HK1233804B - Persistent authentication system incorporating one time pass codes - Google Patents

Persistent authentication system incorporating one time pass codes Download PDF

Info

Publication number
HK1233804B
HK1233804B HK17107526.9A HK17107526A HK1233804B HK 1233804 B HK1233804 B HK 1233804B HK 17107526 A HK17107526 A HK 17107526A HK 1233804 B HK1233804 B HK 1233804B
Authority
HK
Hong Kong
Prior art keywords
client
server
public key
key
user
Prior art date
Application number
HK17107526.9A
Other languages
Chinese (zh)
Other versions
HK1233804A1 (en
Inventor
瑞克.B.理查森
Original Assignee
黑文技术私人有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 黑文技术私人有限公司 filed Critical 黑文技术私人有限公司
Publication of HK1233804A1 publication Critical patent/HK1233804A1/en
Publication of HK1233804B publication Critical patent/HK1233804B/en

Links

Description

包含一次性通行码的持久性认证系统Persistent authentication system with one-time passcodes

发明人:Ric RichardsonInventor: Ric Richardson

技术领域Technical Field

本发明涉及一种包含一次性通行码的持久性认证系统,更具体地但非排他地,这样的系统不需要系统的用户针对由用户发起的用户会话输入和重新输入用户名和相应的口令。The present invention relates to a persistent authentication system incorporating a one-time passcode, and more particularly, but not exclusively, such a system does not require a user of the system to enter and re-enter a username and corresponding password for user sessions initiated by the user.

背景技术Background Art

用户名和口令的使用在本领域中是公知的。存在如下日益严重的问题,其中在服务器侧存储口令正在变得更易于遭受攻击,并且用户在多个网站上使用不同的和安全口令的负担带来了不便、过于复杂和持续的安全风险。The use of usernames and passwords is well known in the art. There is a growing problem in that storing passwords on the server side is becoming more vulnerable to attack, and the burden on users to use different and secure passwords on multiple websites creates inconvenience, overcomplication, and ongoing security risks.

对解决这个问题的尝试包括设备硬件指纹或诸如生物特征的其他多因素认证。这些被用于试图提高安全性并减少与标准用户名和口令认证系统相关联的问题的暴露。然而,通常它们只是向已经很繁重的处理增加了更多的复杂性和不便的步骤。Attempts to address this issue include device hardware fingerprinting or other multi-factor authentication methods such as biometrics. These are used to attempt to improve security and reduce exposure to issues associated with standard username and password authentication systems. However, they often simply add more complexity and inconvenience to an already burdensome process.

这种尝试的一个示例是IBM的US 5875296,其内容通过交叉引用并入本文。其解决方案在其权利要求1中概述为:An example of such an attempt is IBM's US 5875296, the contents of which are incorporated herein by cross-reference. Its solution is outlined in its claim 1 as:

一种向可连接到分布式计算环境的分布式文件系统的Web服务器认证客户端的方法,所述分布式计算环境包括用于将凭证返回给经过认证以访问所述分布式文件系统的用户的安全服务,所述方法包括以下步骤:A method of authenticating a client to a web server connectable to a distributed file system of a distributed computing environment, the distributed computing environment including a security service for returning credentials to a user authenticated to access the distributed file system, the method comprising the steps of:

响应于所述Web服务器从所述客户端接收到用户ID和口令,执行针对所述安全服务的登录协议并存储由此产生的凭证;In response to the web server receiving the user ID and password from the client, executing a login protocol for the secure service and storing the resulting credentials;

向所述客户端返回其中具有标识符的持久客户端状态对象;以及returning a persistent client state object with the identifier therein to the client; and

使所述客户端使用包括所述标识符在内的所述持久客户端状态对象而不是用户id和口令,来获得对所述分布式文件系统中的Web文档的后续访问。The client is caused to use the persistent client state object including the identifier instead of a user id and password to gain subsequent access to Web documents in the distributed file system.

该布置可以被解释为利用“cookie”作为持久客户端状态对象。该布置存在重大的安全问题。This arrangement can be interpreted as utilizing a "cookie" as a persistent client state object. This arrangement presents significant security issues.

其他的现有技术示例(所有这些示例通过交叉参考而被包括)包括:Other prior art examples (all of which are incorporated by cross-reference) include:

US8447977Canon KK,其主要权利要求如下:US8447977Canon KK, its main claims are as follows:

一种通过网络向服务器认证设备的方法,所述方法包括以下步骤:A method for authenticating a device to a server via a network, the method comprising the following steps:

由所述设备建立与所述服务器的安全连接;Establishing, by the device, a secure connection with the server;

由所述设备向所述服务器传送所述设备的标识信息,其中所述标识信息向所述服务器唯一地标识所述设备,并且被预存储在所述设备中;transmitting, by the device, identification information of the device to the server, wherein the identification information uniquely identifies the device to the server and is pre-stored in the device;

由所述服务器使用由所述设备传送的所述标识信息来确定所述设备的可信度;以及determining, by the server, the trustworthiness of the device using the identification information transmitted by the device; and

在所述服务器确定所述设备可信的情况下:When the server determines that the device is authentic:

由所述服务器创建针对所述设备的第一认证令牌,所述第一认证令牌指示所述设备是可信的;creating, by the server, a first authentication token for the device, the first authentication token indicating that the device is authentic;

由所述服务器存储所述第一认证令牌;storing, by the server, the first authentication token;

由所述服务器使用所述安全连接将所述第一认证令牌传送到所述设备;以及transmitting, by the server, the first authentication token to the device using the secure connection; and

由所述设备存储所述第一认证令牌;storing, by the device, the first authentication token;

其中,所述方法还包括以下步骤:The method further comprises the following steps:

由所述设备建立与所述服务器的安全重新连接;以及establishing, by the device, a secure reconnection with the server; and

由所述服务器通过所述安全重新连接,使用由所述设备存储的所述第一认证令牌来认证所述设备。The device is authenticated by the server over the secure reconnection using the first authentication token stored by the device.

