专利摘要:
The invention relates to a method for authorizing a terminal (103) of a user (102) to access a resource comprising a memory in which a private key is stored, comprising steps of: - creation of a first data field comprising at least one identifier associated with an encryption information, - creating a second data field comprising an access token, said access token comprising data describing rights granted to the user's terminal (103) ( 102) on the resource; encryption of the data describing access rights, with a public key associated with the private key stored in the memory of the resource, encrypting the access token with an encryption key based on at least part of the encryption information associated with the identifier contained in the first data field of the conservation token.
公开号:FR3041798A1
申请号:FR1559165
申请日:2015-09-29
公开日:2017-03-31
发明作者:Antoine Boulanger;Mirand Sylvain Patureau
申请人:Peugeot Citroen Automobiles SA;
IPC主号:
专利说明:

The invention relates to authentication and rights management in the context of exchanges of data between different computer systems such as an electronic box in a vehicle, mobile devices (smartphones, tablets, computers). portable ...) and landed systems (also called cloud in English).
It is known from the state of the art to access a computer resource after having previously authenticated. It is also known to use a token (physical or digital) to authenticate with the resource.
For example, document US2004230831 discloses an authentication system based on security tokens. This system makes it possible to allow a terminal belonging to a first organization to access a service provider server belonging to a second organization. The first and second organizations form a federation. The user of the terminal belonging to the first organization identifies himself only once and is allowed to access resources of the second organization. Authorizations are carried by tokens issued by a trusted authority and then exchanged by the two organizations.
In general, for security reasons, the authentication tokens are limited in time by a period of validity. After the token has expired, it must be renewed with the trusted authority (also known as the authentication server). The renewal request requires a connection (for example of the Internet or 3G type) to communicate with the authentication server.
However, there are situations where a user wants to access a service provider server without having a connection to the Internet and therefore without being able to communicate with the authentication server.
Such a problem does not arise when the service provider is a computer server only accessible via an Internet connection.
In this case, a user wishing to access the resource necessarily has access to the Internet and can therefore recover a security token through this Internet access.
The problem to be solved by the present invention relates to the case: (i) where the service provider is a connected object (for example a telematic box of a motor vehicle) accessible via a wireless link (for example Bluetooth type or NFC) or a wired link, and (ii) where the user is able to access the object (for example a user with a smartphone located outside the vehicle) but without access to an Internet connection (in other words without any means of communicating with the trusted authority issuing the security tokens). For example, it is assumed that the user wishes to control, with the aid of his Smartphone, the unlocking of an opening to gain access to the passenger compartment of the vehicle, while he is at a place without a cover of a network of communication.
Nothing is planned to securely access the resource in this case. The invention therefore aims to remedy the aforementioned problems by providing an improved method and an authentication device allowing secure access to a computer resource without requiring permanent communication with an authentication server.
More specifically, for this purpose, it proposes a method for authorizing a terminal (103) of a user (102) to access a resource (104) comprising a memory in which a private key is stored, comprising steps of: - generation ( 206) of a storage token by an authentication device (101), - issuing (207) a storage token to the terminal (103), characterized in that said step (206) comprises steps of : - creation (206.1) of a first data field comprising at least one identifier associated with an encryption information, at least part of which is intended to be used as an encryption key; - creating (206.2) a second data field having an access token, said access token comprising data describing rights granted to the user's terminal (103) (102) on the resource (104); - encrypting (206.3) data describing access rights, with a public key associated with the private key stored in the resource's memory (104), - encryption (206.4) of the access token with an encryption key based on on at least a portion of the encryption information associated with the identifier contained in the first data field of the preservation token.
To remedy the problem of access to the authentication server, the invention proposes the creation of a secure storage system of an access token. The access token is kept in a so-called conservation token. The access token is encrypted using encryption data.
Token encryption allows for a longer validity period (for example, more than one day) without compromising the security of the system. Thus, in the case where the user wishes to access the resource, even though he has no means of communication with an authentication server, it decrypts the access token contained in the conservation token .
The access token is then ready to use for use with the resource.
The security of the system is maintained insofar as only the user is able to provide the data necessary to decrypt the access token.
