次使用本系統,欲申請Host A 的帳號Account A ,並於信任區以智慧卡認證登入Host A Account A Scenario 1, the zone of confidence smart card authentication, users first use of the system, want to apply for an account of Host A Account A, and in the zone of confidence to Host A smart card login authentication of Account A.

1.系統管理者透過核心管理模組的帳號管理元件完成個人資料檔與帳號權限檔,並啟動帳號佈署程序。 1. The system administrator completes the personal data file and the account permission file through the account management component of the core management module, and starts the account deployment process.

2.系統連結客端代理模組的鏈結通訊系統,透過命令轉譯元件產生符合Host A 環境之帳號創建命令,並實際建立Account A 。同時根據使用者設定建構帳戶屬性與環境。 2. The system links the client communication module's link communication system, generates an account creation command conforming to the Host A environment through the command translation component, and actually establishes Account A. At the same time, the account attributes and environment are constructed according to the user settings.

3.使用者啟動人機介面元件,並透過智慧卡中介元件驗證智慧卡有效性與用戶個人識別號碼(Personal Identification Number code,pin code)正確性。 3. The user activates the human interface component and verifies the validity of the smart card and the correctness of the personal identification number code (pin code) through the smart card intermediary component.

4.確認管理資料庫內無該卡片資訊,須進行首次智慧卡登錄程序。 4. Confirm that there is no such card information in the management database, and the first smart card login procedure is required.

5.系統透過智慧卡中介元件讀取智慧卡資訊與加密憑證encrypt,並上傳至管理資料庫內備存。 5. The system of smart card read by smart card information with the intermediary element encrypted credential encrypt, and uploaded to the management information kept in the library.

6.主控台根據管理資料庫之資訊列出使用者擁有之帳號列表。 6. The console lists the list of accounts owned by the user based on the information in the management database.

7.使用者選擇連線至Host A ,系統產生配對之RSA金鑰publicKey A privateKey A 7. The user chooses to connect to Host A , and the system generates the paired RSA keys publicKey A and privateKey A.

8.上傳publicKey A ,並透過客端代理模組的公鑰管理元件,將publicKey A 佈署至Host A Account A 的信任金鑰列表內。 8. Upload publicKey A and deploy publicKey A to the trust key list of Account A of Host A through the public key management component of the client proxy module.

9.利用encryptprivateKey A 加密,並存放於本機端供後續使用。 9. Encrypt privateKey A with encrypt and store it on the local machine for later use.

10.啟動SSH用戶端元件,連線至Host A Account A 並以privateKey A 進行public key認證。 10. Start the SSH client device to connect to a Account A Host A and to privateKey A public key for authentication.

11.認證成功,確認使用者所屬區域屬於信任區,故省略密碼認證,完成登入認證程序。 11. The authentication is successful, and the area to which the user belongs belongs to the trusted area. Therefore, the password authentication is omitted and the login authentication procedure is completed.

情境二、信任區同僚佐證認證,使用者User B 忘了攜帶智慧卡,須於信任區透過同僚佐證認證登入Host B Account B Situation Second, the zone of confidence colleagues evidence certification, users User B forgot to carry smart cards, is required to pass through the zone of confidence colleagues corroborated authentication login Account B Host B's.

1.使用者User B 透過人機介面元件與系統的認證管理元件驗證,登入人機介面元件。並透過智慧卡中介元件驗證智慧卡有效性與用戶個人識別號碼(Personal Identification Number code,pin code)正確性。 1. User User B logs in to the human interface component through the human interface component and the authentication management component of the system. The smart card intermediary component is used to verify the validity of the smart card and the correctness of the personal identification number code (pin code).

2.確認智慧卡擁有者User C User B 不符,但隸屬相同單位,進入步驟五同僚認證模式。 2. Confirm that the smart card owner User C does not match User B , but belongs to the same unit and enters step 5 of the same authentication mode.

3.人機介面元件提示須第二位同僚進行協同認證。 3. The man-machine interface component prompts the second peer to perform collaborative authentication.

4.透過智慧卡中介元件確認智慧卡已抽換並通過用戶個人識別號碼(Personal Identification Number code,pin code)驗證,且擁有者User D User C 不同。 4. Confirm that the smart card has been exchanged and verified by the Personal Identification Number code (pin code) through the smart card mediation component, and the owner User D is different from User C.