US6668322Sun MicroSystems,其主要权利要求如下:US6668322 Sun MicroSystems, its main claims are as follows:

一种在控制对一个或多个信息资源的访问的安全架构中使用的会话凭证,所述会话凭证包括:A session credential for use in a security architecture for controlling access to one or more information resources, the session credential comprising:

唯一标识主体的主体标识符;以及A subject identifier that uniquely identifies the subject; and

在对与所述主体相对应的登录凭证进行预先认证之后由所述安全架构赋予的授权的编码,the encoding of the authorization granted by the security architecture after pre-authentication of the login credentials corresponding to the principal,

所述主体标识符和授权编码被加密保护,并且允许所述安全架构评估对于访问所述一个或多个信息资源的授权的充分性,而无需重新认证所述登录凭证。The principal identifier and authorization code are cryptographically protected and allow the security framework to evaluate the sufficiency of the authorization to access the one or more information resources without requiring reauthentication of the login credentials.

US6421768First Data,其主要权利要求如下:US6421768 First Data, its main claims are as follows:

一种用于可转移认证的方法,通过该方法,能够向远离第一计算机的第二计算机认证访问所述第一计算机的用户,而不必要求用户向所述第二计算机明确地标识自己,所述方法包括以下步骤:A method for transferable authentication, by which a user accessing a first computer can be authenticated to a second computer remote from the first computer without requiring the user to explicitly identify themselves to the second computer, the method comprising the steps of:

在用户的计算机处访问所述第一计算机;accessing the first computer at a user's computer;

向所述第一计算机认证所述用户;authenticating the user to the first computer;

从所述第一计算机接收包括所述第一计算机的用户特征的数字凭证在内的cookie,所述凭证由所述第一计算机加密保证,由所述第一计算机使用对所述第一计算机和所述第二计算机保密但对所述用户未知的客户端公钥将所述用户特征加密并合并到所述数字凭证中,所述客户端公钥被使用所述第一计算机和所述第二计算机中的至少一个的非对称密钥来加密保证;receiving, from the first computer, a cookie including a digital credential that includes characteristics of a user of the first computer, the credential being cryptographically secured by the first computer, the user characteristics being encrypted by the first computer using a client public key that is secret from the first computer and the second computer but unknown to the user, and incorporating the encrypted credential into the digital credential, the client public key being cryptographically secured using an asymmetric key of at least one of the first computer and the second computer;

通过所述用户的计算机向所述第二计算机发送所述加密保证的客户端公钥;以及Sending the cryptographically guaranteed client public key to the second computer via the user's computer; and

将包括所述凭证在内的所述cookie的至少一部分发送到所述第二计算机,所述第二计算机被配置为:sending at least a portion of the cookie including the credentials to the second computer, the second computer being configured to:

认证所述凭证,而不必要求所述用户向所述第二计算机明确地标识自己;authenticating the credentials without requiring the user to explicitly identify themselves to the second computer;

从所述凭证提取所述用户特征;以及extracting the user characteristics from the credentials; and

基于所述用户特征执行动作。An action is performed based on the user characteristics.

如上所述,目前,Cookie具有特定安全问题,并且具有持续采用问题。As mentioned above, cookies currently have certain security issues and ongoing adoption problems.

还公开了以下内容,其公开了寻求安全系统的替代方式,而不使用重复的口令输入以及从一个机器到另一个机器的口令的明确通信。这些系统可能更复杂,包括使用第三方机器来执行验证/认证。The following is also disclosed that discloses alternative ways to seek security systems without using repeated password entry and explicit communication of passwords from one machine to another. These systems may be more complex and include the use of third-party machines to perform verification/authentication.

US4578531AT&TUS4578531AT&T

US6134592NetscapeUS6134592 Netscape

US6205480Computer AssocUS6205480Computer Assoc

US7523490MicrosoftUS7523490Microsoft

US20110320820IBMUS20110320820IBM

US20130219472A1QSANUS20130219472A1QSAN

本发明的实施例被设计为解决这些问题。Embodiments of the present invention are designed to address these problems.

注释Notes

术语“包括”(及其语法变化)在本说明书中用于“具有”或“包含”的包括性意义,而不是“仅由...组成”的排他性意义。The term "comprise" (and its grammatical variations) is used in this specification in the inclusive sense of "having" or "including", rather than in the exclusive sense of "consisting only of".

本发明的背景技术中对现有技术的以上讨论不是承认本文中所讨论的任何信息是在任何国家本领域技术人员的公知常识的部分或可引用的现有技术。The above discussion of the prior art in the context of the invention is not an admission that any of the information discussed herein is part of the common general knowledge of a person skilled in the art in any country or is citable prior art.

发明内容Summary of the Invention

概括地说,在本发明的实施例中概述的概念在于依赖于用于持久性认证过程和相应系统和装置的两条信息:In summary, the concepts outlined in embodiments of the present invention are based on relying on two pieces of information for a persistent authentication process and corresponding systems and devices:

在优选的详细形式中,针对每个会话,由客户端生成新的密钥对并将其传递给服务器。只有当在该服务器存储的公钥与匹配该用户(用户ID)的客户端上的公钥之间存在匹配时,才启用后续会话的通信。In a preferred detailed form, for each session, a new key pair is generated by the client and passed to the server. Communication for subsequent sessions is enabled only when there is a match between the public key stored on the server and the public key on the client that matches the user (user ID).

概括地说,以另一种方式陈述,根据优选实施例,当使用与服务器对话的客户端侧应用时,使用一次性通行码的不间断链来表征用户。在特定形式中,一次性通行码实际上是客户端生成的密钥对的公钥。在另一特定优选形式中,实现了关于更新的一个方面,其中一次性通行码保持以规则间隔(在优选形式中,优选地,每连接会话至少一次)被更换。In summary, stated another way, according to a preferred embodiment, when using a client-side application that is talking to a server, an unbroken chain of one-time passcodes is used to represent the user. In a specific form, the one-time passcode is actually the public key of a client-generated key pair. In another specific preferred form, an aspect regarding updates is implemented wherein the one-time passcode is kept updated at regular intervals (in a preferred form, preferably at least once per connection session).

因此,在本发明的一种广泛形式中,提供了一种维持对应用的用户的持续认证的方法,而不需要针对在驻留在客户端侧平台上的客户端侧应用与服务器之间发起的每个会话输入和重新输入用户名和相应的口令;以及其中,口令不存储在服务器上;所述方法包括:利用一次性通行码的不间断链;链中的每个通行码对于用户名和客户端侧应用是唯一的;每个通行码被定期地更新,并且优选地在每个所述会话期间被更新至少一次。Thus, in one broad form of the invention, there is provided a method of maintaining ongoing authentication of a user of an application without requiring entry and re-entry of a username and corresponding password for each session initiated between a client-side application residing on a client-side platform and a server; and wherein the password is not stored on the server; the method comprising: utilizing an unbroken chain of one-time passcodes; each passcode in the chain being unique to the username and client-side application; each passcode being updated periodically, and preferably updated at least once during each said session.