Advantageously, the access token having a validity date indicating an expiry date of the rights granted to the user, the step of generating the conservation token furthermore includes adding an expiry date to said token the expiration date of the retention token being the same as the expiration date of the access token.
Advantageously, the step of encrypting the access token implements a symmetric cryptography method.
Advantageously, the encryption information comprises at least: an answer to a question, a fingerprint or a voice print.
Advantageously, the step of encrypting the access token implements an asymmetric cryptographic method.
Advantageously, the encryption information comprises at least one public key of a cryptographic key pair whose private key is stored in a memory of an object held by the user.
Advantageously, the method of creating a token according to the invention further comprises a step of signing the access token and the storage token with a private key of the authentication device. The invention also relates to an authorization token for a terminal of a user to access a resource comprising a memory in which a private key is stored, characterized in that it comprises: a first data field comprising at least an identifier associated with an encryption information, at least a portion of which is intended to be used as an encryption key; a second data field comprising an access token, said access token comprising data describing rights granted to the user's terminal on the resource, data describing access rights being with a public key associated with the private key stored in the resource's memory, and in that the access token is encrypted with an encryption key based on at least a part of the encryption information associated with the identifier contained in the first data field of the resource. conservation token. The invention also relates to a device for authorizing a terminal of a user to access a resource comprising a memory in which a private key is stored, comprising means for generating a preservation token and means for transmitting said token. storage device for the terminal, characterized in that the means for generating the storage token comprise: means for creating a first data field comprising at least one identifier associated with an encryption information, of which at least a part is intended to be used as an encryption key; means for creating a second data field comprising an access token, said access token comprising data describing rights granted to the user's terminal on the resource; means for encrypting data describing access rights, with a public key associated with the private key stored in the memory of the resource, means for encrypting the access token with an encryption key based on at least a part of the encryption information associated with the identifier contained in the first data field of the conservation token. Other features and advantages of the invention will appear on examining the following detailed description, and the accompanying drawings, in which: FIG. 1 illustrates a schematic view of a system comprising an authentication device according to the invention; FIG. 2 illustrates a diagram representing steps of the method according to the invention; FIG. 3 illustrates a diagram representing substeps of the method according to the invention; FIG. 4 shows an example of a token structure according to the prior art; FIG. 5 shows an example of a token structure according to the invention.
The attached drawings may not only serve to complete the invention, but also contribute to its definition, if any.
With reference to FIG. 1, an authentication system according to the invention comprises at least one terminal 103, a service provider 104 and an authentication authority 101. The access by the terminal 103 to data or Services of the service provider 104 requires authentication and authorizations issued by the authentication authority 101.
In the following, we consider as a non-limiting example that the terminal 103 is a smart mobile phone (also called smartphone in English). But the invention is not limited to this example. Indeed, the terminal 103 may be a laptop, a touch pad or any other connected object (i.e. capable of exchanging data via a wireless connection). This mobile equipment belongs, for example, to the driver of a vehicle or to one of the passengers of the vehicle.
The service provider 104 (or SP for "Service Provider" in English) is an IT resource. SP 104 controls access to data or commands to perform an activity. SP 104 protects access to data and applications. It refuses any access without prior authentication. Advantageously, it redirects the unauthenticated user to an identity provider. Access to the service is therefore restricted. Users must be identified before they can access data or start the execution of an order. In the rest of the document, the SP 104 is also called resource 104 or box 104.
Authentications and authorizations are communicated by means of authorization tokens also called token or "identity credentials" in English.
The tokens used to transmit the permissions are encrypted (or encrypted) according to an asymmetric cryptography mechanism (also called public key cryptography). In such a system, a pair of keys is used: a public key for encryption and a private key for decryption. When a resource sends a token to another computing resource, it simply encrypts the token to be sent using the recipient's public key. The latter will be able to decipher the message using his private key (which he is alone to know).
The tokens incorporate the authorizations that allow access to functions or data on the services hosted on the SP 104.
Authorizations are checked by the SP by either querying a reference directory or a manifest to make permissions that may be common in the token but not providing the same services on different systems.
The SP 104 includes a secure storage space capable of storing a private key used to decrypt the authorization tokens. The secure storage space is for example a Trusted Platform Module (TPM) chip, which is a hardware cryptographic component for storing secrets (such as encryption keys) securely.