5.確認User D User B 隸屬相同單位,通過同僚認證程序。 5. Confirm that User D and User B belong to the same unit and pass the peer authentication procedure.

6.使用者根據人機介面元件提示輸入符合密碼原則之臨時通 行碼passphrase B 6. The user enters a temporary pass code passphrase B that conforms to the password principle according to the prompt of the human interface component.

7.利用passphrase B ,產生配對之臨時RSA金鑰publicKey B privateKey B 7. Using passphrase B , generate the paired temporary RSA keys publicKey B and privateKey B.

8.進入步驟八。 8. Go to step eight.

9.人機介面元件列出使用者擁有之帳號列表。 9. The human interface component lists a list of accounts owned by the user.

10.使用者選擇連線至Host B 10. The user chooses to connect to Host B.

11.透過客端代理模組的公鑰管理元件,將publicKey B 佈署至Host B Account B 的信任金鑰列表內。 11. Deploy the publicKey B to the Trust Key list of Account B of Host B through the public key management component of the client proxy module.

12.透過通行碼管理元件,於三分鐘後移除Account B 信任金鑰內的publicKey B 12. Remove the publicKey B in the Account B trust key after three minutes via the passcode management component.

13.啟動SSH用戶端元件,連線至Host B Account B 並以passphrase B 搭配privateKey B 進行public key認證。 13. Start the SSH client device to connect to a Account B Host B passphrase B and to match privateKey B for public key authentication.

14.認證成功,確認使用者所屬區域為信任區,故省略密碼認證,完成登入認證程序。 14. The authentication is successful, and the area to which the user belongs is confirmed as the trust zone. Therefore, the password authentication is omitted and the login authentication procedure is completed.

情境三、非信任區主管授權認證,使用者User C 忘了攜帶智慧卡,須於非信任區透過主管授權認證登入Host C Account C Scenario 3: The untrusted zone supervisor authorizes the authentication. User User C forgets to carry the smart card and must log in to Account C of Host C through the authorization authorization in the untrusted zone.

1.使用者User C 透過人機介面元件與系統的認證管理元件驗證,登入人機介面元件。智慧卡中介元件偵測確認智慧卡不存在。 1. User User C logs in to the human interface component through the human interface component and the authentication management component of the system. The smart card mediation component detects that the smart card does not exist.

2.管理資料庫內無屬於User C 有效之臨時RSA金鑰,進入步驟七。 2. There is no temporary RSA key belonging to User C in the management database, go to step 7.

3.通行碼管理元件產生符合密碼原則之亂數授權碼Code C ,將 User C Code C 發送至主管的行動裝置。User C 須透過主管取得Code C ,並於時限內輸入系統。 3. The passcode management component generates a random number authorization code Code C that conforms to the password principle, and sends User C and Code C to the mobile device of the supervisor. User C must obtain Code C through the supervisor and enter the system within the time limit.

4.人機介面元件確認使用者輸入之Code C 正確且有效,通過主管授權認證程序。 4. The human interface component confirms that the Code C entered by the user is correct and valid, and passes the authorization authorization procedure.

5.使用者輸入符合密碼原則之臨時通行碼passphrase C 5. The user enters a temporary pass code passphrase C that complies with the password principle.

6.利用passphrase C ,產生配對之臨時RSA金鑰publicKey C privateKey C 6. Using passphrase C , generate paired temporary RSA keys publicKey C and privateKey C.

7.進入步驟八。 7. Go to step eight.

8.人機介面元件列出使用者擁有之帳號列表。 8. The Human Interface component lists a list of accounts owned by the user.

9.使用者選擇連線至Host C 9. The user chooses to connect to Host C.

10.透過客端代理模組的公鑰管理元件,將publicKey C 佈署至Host C Account C 的信任金鑰列表內。 10. Deploy publicKey C to the list of trust keys in Account C of Host C through the public key management component of the client agent module.

11.透過排程管理元件與通行碼管理元件,於三分鐘後移除Account C 信任金鑰內的publicKey C 11. Remove the publicKey C from the Account C trust key after three minutes through the scheduling management component and the passcode management component.

12.啟動SSH用戶端元件,連線至Host C Account C 並以passphrase C 搭配privareKey C 進行public key認證。 12. Start the SSH client component, connect to Account C of Host C , and use passphrase C with privareKey C for public key authentication.

13.認證成功,確認使用者所屬區域為非信任區,需使用密碼認證,進入步驟九。 13. If the authentication is successful, confirm that the user belongs to the non-trust zone, and you need to use password authentication. Go to Step 9.