优选地,通行码包括客户端侧公钥,所述客户端侧公钥在客户端侧平台和服务器两者上保持持久,直到被通行码链中的下一客户端侧公钥替换。Preferably, the passcode comprises a client-side public key that remains persistent on both the client-side platform and the server until replaced by the next client-side public key in the passcode chain.

优选地,客户端侧公钥包括PKI密钥对的公钥。Preferably, the client-side public key comprises a public key of a PKI key pair.

优选地,不与服务器共享相应的客户端侧私钥。Preferably, the corresponding client-side private key is not shared with the server.

在本发明的另一广泛形式中,公开了一种包括适于执行应用的与存储器通信的处理器在内的设备;所述设备维持对能够在所述设备上执行的应用的用户的持续认证,而不需要针对在驻留在所述设备上的客户端侧平台上的客户端侧应用与远程服务器之间发起的每个会话输入和重新输入用户名和相应的口令;以及其中,口令不存储在服务器上;所述方法包括:利用一次性通行码的不间断链;链中的每个通行码对于用户名和客户端侧应用是唯一的;每个通行码在每个所述会话期间被更新至少一次。In another broad form of the present invention, a device is disclosed comprising a processor in communication with a memory adapted to execute an application; the device maintains ongoing authentication of a user of an application capable of executing on the device without requiring entry and re-entry of a username and corresponding password for each session initiated between a client-side application on a client-side platform residing on the device and a remote server; and wherein the password is not stored on the server; the method comprising: utilizing an unbroken chain of one-time pass codes; each pass code in the chain being unique to the username and the client-side application; and each pass code being updated at least once during each of said sessions.

优选地,通行码包括客户端侧公钥,所述客户端侧公钥在客户端侧平台和服务器两者上保持持久,直到被通行码链中的下一客户端侧公钥替换。Preferably, the passcode comprises a client-side public key that remains persistent on both the client-side platform and the server until replaced by the next client-side public key in the passcode chain.

优选地,客户端侧公钥包括PKI密钥对的公钥。Preferably, the client-side public key comprises a public key of a PKI key pair.

优选地,不与服务器共享相应的客户端侧私钥。Preferably, the corresponding client-side private key is not shared with the server.

在本发明的另一广泛形式中,提供了一种包括具有适于执行应用的与存储器通信的处理器的设备在内的系统;所述设备维持对能够在所述设备上执行的应用的用户的持续认证,而不需要针对在驻留在所述设备上的客户端侧平台上的客户端侧应用与远程服务器之间发起的每个会话输入和重新输入用户名和相应的口令,所述系统推导出第一项数据和第二项数据;所述第一项数据包括:In another broad form of the present invention, there is provided a system comprising a device having a processor in communication with a memory adapted to execute an application; the device maintaining persistent authentication of a user of an application executable on the device without requiring entry and re-entry of a username and corresponding password for each session initiated between a client-side application residing on a client-side platform on the device and a remote server, the system deriving first and second data; the first data comprising:

“你所拥有的事物”,在优选形式中其是客户端侧公钥。"Something you have", which in the preferred form is the client-side public key.

所述第二项数据包括“你知道的事物”。The second item of data includes "things you know".

优选地,所述第二项数据包括用于针对任何给定会话创建私钥的用户PIN/口令。Preferably, the second item of data comprises a user PIN/password used to create a private key for any given session.

优选地,所述第二项数据包括任何形式的个人可识别信息,所述信息包括但不限于:拇指纹或用于针对任何给定会话创建私钥的其他生物特征。Preferably, the second item of data comprises any form of personally identifiable information including, but not limited to, a thumbprint or other biometric characteristic used to create a private key for any given session.

优选地,针对每个会话,由客户端生成新的密钥对并将其传递给服务器,并且其中只有当在该服务器存储的公钥与匹配该用户(用户ID)的客户端上的公钥之间存在匹配时才启用后续会话的通信。Preferably, for each session, a new key pair is generated by the client and passed to the server, and communication for subsequent sessions is enabled only if there is a match between the public key stored at the server and the public key on the client matching the user (user ID).

在本发明的又一广泛形式中,提供了一种平台,其包括与存储器通信的至少一个处理器,所述处理器执行代码以执行对用户进行认证的方法;所述方法包括:当使用在所述平台上执行的通过互联网与远程服务器通信的客户端侧应用时,使用一次性通行码的不间断链来表征用户。In yet another broad form of the present invention, there is provided a platform comprising at least one processor in communication with a memory, the processor executing code to perform a method of authenticating a user; the method comprising: characterizing the user using an unbroken chain of one-time passcodes when using a client-side application executing on the platform that communicates with a remote server over the Internet.

优选地,一次性通行码是客户端生成的密钥对的公钥。Preferably, the one-time passcode is a public key of a client-generated key pair.

在本发明的又一广泛形式中,提供了一种维持对应用的用户的持续认证的系统,而不需要针对在驻留在客户端侧平台上的客户端侧应用与服务器之间发起的每个会话输入和重新输入用户名和相应的口令,所述系统利用可更新的一次性通行码串,并且其中通过以规则间隔更换通行码来实现更新。In yet another broad form of the present invention, there is provided a system for maintaining ongoing authentication of users of an application without requiring entry and re-entry of a username and corresponding password for each session initiated between a client-side application residing on a client-side platform and a server, the system utilizing a renewable one-time passcode string, and wherein renewal is achieved by replacing the passcode at regular intervals.

在优选形式中,间隔包括每会话连接进行一次的间隔。In a preferred form, the interval comprises an interval that occurs once per session connection.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1是示例实施例的主要组件。FIG1 shows the main components of an example embodiment.

图2是示例实施例的初始使用的控制处理。FIG. 2 is a control process for initial use of an example embodiment.

图3是示例实施例的非初始使用的控制处理。FIG3 is a control process for non-initial use according to an example embodiment.

图4是根据另外实施例的构造私钥的方法的框图。FIG4 is a block diagram of a method for constructing a private key according to another embodiment.