In what follows, it is considered by way of non-limiting example that the SP 104 is an electronic box of a motor vehicle. The electronic box is an on-board vehicle that is the boundary of the vehicle data to the outside through various means: cable, wireless protocols (wifi, bluetooth, 3G, etc.).
But the invention is not limited to this example. Indeed, the SP can be a management information system or a system that controls a numerically controlled machine or more generally any connected object (ie capable of exchanging data via a wired or wireless connection) and including a secure storage space capable of storing a private key. The authentication authority 101 (Identity Provider or Identity Provider) is used to authenticate the user as well as to retrieve additional information associated with his identity. The Idp 101 allows users 102 to authenticate and receive tokens on their terminal 103 (personal computer or smartphone) allowing them to be recognized with the SP 104.
Thus, Idp 101 makes it possible to allow a terminal 103 of a user 102 to access a resource 104.
To do this Idp 101 includes means for generating a conservation token and means for issuing said conservation token to the terminal 103.
In particular, the means for generating the preservation token comprise: means for creating a first data field comprising at least one identifier associated with an encryption information, at least part of which is intended to be used as an encryption key ; means for creating a second data field comprising an access token, said access token comprising data describing rights granted to the terminal 103 of the user 102 on the resource 104; means for encrypting the data describing access rights, with a public key associated with the private key stored in the memory of the resource 104, means for encrypting the access token with an encryption key based on at least a portion of the encryption information associated with the identifier contained in the first data field of the preservation token.
Advantageously, Idp 101 further includes means for electronically signing authorization tokens. The electronic signature makes it possible to guarantee the integrity of a token and to authenticate the author. The electronic signature system uses a pair of keys. A private key used to sign a token and a public key to read the signed token.
Such a system generally comprises a public key infrastructure (PKI for public key infrastructure in English) in other words an IT resource for generating, distributing and publishing certificates to the various components required (SP, IdP ...). The IdP 101 and the SP 104, each have a certificate of their own.
Recall that a certificate (or electronic certificate) is a set of data containing at least one public key, at least one identification information (for example: a name, usually stored in a data field called CN for "Common Name" >>) and at least one private key to sign.
The system also includes an Internet interface 106 through which a user can authenticate with Idp 101.
In the system of Figure 1, the chips are generated and used as follows. A token is generated by the Idp 101, in response to a request from a user (previously authenticated to the authentication authority 101). The token is transported by the user's terminal 103 to be finally checked and consumed by the embedded box 104 to allow the user and an application executed on the terminal 103 to access certain functions of the box 104 (for example unlocking 'an opening of the vehicle).
With reference to FIG. 4, an authorization token is structured, for example, in the following manner (JSON type structure).
The authorization token comprises: a first datum (access_token) containing the rights of the user, encrypted with the public key of the embedded box 104 (for example with an asymmetric encryption algorithm, for example of the RSA type). Thus, only the recipient box 104 can decrypt the contents of the token. - a second data (token_type) whose value is set to "bearer" to indicate that it is a standard access token (as opposed to a storage token). a third datum (expiresjn) corresponding to a date of expiry of the token. A fourth datum (refresh_token) corresponding to a random string generated by the authentication authority 101 making it possible to subsequently request a new token without re-authentication by the user, - a fifth data token_signature corresponding to a signature of the type HMAC (it is a condensate (or "hash") of the token, generated by means of a hashing algorithm (for example SHA-1) and encrypted with the private key of the authentication authority 101 (by an asymmetric RSA encryption algorithm.) The signature ensures the authenticity of the sender and the integrity (non-alteration) of the message, and the invention also relates to a storage token that can be securely stored (encrypted). In this way, the validity period of such a token can be extended while maintaining a high level of security.
In addition to the encryption of the permissions (access_token) with the public key of the box 104, data of the conservation token are encrypted using a key from one or more data previously provided by the user.
With reference to FIG. 5, a conservation token is for example structured in the following manner (JSON type structure). The conservation token comprises: a first datum (token_type) indicating a type of token (here "long" or "preservation"), as well as at least one identifier associated with an encryption information (for example question identifiers whose personal answers form the key used to decipher the token contained in the third data (access_token) of the storage token), - a second data item (expiresjn) corresponding to a date of expiry of the conservation token, - a third data item (access_token). ) containing the data structure of an authorization token, for example as defined above, but encrypted by means of a key derived from the encryption information corresponding to the identifiers indicated in the first data. Only this part is sent, once deciphered by the terminal 103, to the box 104. The invention also relates to a method for authorizing the terminal 103 of the user 102 to access the resource 104.
