|
Method and apparatus for pseudonym generation and authentication |
|
IPC classes for russian patent Method and apparatus for pseudonym generation and authentication (RU 2512139):
Method and apparatus for controlling distributed information system data streams / 2509425
Apparatus includes a response stream generating unit, a network configuration control unit, a switching unit, a switching table control unit, a switching table storage unit, an event detecting unit, a dynamic network configuration table control unit.
Data stream authentication / 2509424
Disclosed is a method and a system for decoding a data stream which includes a series of data frames, where the method includes a step of generating a cryptographic value for a block of N consecutive data frames and configuration information, characterised by that the configuration information includes information for rendering the data stream; the method then inserts the cryptographic value into the data stream, following the N consecutive data frames.
Integrating enterprise identity authorisation in conferences / 2507692
First identifier is received. A user is identified from a plurality of users based at least in part on the first identifier. A second identifier is received that corresponds to the first identifier and the user and the user is validated based on both the first identifier and the second identifier. The user may then join the conferencing session, with the user's identity being revealed to others attending the conferencing session.
Network architecture for secure data transmission / 2504912
Network architecture includes a perimetre network connected between an internal network and an external network. The perimetre network includes one or more external edge nodes that are connected to the external network and a plurality of proxy servers that are each connected to one or more of the external edge nodes. One or more internal edge nodes are connected between the plurality of proxy servers and the internal network. The proxy servers are configured to establish a first secure connection between a destination through the external network and a second secure connection to a destination in the internal network. Each of the plurality of proxy servers provides a substantially identical identification for authentication when establishing the first and second secure connections.
Electronic certification, identification and transmission of information using coded graphic images / 2494455
Method of electronic certification, identification during data transmission by means of usage of coded graphic images, including: user registration on a server of a system for electronic certification, identification and transmission of data by means of usage of coded graphical images, where process versions have a client-server architecture; generation of one or several graphical images to the registered user; coding of certain user information in one or several images; coding of a user's message; and classification of correspondence during its transmission between users by means of attachment to the message of one or several specified graphical images, used by the client connected with the second user, in order to confirm authenticity of one or several certifications, identifications and correspondence.
Method for user terminal authentication of interface server and interface server and user terminal therefor / 2491771
Method includes receiving authentication request information from an application service providing server in order to request the interface server to authenticate the user terminal receiving an application service provided from the application service providing server; authenticating the user terminal according to the authenticating request information; and transmitting authentication response information including an authentication result of performing the authentication method to the application service providing server. The interface server provides an interface for a network to the application service providing server, wherein the authentication method is selected by the interface server or the user of the user terminal without the intervention of application service provider for successful authentication of the user terminal when the authentication method selected by the application service provider is inapplicable for the interface server, wherein information on the authentication method selected by the user of the user terminal is used together with the interface server.
Method for user terminal authentication and authentication server and user terminal therefor / 2491733
Method for user terminal authentication in an authentication server comprises steps of: receiving authentication request information for accessing a network from the user terminal; processing an EAP authentication procedure according to the authentication request information; and transmitting a message related to the EAP authentication procedure to the user terminal, wherein the message includes network rejection information when network rejection is triggered, and the network rejection information includes network rejection reason information and control information related to re-accessing instructions for the user terminal to cope with the network rejection.
Methods for automatic identification of participants for multimedia conference event / 2488227
Apparatus to automatically identify participants for a multimedia conference event comprising a content-based annotation component that operates to receive a meeting invitee list for a multimedia conference event; receiving multiple input media streams from multiple meeting consoles, and annotating video content from each input media stream with identifying information for each participant within each input media stream to form a corresponding annotated media stream, wherein the identifying information for each participant moves with that participant when the participant moves within the video content.