具体实施方式DETAILED DESCRIPTION

概括地说,本发明构思在于:依靠两条信息用于初始认证,然后用于持续认证;In summary, the present invention is based on the concept of relying on two pieces of information for initial authentication and then for ongoing authentication;

在优选的详细形式中,针对每个会话,由客户端生成新的公钥并将其传递给服务器。只有当在该服务器存储的公钥与匹配该用户(用户ID)的客户端上的公钥之间存在匹配时,才启用后续会话的通信。In a preferred detailed form, for each session, a new public key is generated by the client and passed to the server. Only when there is a match between the public key stored on the server and the public key on the client that matches the user (user ID) will communication for subsequent sessions be enabled.

概括地说,以另一种方式方式,根据优选实施例,当使用与服务器对话的客户端侧应用时,使用一次性通行码的不间断链来表征用户。在特定形式中,一次性通行码实际上是公钥。在另一特定优选形式中,实现了关于更新的一个方面,其中一次性通行码保持以规则间隔(每会话至少一次)被更换。In summary, in another embodiment, when using a client-side application that is communicating with a server, an unbroken chain of one-time passcodes is used to represent the user. In a specific form, the one-time passcode is actually a public key. In another specific preferred form, an aspect regarding updates is implemented in which the one-time passcode is kept updated at regular intervals (at least once per session).

公开了如下示例实施例,其使用一次性通行码的不间断链来替代传统用户名和口令认证系统中的口令。Example embodiments are disclosed that use an unbroken chain of one-time passcodes to replace passwords in traditional username and password authentication systems.

图1示出了示例实施例的关键组件。当用户使用唯一用户ID 23与服务器连接时,通常使用诸如公钥加密交换之类的加密和认证系统。The key components of an example embodiment are shown in Figure 1. When a user connects to a server using a unique user ID 23, an encryption and authentication system such as a public key cryptographic exchange is typically used.

通常,用户具有客户端侧应用24,客户端侧应用24产生用于与服务器通信的密钥对10,其中,服务器使用它自己的密钥对11。在公钥密码术的已知实践中,客户端私钥12与服务器14的公钥一起使用来对消息进行加密,并且服务器使用客户端的公钥13和服务器的私钥15来对所发送的消息进行解密。Typically, a user has a client-side application 24 that generates a key pair 10 for communicating with a server, where the server uses its own key pair 11. In the known practice of public-key cryptography, the client's private key 12 is used with the server's 14 public key to encrypt messages, and the server uses the client's public key 13 and the server's private key 15 to decrypt sent messages.

一旦发送方10和接收方11的身份被验证,则双方共享秘密口令17,其中秘密口令17用于加密消息16的高速加密和解密。Once the identities of the sender 10 and the receiver 11 are verified, both parties share a secret password 17 , which is used for high-speed encryption and decryption of the encrypted message 16 .

通常,加密消息16使用仅用于通信会话的长度的秘密口令17,此后,口令17被丢弃并且不再被使用。Typically, the encrypted message 16 uses a secret password 17 that is used only for the length of the communication session, after which the password 17 is discarded and never used again.

在示例实施例中,上述密钥交换和加密过程被扩展为包括由客户端生成的第二密钥对集合18。该密钥对生成18用于在客户端和服务器之间唯一地将当前认证的会话与下一认证系统链接。In an example embodiment, the key exchange and encryption process described above is extended to include a second set of key pairs generated by the client 18. This key pair generation 18 is used to uniquely link the current authenticated session with the next authentication system between the client and server.

该密钥对18包括本地存储在客户端设备上的私钥20和也被本地存储的公钥19。所存储的客户端公钥还与服务器25共享并传送到服务器25,然后,服务器25将所存储的对当前使用客户端的人的唯一用户ID 21的引用与客户端的公钥22的存储副本链接。This key pair 18 comprises a private key 20 stored locally on the client device and a public key 19, also stored locally. The stored client public key is also shared with and transmitted to the server 25, which then links a stored reference to the unique user ID 21 of the person currently using the client with a stored copy of the client's public key 22.

在客户端和服务器之间的后续连接期间,所存储和共享的客户端公钥19、22、服务器的公钥14和客户端上存储的私钥20用作当前客户端侧公钥对,然后,生成并存储附加密钥对以用于后续会话。During subsequent connections between the client and server, the stored and shared client public key 19, 22, the server's public key 14 and the private key 20 stored on the client are used as the current client-side public key pair, and additional key pairs are then generated and stored for subsequent sessions.

图2公开了示例实施例的初始会话的控制处理。用户使用通信的客户端侧30上的应用来与服务器31交互。Figure 2 discloses the control process of an initial session of an example embodiment.A user interacts with a server 31 using an application on the client side 30 of the communication.

最初,用户利用唯一ID连接到使用持久的一次性密钥的服务器(32)。最初,服务器和客户端使用传统的公钥加密会话(33)来确保客户端30和服务器31之间的通信。Initially, the user connects to the server (32) using a unique ID using a persistent one-time key. Initially, the server and client use a traditional public key encryption session (33) to secure communications between the client 30 and the server 31.

接着,确认用户想要使用持久的一次性代码(34),并且从用户或从客户端上的存储器捕获或检索用户唯一ID,并将其发送到服务器(35)。随后,服务器请求客户端生成用于在下一会话中使用的公钥对(36)。然后,客户端生成公钥对(37),该公钥对被安全地存储在客户端以用于下一会话(38),并且与服务器共享密钥对的公钥(39)。Next, it is confirmed that the user wants to use a persistent, one-time code (34), and the user's unique ID is captured or retrieved from the user or from storage on the client and sent to the server (35). The server then requests the client to generate a public key pair for use in the next session (36). The client then generates a public key pair (37), which is securely stored on the client for use in the next session (38), and shares the public key of the key pair with the server (39).

使用用户唯一ID将用于下一会话的客户端公钥存储在服务器上(40)。一旦该步骤被确认,则使用现有的SSL、TLS或类似连接来确保客户端和服务器之间的进行中通信,直到会话终止或超时(41)。The client public key for the next session is stored on the server using the user's unique ID (40). Once this step is confirmed, the existing SSL, TLS or similar connection is used to ensure ongoing communication between the client and server until the session is terminated or times out (41).

图3公开了示例实施例的非初始会话的控制处理。用户使用通信的客户端侧60上的应用来与服务器61交互。Figure 3 discloses the control process of a non-initial session of an example embodiment.A user interacts with a server 61 using an application on the client side 60 of the communication.

最初,用户利用唯一ID连接到使用持久的一次性密钥的服务器(62)。最初,服务器和客户端使用传统的公钥加密会话(63)来确保客户端60和服务器61之间的通信。Initially, the user connects to the server (62) using a persistent one-time key using a unique ID. Initially, the server and client use a traditional public key encryption session (63) to secure communications between the client 60 and the server 61.