With reference to FIG. 2, the method comprises the steps of: inputting 201, by the user 102, connection information (for example an identifier and a password or any other authentication method) in the terminal ; - Request 202 connection of the terminal 103 to the Idp 101; - Verification 203, by Idp 101, connection information, if the connection information is correct then move to the next step 204, if not connection refusal; Establishing a connection session with the terminal 103; - Request 205, through the terminal 103, a conservation token from Idp 101; - Generation 206 of the storage token by Idp 101; - Sending 207 of the conservation token of Idp 101 to the terminal 103.
This method may be initiated by the user 102 when he wishes to have a storage token on his terminal 103, either as a precaution or in anticipation of a situation where he will have to access the resource 104 without being able to communicate with the user. Idp 101. The creation step 206 of the preservation token, by Idp 101, comprises the following substeps: creation 206.1 of a first data field comprising at least one identifier associated with an encryption information, at least part of which is intended to be used as an encryption key. This is for example an identifier of a question. creation 206.2 of a second data field comprising an access token, said access token comprising data describing rights granted to the terminal 103 of the user 102 on the resource 104. encryption 206.3 data describing rights access, with a public key associated with the private key stored in the memory of the resource 104. In this way the encrypted data can only be read by the resource 104. - encryption 206.4 of the access token with a key encryption based on at least a portion of the encryption information associated with the identifier contained in the first data field of the preservation token. The encrypted access token is intended to be decrypted by the user's terminal 102.
According to one characteristic of the invention, the access token and the storage token each include a validity date. Advantageously, their validity dates are identical. This then makes it possible to know the date of validity of the access token without having to decipher it (i.e. only by consulting the date of validity of the conservation token).
According to a first embodiment, the encryption step 206.4 of the access token implements a symmetric cryptographic method. In other words, the key used to encrypt the data is identical to the key used to decrypt the data. In this case, the encryption information comprises at least: an answer to a question, a fingerprint or a voice print.
Advantageously, the encryption information comprises several answers to questions to which the user has previously responded.
According to a second embodiment, the step of encryption 206.4 of the access token implements an asymmetric cryptographic method. In this case, the encryption information comprises at least one public key of a cryptographic key pair whose private key is stored in a memory of an object held by the user, for example a secure usb key. The use of an encryption for the access token makes it possible to consider storing this token on the terminal 103 for a duration greater than one day without compromising the security of the resource. Indeed, even if the terminal 103 is stolen by an attacker, it will be unable to use the access token to access the resource, as long as this access token remains encrypted in the storage token.
To be used and sent to the box, the token must be decrypted using the key that was used for encryption. This key is restored by obtaining from the user, the encryption data (for example, its answers to questions) chosen to encrypt the token.
If the encryption data are correctly filled, the terminal 103 decrypts the token, then transmits it to the box 104. Upon receipt of the token, the box 104 first verifies the signature of Idp 101. For this it calculates the condensate the token using the same hash algorithm used by Idp 101 (eg SHA-1). It also decrypts the signature, by means of the public key of Idp 101 and using the same algorithm (for example RSA) and obtains the condensate calculated by Idp 101. If the two condensates are identical, the signature is validated. Otherwise, the token is rejected.
The data (access_token), containing the rights of the user, of the access token are then decrypted using the private key of the box 104.
The enclosure is then ready to allow access in accordance with the rights specified in the access token.
权利要求:
Claims (9)
[1" id="c-fr-0001]
A method for authorizing a terminal (103) of a user (102) to access a resource (104) having a memory in which a private key is stored, including steps of: - generating (206) a token conservation by an authentication device (101), - issuing (207) a conservation token to the terminal (103), characterized in that said step (206) comprises steps of: - creation (206.1) a first data field comprising at least one identifier associated with an encryption information, at least a portion of which is intended to be used as an encryption key; - creating (206.2) a second data field having an access token, said access token comprising data describing rights granted to the user's terminal (103) (102) on the resource (104); - encrypting (206.3) data describing access rights, with a public key associated with the private key stored in the resource's memory (104), - encryption (206.4) of the access token with an encryption key based on on at least a portion of the encryption information associated with the identifier contained in the first data field of the preservation token.