Method and apparatus for generating security data and computer program product / 2487482
Method of generating security data for conducting a secure communication session between a first entity and at least a second entity on a defined protocol for creating secure communication sessions, wherein the security data are data for executing a SSL protocol or a TLS protocol, the method comprising: said first entity installing a secure smart card associated with said first entity; generating at least a portion of said secure data in said secure smart card based on instructions transmitted by said first entity; transmitting said secure data from said secure smart card to said first entity; and setting up said secure communication session between said first entity and said at least second entity with said transmitted security data.
Methods of transmitting and receiving data, particularly for secure communication between aircraft and ground base, corresponding devices and aircraft equipped with said devices / 2481716
Method of transmitting data comprises the following steps: determining an authentication word for said data, wherein said authentication word is linked with said data before processing; processing the data to obtain processed data, wherein processing involves a data encryption step, a step for compressing the encrypted data and a step for converting 8-bit words to 6-bit words; transmitting the processed data over a communication channel.
|
FIELD: physics, computer engineering. SUBSTANCE: invention relates to protection of user information from unauthorised access using a pseudonym and can be used in electronic medical systems. The method and apparatus for generating and authenticating a pseudonym are intended for protecting user information from unauthorised access. The method comprises steps of: determining a set of public parameters and a set of private parameters; receiving a user identifier IDuser from a user device; generating a prime pseudonym based on the determined set of private parameters and the IDuser; and transmitting the prime pseudonym Pprime and the set of public parameters to the user device. A Personal Identity Manager (PIM) includes a unit for determining a set of public parameters and a set of private parameters, a unit for receiving a user identifier IDuser, a unit for generating a prime pseudonym and a unit for transmitting the prime pseudonym to the user device. EFFECT: high information security of electronic systems. 26 cl, 7 dwg
The technical field to which the invention relates. The invention generally relates to a method and device to protect user information from unauthorized access and, in particular, to a method and device to protect user information from unauthorized access using the alias. The level of technology With the development of electronic technology, electronic medical system is widespread in modern medical facilities to store and manage personal information and medical documentation (e.g., outpatient cards, test results and other) users (e.g. patients). However, electronic documents susceptible to theft or diversion. Accordingly, the issue of protection of modern electronic medical systems acquires special importance. To improve the security of electronic medical systems proposed two methods to protect user information from unauthorized access: anonymization and pseudonymization. The goal of anonymization is to eliminate the connection between the real user ID and health documentation. In other words, according to the method of anonymization, no individual user information is not recorded, and stored only health is documentation. According to this method of anonymization, the user cannot be tracked by the health records and information of the user can be protected from unauthorized access. How pseudonymization was developed on the basis of the method of anonymization. According to the method of pseudonymization, the relationship between the real user ID and health documentation is eliminated, and establishes the correspondence between the medical documentation user and one or more of its aliases. Accordingly, the method of pseudonymization protects individual information of the user, as well as the ability to monitor his health records. Figure 1 shows the modern mechanism of pseudonymization developed Healthcare Information Technology Standards Panel (HITSP). According to figure 1, when the user U100 comes to the hospital, he first of all sets the ID of theIDuseruser, which is his real ID, medical system D110 hospital at step S110. At step S120, the medical system D110 sendsIDuserManager D120 cross-referenced with the identity of the person (PIX). At step S130, the PIX Manager D120 storesIDuserand asks the server D140 alias generation of alias to assign to the alias user is th at step S140. At step S150, the server D140 aliases generates aliasPpseufor user in response to the request, at step S160, the server D140 alias returns the generated aliasPpseuthe PIX Manager D120. At step S170, the PIX Manager D120 preserves the nicknamePpseuin one to one correspondence with theIDuserand, at step