接着,从用户或客户端上的存储器捕获或检索唯一ID(64)。接着,使用当前用户的唯一用户ID来检索所存储的在先前会话期间存储的客户端密钥对(65)。然后,与服务器共享用户唯一ID和先前存储的客户端公钥(66)。Next, the unique ID is captured or retrieved from storage on the user or client (64). Next, the unique user ID of the current user is used to retrieve the stored client key pair stored during the previous session (65). The user unique ID and the previously stored client public key are then shared with the server (66).

然后,服务器在其自己的用户数据库中搜索用户唯一ID,并且检索先前保存的客户端公钥(67),以便与来自客户端的共享客户端公钥进行比较(68)。如果两个密钥不匹配,则服务器通知用户并且建议解决问题的各种措施(70)。如果确实发生了匹配(69),则服务器请求(71)客户端生成第二公钥对(72),并且随后存储密钥对(73)。另外,与服务器共享刚刚生成(72)的密钥对的公钥以在下一会话中使用(74)。然后,服务器存储要与用户唯一ID一起使用的下一客户端公钥(75),并且客户端和服务器两者的当前密钥对用于客户端和服务器之间的进行中通信,直到会话终止或超时(76)。The server then searches its own user database for the user's unique ID and retrieves the previously saved client public key (67) for comparison with the shared client public key from the client (68). If the two keys do not match, the server notifies the user and suggests various measures to resolve the issue (70). If a match does occur (69), the server requests (71) the client to generate a second public key pair (72) and then stores the key pair (73). Additionally, the public key of the key pair just generated (72) is shared with the server for use in the next session (74). The server then stores the next client public key to be used with the user's unique ID (75), and the current key pair of both the client and the server is used for ongoing communications between the client and the server until the session terminates or times out (76).

结果是,以客户端公钥形式的一次性代码的持久链可以用于在多个进行中会话之间建立和延续客户端系统与服务器系统之间的安全连接。As a result, a persistent chain of one-time codes in the form of the client's public key can be used to establish and continue a secure connection between the client system and the server system across multiple ongoing sessions.

备选实施例Alternative Embodiments

示例实施例使用作为持久性标识符的存储在客户端侧和服务器侧两者上的一系列客户端侧公钥的生成和链接以用于认证目的。备选实施例可以使用诸如共享的AES通行码之类的TLS会话密钥链作为持久性标识符。在这种情况下,每次使用共享的客户端侧公钥时,就生成跟随密钥并且其被存储在双侧上以在下一会话中使用。使用客户端侧公钥作为持久性标识符的优点在于:与TLS会话密钥的情况不同,客户端侧私钥不被与服务器共享,并且因此增加了系统的安全级别。An example embodiment uses the generation and chaining of a series of client-side public keys stored on both the client side and the server side as a persistent identifier for authentication purposes. An alternative embodiment may use a TLS session key chain such as a shared AES passphrase as a persistent identifier. In this case, each time a shared client-side public key is used, a follow-up key is generated and stored on both sides for use in the next session. The advantage of using the client-side public key as a persistent identifier is that, unlike the case of TLS session keys, the client-side private key is not shared with the server, thereby increasing the security level of the system.

在示例实施例中,客户端用于生成密钥对以供处理使用。在备选实施例中,服务器可以用于生成密钥对并将其与客户端共享以在后续会话中使用。In an exemplary embodiment, the client is used to generate a key pair for use in processing. In an alternative embodiment, a server can be used to generate a key pair and share it with the client for use in subsequent sessions.

示例实施例将下一客户端公钥的服务器存储副本与在当前会话期间来自客户端的客户端公钥的共享副本进行共享。备选实施例可以将客户端公钥的任何等同物用于比较目的,包括但不限于客户端公钥的校验和(checksum)或散列(hash)。The example embodiment shares the server-stored copy of the next client public key with the shared copy of the client public key from the client during the current session. Alternative embodiments may use any equivalent of the client public key for comparison purposes, including but not limited to a checksum or hash of the client public key.

其他实施例Other embodiments

参照图4并且在特定优选形式中,根据另一实施例,本发明的实施例依赖于根据构造私钥的方法的两条信息。4 and in a particularly preferred form, according to another embodiment, an embodiment of the present invention relies on two pieces of information according to a method of constructing a private key.

“你所拥有的事物”,在优选形式中其是客户端侧公钥。"Something you have", which in the preferred form is the client-side public key.

“你知道的事物”,在优选形式中其是用于针对任何给定会话创建私钥的用户PIN/口令。"Something you know," which in the preferred form is the user's PIN/password used to create the private key for any given session.

在示例实施例的进一步增强中,客户端密钥对的私钥可以链接到客户端设备的特定用户,以实行双因素认证。这是通过在使用示例实施例的双因素认证中要求用户输入PIN或其他“用户必须知道的事物”与“用户必须拥有的事物”(在这种情况下是有效客户端密钥对的必需私钥)来实现的。In a further enhancement of the example embodiment, the private key of the client key pair can be linked to a specific user of the client device to implement two-factor authentication. This is achieved by requiring the user to enter a PIN or other "something the user must know" and "something the user must have" (in this case, the required private key of a valid client key pair) in two-factor authentication using the example embodiment.

在该增强中,客户端密钥对101的私钥100被分成两个部分102、103。第一部分是PIN 102,其由用户选择以在未来会话中验证他们的身份。从完整的私钥100中减去该PIN102以产生差分密钥元素103。除非用户将正确的PIN 102添加到正确的差分密钥元素103以产生可用密钥对101的可用私钥100,否则差分密钥元素103不能用作客户端密钥对101中的成功的私钥100。In this enhancement, the private key 100 of the client key pair 101 is split into two parts 102, 103. The first part is a PIN 102, which is selected by the user to verify their identity in future sessions. This PIN 102 is subtracted from the full private key 100 to produce a differential key element 103. Unless the user adds the correct PIN 102 to the correct differential key element 103 to produce a usable private key 100 of a usable key pair 101, the differential key element 103 cannot be used as a successful private key 100 in the client key pair 101.

可以将差分密钥元素安全地存储104在客户端设备上以在下一会话中使用,因为在没有所需PIN 102的情况下不能成功地使用元素104。The differential key element may be securely stored 104 on the client device for use in the next session, as the element 104 cannot be successfully used without the required PIN 102 .