14.系統以電子郵件發送密碼申請通知給使用者之主管。 14. The system sends a password request notification to the user's supervisor by email.

15.透過通行碼管理元件,重新產生亂數密碼password C 並設定至Host C Account C 上。 15. Through the passcode management component, regenerate the random password password C and set it to Account C of Host C.

16.將password C 發送至使用者的行動裝置,使用者必須在時限內輸入系統以通過驗證。 16. Send password C to the user's mobile device, the user must enter the system within the time limit to pass the verification.

17.系統將設定三分鐘後啟動通行碼佈署程序,重新產生亂數密碼password C2並設定至Host C Account C 上,確保使用者申請之密碼將於三分鐘後失效。 17. The system will start the passcode deployment procedure after three minutes, regenerate the random password password C 2 and set it to the Account C of Host C , ensuring that the password applied by the user will expire after three minutes.

非信任區臨時通行碼認證,使用者User C 須於非信任區登入Host C Account C User C 忘了攜帶智慧卡,但於先前已完成主管授權認證,於臨時通行碼有效期限內需再度登入系統。 Temporary password authentication in the untrusted zone. User User C must log in to Account C of Host C in the untrusted zone. User C forgot to carry the smart card, but has completed the authorization of the supervisor before, and needs to log in again within the validity period of the temporary password. system.

1.使用者User C 透過人機介面元件與系統的認證管理元件驗證,登入人機介面元件。智慧卡中介元件偵測確認智慧卡不存在。 1. User User C logs in to the human interface component through the human interface component and the authentication management component of the system. The smart card mediation component detects that the smart card does not exist.

2.確認管理資料庫內已存在屬於User C 有效之臨時RSA金鑰publicKey C privateKey C 2. Confirm that the temporary RSA keys publicKey C and privateKey C that are valid for User C already exist in the management database.

3.使用者輸入臨時通行碼passphrase C2,利用privateKey C 驗證passphrase C2是否正確。 3. The user enters the temporary pass code passphrase C 2 and uses privateKey C to verify that the passphrase C 2 is correct.

4.確認passphrase C2正確,人機介面元件列出使用者擁有之帳號列表。 4. Confirm that the passphrase C 2 is correct and the Human Interface component lists the list of accounts owned by the user.

5.使用者選擇連線至Host C 5. The user chooses to connect to Host C.

6.透過客端代理模組的公鑰管理元件,將publicKey C 佈署至Host C Account C 的信任金鑰列表內。 6. Deploy publicKey C to Host C 's Account C trust key list through the public key management component of the client agent module.

7.透過排程管理元件與通行碼管理元件,於三分鐘後移除Account C 信任金鑰內的publicKey C 7. Remove the publicKey C from the Account C trust key after three minutes through the scheduling management component and the passcode management component.

8.啟動SSH用戶端元件,連線至Host C Account C 並以passphrase C 搭配privateKey C 進行public key認證。 8. Start SSH client device, to connect to Host C and the Account C passphrase C with privateKey C to perform public key authentication.

9.認證成功,確認使用者所屬區域為非信任區,需使用密碼 認證,進入步驟九。 9. The authentication is successful. Confirm that the user belongs to the non-trust zone. You need to use the password. Certification, go to step 9.

10.系統以電子郵件發送密碼申請通知給使用者之主管。 10. The system sends a password request notification to the user's supervisor by email.

11.透過通行碼管理元件,重新產生亂數密碼password C 並設定至Host C Account C 上。 11. Through the passcode management component, regenerate the random password password C and set it to Account C of Host C.

12.將password C 發送至使用者的行動裝置,使用者必須在時限內輸入系統以通過驗證。 12. Send password C to the user's mobile device, the user must enter the system within the time limit to pass the verification.

13.系統將設定三分鐘後啟動通行碼佈署程序,重新產生亂數密碼password C2並設定至Host C Account C 上,確保使用者申請之密碼將於三分鐘後失效。 13. The system will start the passcode deployment procedure after three minutes, regenerate the random password password C 2 and set it to the Account C of Host C to ensure that the password applied by the user will expire after three minutes.

上列詳細說明乃針對本發明之一可行實施例進行具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。 The detailed description of the present invention is intended to be illustrative of a preferred embodiment of the invention, and is not intended to limit the scope of the invention. The patent scope of this case.