[2" id="c-fr-0002]
A method of creating a token according to claim 1, characterized in that the access token has a validity date indicating an expiration date of the rights granted to the user, the generation step (206). the retention token further includes adding an expiration date to said retention token, the expiration date of the retention token being the same as the expiration date of the access token.
[3" id="c-fr-0003]
3. Method of creating a token according to one of the preceding claims characterized in that the step of encryption (206.4) of the access token implements a symmetric cryptographic method.
[4" id="c-fr-0004]
4. Method of creating a token according to the preceding claim, characterized in that the encryption information comprises at least: an answer to a question, a fingerprint or a voice print.
[5" id="c-fr-0005]
5. Method for creating a token according to one of claims 1 or 2, characterized in that, the step of encryption (206.4) of the access token implements an asymmetric cryptographic method.
[6" id="c-fr-0006]
6. A method of creating a token according to the preceding claim, characterized in that the encryption information comprises at least one public key of a cryptographic key pair whose private key is stored in a memory of an object held by the user.
[7" id="c-fr-0007]
7. A method of creating a token according to one of the preceding claims characterized in that it further comprises a step of signing the access token and the storage token with a private key of the authentication device (101). ).
[8" id="c-fr-0008]
8. Authorization token for a terminal (103) of a user (102) to access a resource (104) having a memory in which a private key is stored, characterized in that it comprises: a first field of data comprising at least one identifier associated with an encryption information, at least a portion of which is intended to be used as an encryption key; a second data field comprising an access token, said access token comprising data describing rights granted to the user's terminal (103) on the resource (104), the data describing rights of access the access being with a public key associated with the private key stored in the resource's memory (104), and in that the access token is encrypted with an encryption key based on at least a portion of the associated encryption information to the identifier contained in the first data field of the conservation token.
[9" id="c-fr-0009]
Device (101) for authorizing a terminal (103) of a user (102) to access a resource (104) having a memory in which a private key is stored, including means for generating a conservation token and means for transmitting said conservation token to the terminal (103), characterized in that the means for generating the preservation token comprise: means for creating a first data field comprising at least one associated identifier an encryption information, at least a portion of which is for use as an encryption key; means for creating a second data field comprising an access token, said access token comprising data describing rights granted to the user's terminal (103) on the resource (104); means for encrypting the data describing access rights, with a public key associated with the private key stored in the resource's memory (104), means for encrypting the access token with an encryption key based on on at least a portion of the encryption information associated with the identifier contained in the first data field of the preservation token.
类似技术:
公开号 | 公开日 | 专利标题
US10673632B2|2020-06-02|Method for managing a trusted identity
US10601789B2|2020-03-24|Session negotiations
EP3547203A1|2019-10-02|Method and system for managing access to personal data by means of an intelligent contract
EP3547202B1|2021-10-20|Method for access to anonymised data
EP1549011A1|2005-06-29|Communication method and system between a terminal and at least a communication device
EP3357212A1|2018-08-08|Improved method and device for authentication
US9300639B1|2016-03-29|Device coordination
EP3158710A1|2017-04-26|Method and system for authentication by means of tokens