S180, returns medical system D110 certificate alias that contains the aliasPpseu. Then the medical system D110 hospital registers the certificate alias in step S190, and returns it to the user U100 at step S195. Thus, the user U100 can be diagnosed or treated for assigned alias in the hospital, and his health records will be written under a pseudonym. Alternatively, the hospital may, if desired, to get the real user ID of the Manager PIX D120 using this certificate alias that allows tracking. Unfortunately, modern way of pseudonymization shown in figure 1, has several disadvantages. First, for security reasons, to protect information from unauthorized access and other things or for the reason that the user may lose previously generated alias, he may request the generation of a new alias every time the entry is Institute in the hospital or even to request the generation of several different new aliases for the diagnosis and/or treatment of various diseases in the same hospital. In this case, the server D140 aliases shown in figure 1 must often generate aliases for the user, which increases the workload on the server alias. In this case, the PIX Manager must maintain the correspondence between the real user ID and a large number of aliases. Thus, the PIM must have a database of a large volume, which leads to higher server. Secondly, the provision of services pseudonymization has a regional restriction, i.e. local server aliases Manager identification can provide services pseudonymization only medical systems in local hospitals within their service area or medical systems, using the same mechanism services pseudonymization. In other words, if the medical system generates an alias for a user, the medical system in different regions or with different mechanisms of pseudonymization cannot identify an alias for the same user. Every time the user moves from one region to another, a new region, it is necessary, therefore, to disclose your real ID PIM in this new region for alias in force in this new region, and then use this alias for treatment in the hospital. This being the more users a great inconvenience. Thirdly, in some cases, based on trust, the user wishes to disclose your real ID only local PIM, whom he trusts, but not PIM in another, unfamiliar region. In this aspect of the modern way of pseudonymization can be applied only in a very limited region. Thus, it is necessary to provide improved method and apparatus for generation and authentication alias that allows the user to easily and safely use interregional medical care. Objective and summary of the invention The objective of the invention is the provision of a method and device for generating and authentication alias that allows inter-regional identity. Another object of the invention is the provision of a method and device for generating and authentication alias that allows you to reduce the workload of the server. To solve the above-mentioned objectives, the invention provides a method of generating alias Manager personal identity Manager (PIM). The method comprises the steps are: define the set of public parameters and the set personal options; take the ID of theIDuseruser from the user device; generate primary aliason the basis of the Oprah is Lenogo set personal options and IDuserwhereH1a one - way hash function, ∂ is a random number selected from theZpandp- selected Prime number; and transmit the primary aliasPprimeand a set of public parameters to the user device. This method allows you to tell the user only the primary alias once, when he makes the initial registration using PIM. Not often required to generate the set of aliases for the same user. Thus, this method can reduce the workload PIM. To solve the above-mentioned objectives, the invention provides a method of generating an alias on the user device. The method comprises steps in which: pass the ID of theIDuseruser Manager personal identification (PIM); PIM accept a set of public parameters and the primary aliasPprimecorresponding toIDuser; and select at least two of the random parameter, and generate podesignedPpseuon the basis of at least two random parameters, the set of public parameters and primary aliasPprime. According to this method, the user device may generate podesigned on the basis of primary alias, obtained from the PIM. Cu is IU, because podesigned generated using at least two random parameters, the generated podesigned very well hides information about the primary alias, and between many of the generated podeshevleniyu there is no relationship. Even in the case of interception of one or more podeshevleniyu, the interceptor will not be able to extract the primary user alias from intercepted podeshevleniyu. Thus, the mechanism of generation of aliases has a high level of protection. To solve the aforesaid problems, the invention provides a method of authentication alias for a third party device. The method comprises steps in which: receive from the user device podesignedPpseuand IDIDserverto identify a Manager's personal identity Manager (PIM); receive from the PIM set of public parameters based on the ID of