綜上所述,本案不僅於技術思想上確屬創新,並具備習用之傳統方法所不及之上述多項功效,已充分符合新穎性及進步性之法定發明專利要件,爰依法提出申請,懇請 貴局核准本件發明專利申請案,以勵發明,至感德便。 To sum up, this case is not only innovative in terms of technical thinking, but also has many of the above-mentioned functions that are not in the traditional methods of the past. It has fully complied with the statutory invention patent requirements of novelty and progressiveness, and applied for it according to law. Approved this invention patent application, in order to invent invention, to the sense of virtue.

S210~S280‧‧‧整合式智慧卡UNIX認證管理方法 S210~S280‧‧‧Integrated smart card UNIX authentication management method

Claims (14)

一種整合式智慧卡UNIX認證管理系統,其至少包括:一客端代理模組,操作管理列管伺服器之代理平台,接收與轉譯系統管理之相關命令,執行並回報結果,包括相連接之公鑰管理元件、命令轉譯元件及鏈結通訊元件;一核心管理模組,接收並處理使用者之資料,並管理列管伺服器之主控台,包括相連接之管理資料庫、帳號管理元件、通行碼管理元件及排程管理元件;一操作主控模組,操作主控元件為提供使用者與後端互通之中介,並提供實際與列管伺服器進行溝通認證之操作平台,包括相連接之人機介面元件、智慧IC卡中介元件及SSH用戶端元件;以及一UNIX主機群。 An integrated smart card UNIX authentication management system, which at least comprises: a client agent module, an agent platform for operating and managing a server, receiving and managing commands related to the translation system, executing and reporting the results, including the connected public Key management component, command translation component and link communication component; a core management module, receiving and processing user data, and managing the main control console of the server, including the connected management database, account management component, Passcode management component and scheduling management component; an operation main control module, the operation main control component is an intermediary for providing communication between the user and the back end, and provides an operation platform for actually communicating with the management server, including connection The human interface component, the smart IC card intermediary component and the SSH client component; and a UNIX host group. 如申請專利範圍第1項所述之整合式智慧卡UNIX認證管理系統,其中該公鑰管理元件,管理UNIX主機之信任公鑰,並根據指令增刪信任公鑰;該命令轉譯元件,根據所在UNIX主機,轉譯該核心管理模組之需求為適當之指令,並將不同資料格式轉換為標準化文件;以及該鏈結通訊元件,與該核心管理模組連接,處理資料傳輸與接收指令。 The integrated smart card UNIX authentication management system according to claim 1, wherein the public key management component manages a trusted public key of the UNIX host, and adds or deletes a trusted public key according to the instruction; the command translates the component according to the UNIX The host, the need to translate the core management module is an appropriate instruction, and converts different data formats into standardized files; and the link communication component is connected to the core management module to process data transmission and reception instructions. 如申請專利範圍第1項所述之整合式智慧卡UNIX認證管理系統,其中該管理資料庫,儲存使用者資訊與UNIX主機群資料;該帳號管理元件,提供進行UNIX主機群之帳號權限的新增/異動/刪除,並與該客端代理模組進行帳號權限佈署;該通行碼管理元件,依據密碼原則產生亂數密碼 與金鑰,並與該客端代理模組進行通行碼佈署;以及該排程管理元件,定期驅動該通行碼管理元件並更新密碼與金鑰,另提供臨時通行碼認證及動態密碼認證之排程。 For example, the integrated smart card UNIX authentication management system described in claim 1, wherein the management database stores user information and UNIX host group data; the account management component provides new account authority for the UNIX host group. Increase/transfer/delete, and perform account authority deployment with the client proxy module; the passcode management component generates random password according to the password principle And the key and the client agent module for password code deployment; and the scheduling management component, periodically driving the passcode management component and updating the password and key, and providing temporary passcode authentication and dynamic password authentication. schedule. 如申請專利範圍第1項所述之整合式智慧卡UNIX認證管理系統,其中該帳號管理元件由該管理資料庫讀取個人資料檔與帳號權限檔,並呼叫該客端代理模組之命令轉譯元件,將該個人資料檔與該帳號權限檔之資訊轉譯為該UNIX主機作業系統之合法指令,以進行帳號權限佈署。 For example, the integrated smart card UNIX authentication management system described in claim 1, wherein the account management component reads the personal data file and the account permission file from the management database, and calls the command translation of the client agent module. The component translates the personal data file and the information of the account permission file into legal instructions of the UNIX host operating system for account authority deployment. 如申請專利範圍第1項所述之整合式智慧卡UNIX認證管理系統,其中該人機介面元件,係為使用者與該核心管理模組溝通之應用程式,顯示UNIX主機群列表以接收使用者選擇連線之UNIX主機;該智慧IC卡中介元件,讀取智慧卡;以及該SSH用戶端元件,實作安全殼協定(Secure shell,SSH)並與UNIX主機群溝通,依該人機介面元件所選之UNIX主機為使用者連線,並進行登入認證與遠端操作之終端機應用程式。 