EP3532973A1|2019-09-04|Method for installing a certificate in a vehicle computer, associated computer and system
KR102131976B1|2020-07-09|User terminal apparatus and method for providing personal information thereby
US20220014354A1|2022-01-13|Systems, methods and devices for provision of a secret
KR102053993B1|2019-12-13|Method for Authenticating by using Certificate
FR3041841A1|2017-03-31|METHOD AND DEVICE FOR ACCESSING A RESOURCE USING A NUMBERED TOKEN
FR3073998B1|2019-11-01|DIGITAL METHOD FOR CONTROLLING ACCESS TO AN OBJECT, A RESOURCE OR SERVICE BY A USER
EP3503500A1|2019-06-26|Method for creating a remote electronic signature by means of the fido protocol
KR100892941B1|2009-04-09|Method for security-service processing based on mobile device
FR3044500A1|2017-06-02|METHOD AND SYSTEM FOR ACCESS BY A SERVER TO CONFIDENTIAL DATA AVAILABLE FROM A SERVICE PROVIDER
FR3093887A1|2020-09-18|Process for issuing, to a nomadic device, an access authorization to a connected computer of a vehicle
FR3057420A1|2018-04-13|METHOD AND SYSTEM FOR SYNCHRONIZING A TIME OF A COMPUTER OF A VEHICLE WITH THAT OF A REMOTE SERVER
FR3044501A1|2017-06-02|METHOD FOR THE TRANSMISSION, BY A TERMINAL, OF CONFIDENTIAL DATA FROM A TELEMATIC VEHICLE CALCULATOR TO A SERVER
WO2019228853A1|2019-12-05|Method for establishing keys for controlling access to a service or a resource
FR2990818A1|2013-11-22|Method for transfer of digital documents between set of terminals, involves deciphering symmetrical key using private asymmetrical key associated with terminal, and deciphering document using deciphered symmetrical key
FR3102024A1|2021-04-16|A method of managing a public key database, a method of authenticating public keys, and server and client devices implementing these methods
WO2018142291A1|2018-08-09|Identity verification
FR3049798A1|2017-10-06|SYSTEM FOR CONTROLLING A REMOTE VEHICLE
同族专利:
公开号 | 公开日
CN108141444B|2020-12-25|
FR3041798B1|2017-10-27|
EP3357212A1|2018-08-08|
CN108141444A|2018-06-08|
WO2017055716A1|2017-04-06|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US20010039620A1|2000-05-08|2001-11-08|Berry Onni Michael|Method for protecting a memory card, and a memory card|
EP2151795A1|2008-08-08|2010-02-10|France Telecom|Secure electronic coupon delivery to mobile device|
EP2743868A1|2012-12-14|2014-06-18|Seven Principles AG|Virtual vehicle key|
WO2015092261A1|2013-12-19|2015-06-25|Orange|System and method for providing a service to the user of a mobile terminal|FR3064960A1|2017-04-05|2018-10-12|Renault S.A.S|METHOD AND SYSTEM FOR REMOTELY UNLOCKING A MOTOR VEHICLE|
FR3082089A1|2018-05-31|2019-12-06|Renault S.A.S|METHOD AND SYSTEM FOR REMOTE UNLOCKING OF A MOTOR VEHICLE|US7548620B2|2004-02-23|2009-06-16|Verisign, Inc.|Token provisioning|
CN103326862B|2013-06-20|2017-02-22|天地融科技股份有限公司|Electronically signing method and system|EP3720165A1|2019-03-30|2020-10-07|Illotros GmbH|Method for proving at least one of identity and entitlement|
CN112260838B|2020-10-15|2022-02-22|四川长虹电器股份有限公司|Automatic renewal authentication method based on JWT |
法律状态:
2016-08-22| PLFP| Fee payment|Year of fee payment: 2 |
2017-03-31| PLSC| Search report ready|Effective date: 20170331 |
2017-08-22| PLFP| Fee payment|Year of fee payment: 3 |
2018-06-29| CA| Change of address|Effective date: 20180312 |
2018-06-29| CD| Change of name or company name|Owner name: PEUGEOT CITROEN AUTOMOBILES SA, FR Effective date: 20180312 |
2018-08-22| PLFP| Fee payment|Year of fee payment: 4 |
2019-08-20| PLFP| Fee payment|Year of fee payment: 5 |
2020-08-19| PLFP| Fee payment|Year of fee payment: 6 |
2021-08-19| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
申请号 | 申请日 | 专利标题
FR1559165A|FR3041798B1|2015-09-29|2015-09-29|IMPROVED AUTHENTICATION METHOD AND DEVICE|FR1559165A| FR3041798B1|2015-09-29|2015-09-29|IMPROVED AUTHENTICATION METHOD AND DEVICE|
EP16784231.9A| EP3357212A1|2015-09-29|2016-09-23|Improved method and device for authentication|
CN201680057040.7A| CN108141444B|2015-09-29|2016-09-23|Improved authentication method and authentication device|
PCT/FR2016/052418| WO2017055716A1|2015-09-29|2016-09-23|Improved method and device for authentication|
[返回顶部]