在实践中,将在每个会话开始时向用户请求PIN 102,然后将其添加到差分密钥元素103,以建立成功的公钥数据加密和解密。In practice, the PIN 102 will be requested from the user at the start of each session and then added to the differential key element 103 to establish successful public key data encryption and decryption.

另外,PIN 102将被临时存储在客户端上,然后被用于生成合适的差分密钥元素103以用于下一会话私钥20。Additionally, the PIN 102 will be temporarily stored on the client and then used to generate a suitable differential key element 103 for the next session private key 20 .

示例实施例示出了将PIN用作“用户必须知道的事物”以便实现双因素认证。备选实施例可以使用任何形式的个人可识别信息,包括但不限于拇指纹或其他生物特征。The example embodiment shows the use of a PIN as the "thing the user must know" in order to implement two-factor authentication. Alternative embodiments may use any form of personally identifiable information, including but not limited to a thumbprint or other biometric feature.

示例实施例通过从客户端侧密钥对的私钥中减去PIN来使用减法产生差分密钥元素。备选实施例可以使用允许将个人可识别因素与第二文件元素组合以在客户端侧密钥对中产生可用私钥的任何计算。The example embodiment generates the differential key element using subtraction by subtracting the PIN from the private key of the client-side key pair.Alternative embodiments may use any calculation that allows combining a personally identifiable factor with a second file element to generate a usable private key in the client-side key pair.

以上仅描述了本发明的一些实施例,并且在不脱离本发明的范围和精神的情况下,可以进行对本领域技术人员而言显而易见的修改。The foregoing describes only some embodiments of the present invention, and modifications apparent to those skilled in the art may be made without departing from the scope and spirit of the invention.

工业实用性Industrial Applicability

本发明的实施例可以应用在以下情境中:在与装置进一步通信之前,需要验证对该装置或装置加用户组合的认证。Embodiments of the present invention may be applied in situations where authentication of a device or a device plus user combination needs to be verified before further communication with the device.

Claims (24)