For example, the integrated smart card UNIX authentication management system described in claim 1, wherein the human interface component is an application for the user to communicate with the core management module, and displays a list of the UNIX host group to receive the user. Select the connected UNIX host; the smart IC card mediation component reads the smart card; and the SSH client component implements a Secure Shell (SSH) and communicates with the UNIX host group, according to the human interface component The selected UNIX host is a terminal application that connects to the user and performs login authentication and remote operation. 如申請專利範圍第1項所述之整合式智慧卡UNIX認證管理系統,其中該智慧卡係為符合ISO 7810及7816之智慧卡片。 For example, the integrated smart card UNIX authentication management system described in claim 1 is wherein the smart card is a smart card conforming to ISO 7810 and 7816. 一種整合式智慧卡UNIX認證管理方法,其步驟至少包括:A.認證模式選擇程序,根據智慧卡片狀態決定認證模式;B.決定智慧卡認證模式並進行認證;C.判斷是否加強認證控管,若是,執行步驟D;若否,執行步驟E; D.執行動態密碼認證;以及E.登入UNIX系統。 An integrated smart card UNIX authentication management method, the steps including at least: A. authentication mode selection procedure, determining an authentication mode according to a smart card state; B. determining a smart card authentication mode and performing authentication; C. determining whether to strengthen authentication control, If yes, go to step D; if no, go to step E; D. Perform dynamic password authentication; and E. Log in to the UNIX system. 如申請專利範圍第7項所述之整合式智慧卡UNIX認證管理方法,其中該步驟B之智慧卡認證模式更包括B1智慧卡認證、B2同僚佐證認證、B3臨時通行碼認證及B4主管授權認證。 For example, the integrated smart card UNIX authentication management method described in claim 7 of the patent scope, wherein the smart card authentication mode of the step B further includes B1 smart card authentication, B2 peer certification, B3 temporary password authentication, and B4 supervisor authentication. . 如申請專利範圍第7項所述之整合式智慧卡UNIX認證管理方法,其中該步驟B1智慧卡認證更包括:B11系統產生亂數認證碼,以使用者加密憑證加密並傳送到使用者端;B12該人機介面元件接收使用者輸入之用戶個人識別號碼(Personal Identification Number code,pin code)通過智慧卡驗證,並以智慧卡解密後回傳認證碼;B13確認認證碼正確,通過身分驗證,操作主控模組列出使用者申請過之帳號列表;B14系統產生亂數RSA金鑰,將公鑰上傳,並將私鑰以智慧卡加密憑證加密後留存;B15系統將RSA公鑰佈署至特定之伺服器帳號下;B16啟動SSH用戶端元件連線至UNIX主機,並透過RSA私鑰進行SSH公鑰認證;B17根據使用者工作區域判斷是否加強認證控管,若需加強則進行動態密碼認證程序;以及B18若不需加強認證控管,則完成登入程序。 For example, the integrated smart card UNIX authentication management method described in the seventh aspect of the patent application, wherein the step B1 smart card authentication further comprises: the B11 system generates a random number authentication code, which is encrypted by the user encrypted credential and transmitted to the user end; B12, the human interface component receives the user identification number (Personal Identification Number code, pin code) input by the user, and is verified by the smart card, and then the authentication code is returned by the smart card; B13 confirms that the authentication code is correct, and the identity verification is performed. The operation master module lists the account list that the user has applied for; the B14 system generates a random RSA key, uploads the public key, and encrypts the private key with the smart card encryption certificate; the B15 system deploys the RSA public key. To a specific server account; B16 starts the SSH client component to connect to the UNIX host, and performs SSH public key authentication through the RSA private key; B17 determines whether to strengthen the authentication control according to the user work area, and if necessary, strengthens the dynamic The password authentication procedure; and B18, if it is not necessary to strengthen the authentication control, complete the login procedure. 如申請專利範圍第7項所述之整合式智慧卡UNIX認證管理方法,其中該步驟B2同僚佐證認證更包括:B201檢查智慧卡擁有者與使用者是否隸屬相同部門,若是則進行同仁佐證認證;B202測試智慧卡是否更換,第二張卡片用戶個人識別號碼(Personal Identification Number code,pin code)驗證是否正確;B203確認卡片存在並通過用戶個人識別號碼(Personal Identification Number code,pin code)驗證,且擁有者與第一張卡片之擁有者不同;B204確認擁有者與使用者隸屬相同單位,完成同僚認證程序;B205接收使用者輸入符合密碼原則之臨時通行碼,供後續短時間內需再度認證時使用;B206完成臨時通行碼設定,以臨時通行碼為通行碼(passphrase),產生配對之臨時RSA金鑰,並將RSA私鑰存放於本機端,供後續臨時通行碼認證使用;B207操作主控模組列出使用者申請過之帳號列表,進行選擇判斷;B208透過該公鑰管理元件,將臨時RSA公鑰暫時放到使用者選擇之UNIX主機對應帳號之信任公鑰內;B209啟動該排程管理元件以更新通行碼程序,設定時限到時移除該新增之暫時信任公鑰; B210啟動該SSH用戶端元件連線至伺服器,以臨時通行碼做通行碼(passphrase)搭配RSA私鑰進行SSH公鑰認證;B211根據使用者工作區域判斷是否加強認證控管,若需加強則進行動態密碼認證程序;以及B212若不需加強認證控管,則完成登入程序。 