theIDserver; and authenticate the authentication of podesavanjimaPpseuby interacting with the user device based on the set of public parameters. According to this method, any third-party device-dependent or not dependent PIM can authenticate the authentication of podesavanjima received from the user device, by interacting with elizavetenskiy device based on the set of public parameters, received from the PIM. Thus, the use of podesavanjima no longer confined to any specific region. According to the above described way the medical system in the hospital in any region can identify podesigned user and can then track his real ID, using the appropriate PIM, which assigns a primary alias. According to another aspect of the invention provides a Manager's personal identity Manager (PIM), PIM contains: definition block, adapted to determine a set of public parameters and a set of personal parameters; a reception unit adapted to receive the ID of theIDuseruser; a generation unit adapted to generate a primary aliason the basis of the set personal options andIDuserwhereH1a one - way hash function, ∂ is a random number selected from theZpandp- selected Prime number; and a transmission unit adapted to transmit the primary aliasPprimeon the user's device. According to another aspect of the invention provides a user device, the user device includes: a transmission unit adapted to transmit the ID of theIDuserthe user is referred to the Manager of personal identity Manager (PIM); a reception unit adapted to receive a set of public parameters and the primary aliasPprimecorresponding toIDuserfrom PIM; and a generation unit adapted to select at least two random parameter and generate podesignedPpseuon the basis of at least two random settings, open settings and primary aliasPprime. According to another aspect of the invention is provided by a third-party device, which the user can request the service, with a third-party device comprises: a reception unit adapted to receive from the user device podesignedPpseuand IDIDserverto identify a Manager's personal identity Manager (PIM); a transmission unit adapted to transmit the information to a user device; a receiving unit adapted to receive a set of public parameters from the PIM based on the ID of theIDserver; and an authentication unit adapted to authenticate the authentication of podesavanjimaPpseuby interacting with the user device via the transmission unit and the reception unit on the basis of the set of public parameters. Other tasks and implementation, as well as a more complete understanding of the invention and will be readily available from the clarified with reference to the following description and claims, given in conjunction with the attached drawings. Brief description of drawings The invention will be described in more detail below, by way of example, with reference to the accompanying drawings, where: figure 1 - illustrative logical block diagram of a modern way of pseudonymization; figure 2 is a logical block diagram of the method of generation and authentication alias according to a variant embodiment of the invention; figure 3 is a logical block diagram of the authentication method of podesavanjima according to a variant embodiment of the invention; 4 is a message exchanged between different objects according to the method of generation and authentication alias according to a variant embodiment of the invention; figure 5 - configuration Manager identification according to a variant embodiment of the invention; 6 is a configuration of a user device according to a variant embodiment of the invention; and Fig.7 - configuration of the other device according to a variant embodiment of the invention. In the drawings, the same legend indicate similar or corresponding features or functions. Description of embodiments The medical system will be considered as an example to describe the method and device for generating and authentication alias according to a variant implementation of the Britania. However, the specialist in the art it is obvious that the method and apparatus for generation and authentication alias that meets the invention is not limited to use in the hospital, but also applicable in other areas where you want to protect the real identity of the user. For example, the method and apparatus for generation and authentication alias can also be used in the field of e-Commerce to deliver e-books, etc. Figure 2 shows the method of generating and authentication alias according to a variant embodiment of the invention. In contrast to figure 1, the method shown in figure 2, involves the participation of three objects: the medical system D210 for use in the hospital, Manager personal identification (PIM) D220 and the user device D230. According to figure 2, the medical system D210 is a management system that is deployed in a hospital, adapted to manage health documentation and other users and store it. PIM D220 is a server adapted to manage the real user ID and store it. According to a variant implementation, shown in figure 2, the PIM D220 feature a selection of aliases, and can generate a unique