1.一种维持驻留在客户端侧平台上的客户端侧应用的用户与服务器之间的持续认证的方法,所述方法包括以下步骤:1. A method for maintaining continuous authentication between a user and a server in a client-side application residing on a client-side platform, the method comprising the following steps: 步骤a:由客户端侧平台连接到使用持久的一次性通行码的服务器;Step a: The client-side platform connects to the server that uses a persistent one-time passcode; 步骤b:由客户端侧平台和服务器使用SSL或TLS建立当前安全会话;Step b: The client-side platform and the server establish the current secure session using SSL or TLS; 步骤c:由客户端侧平台检索在先前会话中生成的当前密钥对和与所述用户相关联的唯一用户ID;Step c: The client-side platform retrieves the current key pair generated in the previous session and the unique user ID associated with the user; 步骤d:由客户端侧平台向服务器提供所述唯一用户ID和所述当前密钥对的当前客户端公钥;Step d: The client-side platform provides the server with the unique user ID and the current client public key of the current key pair; 步骤e:由服务器通过使用所述唯一用户ID搜索用户数据库来检索先前存储的客户端公钥;Step e: The server retrieves the previously stored client public key by searching the user database using the unique user ID; 步骤f:由服务器将检索到的先前存储的客户端公钥与从客户端侧平台提供的所述当前客户端公钥进行比较,其中对于当前安全会话,当检索到的先前存储的客户端公钥与所述当前客户端公钥匹配时,在客户端侧平台与服务器之间启用认证;Step f: The server compares the previously stored client public key retrieved with the current client public key provided from the client-side platform, wherein for the current secure session, authentication is enabled between the client-side platform and the server when the retrieved previously stored client public key matches the current client public key; 步骤g:由服务器请求客户端侧平台或服务器生成下一密钥对;Step g: The server requests the client-side platform or the server to generate the next key pair; 步骤h:由客户端侧平台或服务器生成所述下一密钥对以在下一会话中使用,其中相应的客户端侧私钥不存储在服务器上;Step h: The next key pair is generated by the client-side platform or server for use in the next session, wherein the corresponding client-side private key is not stored on the server; 步骤i:在客户端侧平台和服务器之间共享所述下一密钥对的下一客户端公钥以在下一会话中使用;Step i: Share the next client public key of the next key pair between the client-side platform and the server for use in the next session; 步骤j:由服务器将所述下一客户端公钥与所述唯一用户ID相关联地存储在所述用户数据库中;Step j: The server stores the next client public key in association with the unique user ID in the user database; 步骤k:利用所述当前密钥对和服务器密钥对维持客户端与服务器之间的进行中通信,直到所述当前安全会话终止或超时;Step k: Maintain in-process communication between the client and the server using the current key pair and the server key pair until the current secure session terminates or times out; 步骤l:由客户端侧平台用所述下一密钥对替换所述当前密钥对;以及Step 1: The client-side platform replaces the current key pair with the next key pair; and 对于每个下一会话重复步骤a至步骤l,以通过多个进行中会话延续客户端侧平台与服务器之间的安全连接,而不需要针对每个会话要求用户输入和重新输入用户名和相应的口令,由此,生成并持久地维持当前客户端公钥的不间断链,直到被下一客户端公钥替换。Steps a through l are repeated for each subsequent session to perpetuate the secure connection between the client-side platform and the server across multiple ongoing sessions, without requiring the user to enter and re-enter the username and corresponding password for each session. This generates and persistently maintains an uninterrupted chain of the current client public key until it is replaced by the next client public key. 2.根据权利要求1所述的方法,其中,所述下一密钥对在客户端侧平台上生成。2. The method according to claim 1, wherein the next key pair is generated on the client-side platform. 3.根据权利要求2所述的方法,其中,客户端侧公钥包括PKI密钥对的公钥。3. The method according to claim 2, wherein the client-side public key includes the public key of the PKI key pair. 4.根据权利要求2所述的方法,还包括:4. The method according to claim 2, further comprising: 由客户端侧平台要求所述用户输入第一项数据和第二项数据,The client-side platform requires the user to input the first and second pieces of data. 其中,所述第一项数据包括“你所拥有的事物”,其是客户端侧公钥,以及The first data item includes "what you own," which is the client-side public key, and 其中,所述第二项数据包括“你知道的事物”,其是用于针对任何给定会话创建私钥的用户PIN或口令。The second item of data includes “things you know,” which is the user PIN or password used to create a private key for any given session. 5.根据权利要求4所述的方法,其中,所述第二项数据包括任何形式的个人可识别信息,所述信息包括:拇指纹或用于针对任何给定会话创建私钥的其他生物特征数据。5. The method of claim 4, wherein the second data includes any form of personally identifiable information, including: thumbprints or other biometric data used to create a private key for any given session. 6.根据权利要求4所述的方法,还包括:6. The method according to claim 4, further comprising: 针对每个会话,由客户端侧平台生成新的密钥对并将所述新的密钥对传递给服务器,其中,只有当在服务器侧公钥与匹配所述用户的客户端侧公钥之间存在匹配时,才启用后续会话的通信。For each session, the client-side platform generates a new key pair and transmits the new key pair to the server. Communication for subsequent sessions is only enabled if there is a match between the server-side public key and the client-side public key that matches the user. 7.根据权利要求1至6中任一项所述的方法,其中,所述口令不存储在服务器上。7. The method according to any one of claims 1 to 6, wherein the password is not stored on the server. 8.根据权利要求1所述的方法,其中,所述下一密钥对在服务器上生成。8. The method of claim 1, wherein the next key pair is generated on a server. 9.根据权利要求8所述的方法,其中,客户端侧公钥通过参考客户端侧公钥的PKI密钥对的私钥而与所述用户匹配;并且其中,客户端侧密钥包括PKI密钥对的公钥。9. The method of claim 8, wherein the client-side public key is matched with the user by referring to the private key of the PKI key pair of the client-side public key; and wherein the client-side key includes the public key of the PKI key pair. 10.根据权利要求8所述的方法,还包括:10. The method of claim 8, further comprising: 由客户端侧平台要求所述用户输入第一项数据和第二项数据,The client-side platform requires the user to input the first and second pieces of data. 其中,所述第一项数据包括“你所拥有的事物”,其是客户端侧公钥,以及The first data item includes "what you own," which is the client-side public key, and 其中,所述第二项数据包括“你知道的事物”,其是用于针对任何给定会话创建私钥的用户PIN或口令。The second item of data includes “things you know,” which is the user PIN or password used to create a private key for any given session. 11.根据权利要求10所述的方法,其中,所述第二项数据包括任何形式的个人可识别信息,所述信息包括:拇指纹或用于针对任何给定会话创建私钥的其他生物特征数据。11. The method of claim 10, wherein the second data includes any form of personally identifiable information, including: thumbprint or other biometric data used to create a private key for any given session. 12.根据权利要求10所述的方法,还包括:12. The method of claim 10, further comprising: 针对每个会话,由客户端侧平台生成新的密钥对并将所述新的密钥对传递给服务器,其中,只有当在服务器侧公钥与匹配所述用户的客户端侧公钥之间存在匹配时,才启用后续会话的通信。For each session, the client-side platform generates a new key pair and transmits the new key pair to the server. Communication for subsequent sessions is only enabled if there is a match between the server-side public key and the client-side public key that matches the user. 13.一种维持驻留在客户端侧平台上的客户端侧应用的用户与服务器之间的持续认证的系统,其中客户端侧平台具有处理器和存储器,所述系统被配置为执行以下步骤:13. A system for maintaining continuous authentication between a user and a server for a client-side application residing on a client-side platform, wherein the client-side platform has a processor and memory, the system being configured to perform the following steps: 步骤a:由客户端侧平台连接到使用持久的一次性通行码的服务器;Step a: The client-side platform connects to the server that uses a persistent one-time passcode; 步骤b:由客户端侧平台和服务器使用SSL或TLS建立当前安全会话;Step b: The client-side platform and the server establish the current secure session using SSL or TLS; 步骤c:由客户端侧平台检索在先前会话中生成的当前密钥对和与所述用户相关联的唯一用户ID;Step c: The client-side platform retrieves the current key pair generated in the previous session and the unique user ID associated with the user; 步骤d:由客户端侧平台向服务器提供所述唯一用户ID和所述当前密钥对的当前客户端公钥;Step d: The client-side platform provides the server with the unique user ID and the current client public key of the current key pair; 步骤e:由服务器通过使用所述唯一用户ID搜索用户数据库来检索先前存储的客户端公钥;Step e: The server retrieves the previously stored client public key by searching the user database using the unique user ID; 步骤f:由服务器将检索到的先前存储的客户端公钥与从客户端侧平台提供的所述当前客户端公钥进行比较,其中对于当前安全会话,当检索到的先前存储的客户端公钥与所述当前客户端公钥匹配时,在客户端侧平台与服务器之间启用认证;Step f: The server compares the previously stored client public key retrieved with the current client public key provided from the client-side platform, wherein for the current secure session, authentication is enabled between the client-side platform and the server when the retrieved previously stored client public key matches the current client public key; 步骤g:由服务器请求客户端侧平台或服务器生成下一密钥对;Step g: The server requests the client-side platform or the server to generate the next key pair; 步骤h:由客户端侧平台或服务器生成所述下一密钥对以在下一会话中使用,其中相应的客户端侧私钥不存储在服务器上;Step h: The next key pair is generated by the client-side platform or server for use in the next session, wherein the corresponding client-side private key is not stored on the server; 步骤i:在客户端侧平台和服务器之间共享所述下一密钥对的下一客户端公钥以在下一会话中使用;Step i: Share the next client public key of the next key pair between the client-side platform and the server for use in the next session; 步骤j:由服务器将所述下一客户端公钥与所述唯一用户ID相关联地存储在所述用户数据库中;Step j: The server stores the next client public key in association with the unique user ID in the user database; 步骤k:利用所述当前密钥对和服务器密钥对维持客户端与服务器之间的进行中通信,直到所述当前安全会话终止或超时;Step k: Maintain in-process communication between the client and the server using the current key pair and the server key pair until the current secure session terminates or times out; 步骤l:由客户端侧平台用所述下一密钥对替换所述当前密钥对;以及Step 1: The client-side platform replaces the current key pair with the next key pair; and 对于每个下一会话重复步骤a至步骤l,以通过多个进行中会话延续客户端侧平台与服务器之间的安全连接,而不需要针对每个会话要求用户输入和重新输入用户名和相应的口令,由此,生成并持久地维持当前客户端公钥的不间断链,直到被下一客户端公钥替换。Steps a through l are repeated for each subsequent session to perpetuate the secure connection between the client-side platform and the server across multiple ongoing sessions, without requiring the user to enter and re-enter the username and corresponding password for each session. This generates and persistently maintains an uninterrupted chain of the current client public key until it is replaced by the next client public key. 14.根据权利要求13所述的系统,其中,所述下一密钥对在客户端侧平台上生成。14. The system of claim 13, wherein the next key pair is generated on the client-side platform. 15.根据权利要求14所述的系统,其中,客户端侧公钥包括PKI密钥对的公钥。15. The system of claim 14, wherein the client-side public key includes the public key of the PKI key pair. 16.根据权利要求13所述的系统,其中,所述系统还被配置为执行以下步骤:16. The system of claim 13, wherein the system is further configured to perform the following steps: 由客户端侧平台要求所述用户输入第一项数据和第二项数据,The client-side platform requires the user to input the first and second pieces of data. 其中,所述第一项数据包括“你所拥有的事物”,其是客户端侧公钥,以及The first data item includes "what you own," which is the client-side public key, and 其中,所述第二项数据包括“你知道的事物”,其是用于针对任何给定会话创建私钥的用户PIN或口令。The second item of data includes “things you know,” which is the user PIN or password used to create a private key for any given session. 17.根据权利要求16所述的系统,其中,所述第二项数据包括任何形式的个人可识别信息,所述信息包括:拇指纹或用于针对任何给定会话创建私钥的其他生物特征数据。17. The system of claim 16, wherein the second data includes any form of personally identifiable information, including: thumbprint or other biometric data used to create a private key for any given session. 18.根据权利要求16所述的系统,其中,所述系统还被配置为执行以下步骤:18. The system of claim 16, wherein the system is further configured to perform the following steps: 针对每个会话,由客户端侧平台生成新的密钥对并将所述新的密钥对传递给服务器,其中,只有当在服务器侧公钥与匹配所述用户的客户端侧公钥之间存在匹配时,才启用后续会话的通信。For each session, the client-side platform generates a new key pair and transmits the new key pair to the server. Communication for subsequent sessions is only enabled if there is a match between the server-side public key and the client-side public key that matches the user. 19.根据权利要求13至18中任一项所述的系统,其中,所述口令不存储在服务器上。19. The system according to any one of claims 13 to 18, wherein the password is not stored on the server. 20.根据权利要求13所述的系统,其中,所述下一密钥对在服务器上生成。20. The system of claim 13, wherein the next key pair is generated on a server. 21.根据权利要求20所述的系统,其中,客户端侧公钥通过参考客户端侧公钥的PKI密钥对的私钥而与所述用户匹配;并且其中,客户端侧密钥包括PKI密钥对的公钥。21. The system of claim 20, wherein the client-side public key is matched with the user by referring to the private key of the PKI key pair of the client-side public key; and wherein the client-side key includes the public key of the PKI key pair. 22.根据权利要求20所述的系统,其中,所述系统还被配置为执行以下步骤:22. The system of claim 20, wherein the system is further configured to perform the following steps: 由客户端侧平台要求所述用户输入第一项数据和第二项数据,The client-side platform requires the user to input the first and second pieces of data. 其中,所述第一项数据包括“你所拥有的事物”,其是客户端侧公钥,以及The first data item includes "what you own," which is the client-side public key, and 其中,所述第二项数据包括“你知道的事物”,其是用于针对任何给定会话创建私钥的用户PIN或口令。The second item of data includes “things you know,” which is the user PIN or password used to create a private key for any given session. 23.根据权利要求22所述的系统,其中,所述第二项数据包括任何形式的个人可识别信息,所述信息包括:拇指纹或用于针对任何给定会话创建私钥的其他生物特征数据。23. The system of claim 22, wherein the second data includes any form of personally identifiable information, including: thumbprints or other biometric data used to create a private key for any given session. 24.根据权利要求22所述的系统,其中,所述系统还被配置为执行以下步骤:24. The system of claim 22, wherein the system is further configured to perform the following steps: 针对每个会话,由客户端侧平台生成新的密钥对并将所述新的密钥对传递给服务器,其中,只有当在服务器侧公钥与匹配所述用户的客户端侧公钥之间存在匹配时,才启用后续会话的通信。For each session, the client-side platform generates a new key pair and transmits the new key pair to the server. Communication for subsequent sessions is only enabled if there is a match between the server-side public key and the client-side public key that matches the user.
HK17107526.9A 2014-03-16 2015-03-16 Persistent authentication system incorporating one time pass codes HK1233804B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2014900894 2014-03-16