For example, the integrated smart card UNIX authentication management method described in claim 7 of the patent scope, wherein the step B2 and the certification support further include: B201 checking whether the smart card owner and the user belong to the same department, and if so, performing peer certification; B202 tests whether the smart card is replaced, and the second card user identification number code (Personal Identification Number code, pin code) verifies whether the card is correct; B203 confirms that the card exists and is verified by the personal identification number code (pin code), and The owner is different from the owner of the first card; B204 confirms that the owner and the user belong to the same unit, and completes the peer authentication procedure; B205 receives the temporary password that the user inputs the password-compliant principle, and is used for subsequent re-authentication in a short period of time. B206 completes the temporary passcode setting, uses the temporary passcode as the passphrase, generates the paired temporary RSA key, and stores the RSA private key on the local end for subsequent temporary passcode authentication; B207 operation master The module lists the account list that the user has applied for, and makes a selection judgment; B208 Passing the public key management component, temporarily placing the temporary RSA public key into the trusted public key of the corresponding account of the UNIX host selected by the user; B209 starts the scheduling management component to update the passcode program, and sets the time limit to remove the new one. Increase the temporary trust public key; The B210 initiates the connection of the SSH client component to the server, and uses a temporary pass code as a passphrase with the RSA private key for SSH public key authentication; B211 determines whether to strengthen the authentication control according to the user work area, and if necessary, strengthens The dynamic password authentication procedure is performed; and if the B212 does not need to strengthen the authentication control, the login procedure is completed. 如申請專利範圍第7項所述之整合式智慧卡UNIX認證管理方法,其中該步驟B3臨時通行碼認證更包括:B31確認存在有效臨時RSA私鑰,提示使用者輸入臨時通行碼;B32以使用者輸入之通行碼作為通行碼(passphrase),以臨時RSA私鑰驗證臨時通行碼是否正確;B33確認臨時通行碼正確,該操作主控模組列出使用者申請過之帳號列表;B34透過該公鑰管理元件,將臨時RSA公鑰暫時放到特定之伺服器對應帳號之信任公鑰內;B35啟動該排程管理元件以更新通行碼程序,設定時限到時移除該新增之暫時信任公鑰;B36啟動該SSH用戶端元件連線至伺服器,以臨時通行碼做通行碼(passphrase)搭配RSA私鑰進行SSH公鑰認證;B37根據使用者工作區域判斷是否加強認證控管,若需加強則進行動態密碼認證程序;以及 B38若不需加強認證控管,則完成登入程序。 For example, the integrated smart card UNIX authentication management method described in claim 7, wherein the step B3 temporary passcode authentication further comprises: B31 confirming that there is a valid temporary RSA private key, prompting the user to input a temporary passcode; B32 to use The pass code entered as a passphrase, and the temporary RSA private key is used to verify whether the temporary pass code is correct; B33 confirms that the temporary pass code is correct, and the operation main control module lists the account list applied by the user; The public key management component temporarily puts the temporary RSA public key into the trusted public key of the specific server corresponding account; B35 starts the scheduling management component to update the password code program, and sets the time limit to remove the added temporary trust. Public key; B36 starts the SSH client component to connect to the server, and uses the temporary pass code as the passphrase with the RSA private key for SSH public key authentication; B37 determines whether to strengthen the authentication control according to the user work area, if Dynamic password authentication procedures are required to be enhanced; B38 If you do not need to strengthen the certification control, complete the login process. 如申請專利範圍第7項所述之整合式智慧卡UNIX認證管理方法,其中該步驟B4主管授權認證更包括:B401產生符合密碼原則之授權碼,將申請人資訊與授權碼傳送給主管之行動裝置;B402取得主管之授權碼,並於時限內輸入系統獲取授權;B403確認授權碼正確且有效,通過主管授權認證;B404使用者輸入符合密碼原則之臨時通行碼;B405完成臨時通行碼設定,以臨時通行碼為通行碼(passphrase),產生配對之臨時RSA金鑰,並將RSA私鑰存放於本機端,供後續臨時通行碼認證使用;B406該操作主控模組列出使用者申請過之帳號列表;B407透過該公鑰管理元件,將臨時RSA公鑰暫時放到特定之UNIX主機對應帳號之信任公鑰內;B408啟動該排程管理元件以更新通行碼程序,設定時限到時移除該新增之暫時信任公鑰;B409啟動該SSH用戶端元件連線至伺服器,以臨時通行碼做通行碼(passphrase)搭配RSA私鑰進行SSH公鑰認證;B410根據使用者工作區域判斷是否加強認證控管,若需加強則進行動態密碼認證程序;以及B411若不需加強認證控管,則完成登入程序。 For example, the integrated smart card UNIX authentication management method described in claim 7 of the patent scope, wherein the step B4 for authorizing the authentication further includes: B401 generating an authorization code conforming to the password principle, and transmitting the applicant information and the authorization code to the supervisor B402 obtains the authorization code of the supervisor, and enters the system to obtain authorization within the time limit; B403 confirms that the authorization code is correct and valid, and passes the authorization authorization of the supervisor; B404 user inputs the temporary password that conforms to the password principle; B405 completes the temporary password setting, The temporary pass code is used as a passphrase to generate a paired temporary RSA key, and the RSA private key is stored in the local end for subsequent temporary passcode authentication; B406 the operation main control module lists the user application After the public key management component, B407 temporarily puts the temporary RSA public key into the trusted public key of the corresponding UNIX host corresponding account; B408 starts the scheduling management component to update the passcode program, and sets the time limit to expire. Remove the newly added temporary trust public key; B409 initiates the SSH client component to connect to the server, and uses the temporary pass code as the pass code (pass Phrase) SSH public key authentication with the RSA private key; B410 determines whether to strengthen the authentication control according to the user's work area, and if necessary, strengthens the dynamic password authentication procedure; and B411 completes the login procedure if it does not need to strengthen the authentication control. 如申請專利範圍第7項所述之整合式智慧卡UNIX認證管理方法,其中該步驟D1動態密碼認證之流程步驟更包括:D11將密碼申請通知以電子郵件方式傳送給使用者之主管;D12根據密碼原則產生亂數密碼,透過該命令轉譯元件將密碼佈署到列管伺服器之對應帳號;D13啟動該排程管理元件以變更密碼程序,設定密碼於時限到時再度亂數變更密碼,於時限內不可重複受理密碼申請程序,以免密碼提前失效;以及D14將密碼以電子郵件方式或簡訊傳送給使用者,使用者必須在時限內手動輸入密碼,以完成登入程序。 For example, the integrated smart card UNIX authentication management method described in claim 7 wherein the step D1 dynamic password authentication process step further comprises: D11 transmitting the password application notification to the user's supervisor by email; D12 according to The password principle generates a random number password, and the translation component transmits the password to the corresponding account of the server through the command; D13 starts the scheduling management component to change the password program, and sets the password to change the password again when the time limit expires. The password application procedure cannot be repeated within the time limit to prevent the password from being invalidated in advance; and D14 transmits the password to the user by email or SMS, and the user must manually enter the password within the time limit to complete the login procedure. 如申請專利範圍第7項所述之整合式智慧卡UNIX認證管理方法,其中該步驟D2通行碼更新之流程步驟更包括:D21讀取所有列管伺服器之帳號列表與對應之使用者加密憑證;D22以批次方式進行下列金鑰與密碼更新程序;D23利用RSA金鑰演算法,產生配對之公私鑰;D24透過客端代理模組之公鑰管理元件,更新列管伺服器對應帳號之信任公鑰;D25確認金鑰更新成功後,以使用者之智慧卡加密金鑰將RSA私鑰加密,並更新管理資料庫內之使用者的加密RSA私鑰;D26根據密碼原則產生亂數密碼,透過客端代理模組將密碼 佈署至對應帳號;以及D27重複D22~D26,直到完成所有列管伺服器之帳號通行碼更新。 For example, the method for managing the integrated smart card UNIX authentication according to the seventh aspect of the patent application, wherein the step D2 process of updating the pass code further comprises: D21 reading the account list of all the pipe server and the corresponding user encrypted certificate. D22 performs the following key and password update procedures in batch mode; D23 uses the RSA key algorithm to generate the paired public and private keys; D24 updates the corresponding account of the column server through the public key management component of the client agent module. Trust the public key; D25 confirms that the key is successfully updated, encrypts the RSA private key with the user's smart card encryption key, and updates the encrypted RSA private key of the user in the management database; D26 generates a random password according to the password principle. , password through the client proxy module Deploy to the corresponding account; and D27 repeat D22~D26 until all account server passwords are updated.
TW103106393A 2014-02-26 2014-02-26 Integrated smart card UNIX authentication management system and method TW201533605A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW103106393A TW201533605A (en) 2014-02-26 2014-02-26 Integrated smart card UNIX authentication management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW103106393A TW201533605A (en) 2014-02-26 2014-02-26 Integrated smart card UNIX authentication management system and method