Publications (2)

Publication Number Publication Date
HK1233804A1 HK1233804A1 (en) 2018-02-02
HK1233804B true HK1233804B (en) 2020-10-09

Family

ID=

Similar Documents

Publication Publication Date Title
CN102099810B (en) Mobile device assisted secure computer network communications
JP7140785B2 (en) Persistent authentication system that incorporates one-time passcodes
JP6517359B2 (en) Account restoration protocol
CN100388244C (en) Method and system for remotely changing communication password
CN113411187B (en) Identity authentication method and system, storage medium and processor
CN111630811A (en) System and method for generating and hosting keys for multi-point authentication
CN106664209B (en) Method and system for generation and management of password-based secret encryption keys
US20110179478A1 (en) Method for secure transmission of sensitive data utilizing network communications and for one time passcode and multi-factor authentication
WO2009089764A1 (en) A system and method of secure network authentication
US11070537B2 (en) Stateless method for securing and authenticating a telecommunication
US20260039643A1 (en) Methods and systems for facilitating single sign-on and passwordless sign-on
CN106230840B (en) A kind of command identifying method of high security
CN107682380B (en) Cross authentication method and device
KR20080005344A (en) System where authentication server authenticates user terminal
KR20070035342A (en) Password-based lightweight mutual authentication
HK1233804B (en) Persistent authentication system incorporating one time pass codes
US20260058817A1 (en) End to end encryption with roaming capabilities
US20250260557A1 (en) End to end encryption with roaming capabilities
Rezanov et al. Method for providing two-factor authentication in operating systems working with authentication services with centralized account databases in telecommunication networks
Xu et al. Qrtoken: Unifying authentication framework to protect user online identity
HK1233804A1 (en) Persistent authentication system incorporating one time pass codes
Bhola et al. Dynamic password authentication protocol using android device and one-way function
HK40059900A (en) Identity authentication method and system, storage medium and processor
CA3225987A1 (en) End to end encryption with roaming capabilities
Kleppmann et al. Strengthening Public Key Authentication Against Key Theft (Short Paper)