Publications (1)

Publication Number Publication Date
TW201533605A true TW201533605A (en) 2015-09-01

Family

ID=54694791

Family Applications (1)

Application Number Title Priority Date Filing Date
TW103106393A TW201533605A (en) 2014-02-26 2014-02-26 Integrated smart card UNIX authentication management system and method

Country Status (1)

Country Link
TW (1) TW201533605A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI793885B (en) * 2020-12-28 2023-02-21 日商樂天集團股份有限公司 Authentication system, authentication method, and program product
TWI796853B (en) * 2020-12-28 2023-03-21 日商樂天集團股份有限公司 Authentication system, authentication method, and program product

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI793885B (en) * 2020-12-28 2023-02-21 日商樂天集團股份有限公司 Authentication system, authentication method, and program product
TWI796853B (en) * 2020-12-28 2023-03-21 日商樂天集團股份有限公司 Authentication system, authentication method, and program product

Similar Documents

Publication Publication Date Title
US11223614B2 (en) Single sign on with multiple authentication factors
TWI667585B (en) Method and device for safety authentication based on biological characteristics
KR102689195B1 (en) Method and device for realizing session identifier synchronization
US10057763B2 (en) Soft token system
JP6117317B2 (en) Non-repudiation method, settlement management server for this, and user terminal
CN106462674B (en) Resource access control using authentication tokens
US20180082050A1 (en) Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device
JP6609788B1 (en) Information communication device, authentication program for information communication device, and authentication method
CN113474774A (en) System and method for approving a new validator
CN109005155B (en) Identity authentication method and device
CN103119975B (en) User account recovers
CN104718526A (en) Secure mobile framework
WO2019226115A1 (en) Method and apparatus for user authentication
JP7554197B2 (en) One-click login procedure
CN105100102A (en) Authority configuration method and device as well as information configuration method and device
JP2017152880A (en) Authentication system, key processing linkage method, and key processing linkage program
KR102012262B1 (en) Key management method and fido authenticator software authenticator
CN108768941B (en) Method and device for remotely unlocking safety equipment
US20140250499A1 (en) Password based security method, systems and devices
KR101996317B1 (en) Block chain based user authentication system using authentication variable and method thereof
KR20220167366A (en) Cross authentication method and system between online service server and client
CN104753886A (en) Locking method for remote user, unlocking method and device
KR102288445B1 (en) On-boarding method, apparatus and program of authentication module for organization
KR101651563B1 (en) Using history-based authentication code management system and method thereof
TW201533605A (en) Integrated smart card UNIX authentication management system and method