primary aliasPprimefor a registered user. However, according to the image is the shadow of the primary alias is not limited to use in the hospital. Alternative, the highlighting feature of aliases can be implemented in a device independent from the PIM D220. For example, HITSP, shown in figure 1, the PIX Manager can save the real user ID and manage it, while the server alias, you can implement the function selection of the primary alias. For system HITSP, PIM D220 shown in figure 2, may, therefore, correspond to the combination of PIX Manager and server alias. The user device D230 figure 2 may represent any device with processing capabilities, such as mobile phone, personal digital assistant (PDA), a laptop, a smart card, and so forth, additionally adapted to automatically generate one or more podeshevleniyuPpseuon the basis of primary aliasPprimegenerated by the PIM D220. PodesavanjimaPpseurecorded in the medical system D210 upon receipt of the user in the hospital. Generating function of podeshevleniyu user device D230, for example, can be implemented in application software loaded on the user device 20, or in functional hardware module that can connect to a user device. The operation of the method of generation and authentication alias according to Varian is the embodiment of the invention is described with reference to figure 2. According to a variant implementation, shown in figure 2, the method of generation and authentication alias according to the invention can be divided into five phases: phase installation (S210), the phase register primary alias (S230), the phase generation podesavanjima (S250), the phase authentication podesavanjima (S270), and phase tracking of the user ID (S290). However, the specialist in the art it is obvious that the invention is not limited to this embodiment. On the contrary, some stages (for example, the phase tracking user ID) according to a variant implementation is possible, if desired, be omitted, or some steps may be interspersed with each other. The specific operation of the five phases will be described with reference to figure 2. Installation The method of generation and authentication alias, as shown in figure 2, proposed on the basis of the encryption method, based on the identity (IBE). In the initial phase of installation S210, the PIM D220 defines a set of public parameters and a set of personal parameters used for the generation and authentication alias on the basis of the method IBE. At step S211, the PIM D220 selects the basic parameters. In particular, the PIM D220 first selects two Prime numberspandqand selects a random number ∂Zpfrom the field of integers modp(i.e. theZp). the ATEM PIM D220 selects two groups of order q modulo p, G1andG2in other words, each selected group ofG1andG2hasqfinite elements, and theG1orG2is a subset of theZp. PIM D220 also chooses bilinear mappingê:G1×G1→G2for use betweenG1andG2. Here, the bilinear mappingê:G1×G1→G2means: for all P,QG1,ê(P,Q) is a member of the groupG2i.e. theê(P,Q)G2; and for anya,bZp,ê(aP,bQ)=ê(P,Q)ab. Then PIM D220 picks a random generatorgG1from the groupG1and selects two irreversible hash functionH1andH2. Two hash functions can satisfy the conditions of theH1:{0,1}*→G1andH2:G2→{0,1}*. In other words,H1this is the first irreversible hash function, which maps a sequence of 0 and 1 arbitrary length (e.g., representing a string of characters) in the group elementG1andH2this is the second irreversible hash function, which displays the item group<> G2in the sequence of 0 and 1 arbitrary length. Selecting the above-mentioned basic parameters, at step S213, the PIM D220 chooses {g,g∂,G1,G2,ê,H2,p} from the above-mentioned parameters for the generation of the set of public parameters and selects ∂ H1as the set personal options. In this case, the set of public parameters {g,g∂,G1,G2,ê,H2,p} published that allows any other device to retrieve a set of public parameters from the PIM D220. In this case, the set personal options {∂,H1} equipped with personal protection that allows you to safely generate primary aliasPprimefor the user, when the user performs the registration. Check Prior to the first admission, the user may, at its option, to register with a trusted local PIM D220 phase registration S230 to obtain the primary alias. In particular, at step S231, the user can send the ID of theIDuseruser, which is his real ID, the PIM D220 in the registration request using the user device D230 (PDAs), which he carries with him. At step S233, the PIM D220 preservesIDuserin the data the x identify the user and generates a primary alias on the basis ofIDuserand a predefined set of personal parameters {∂,H1}. The primary alias is a binary group, one member of which is a first hash value calculated by applying a personal first irreversible hash functionH1toIDuserand another member is the first hash value to the extent ∂. Then, at step S235, the PIM D220 sends the generated primary aliasPprimetogether with the set of public parameters to the user device D230 as a response indicating successful registration. At step S237, the user device D230 preserves the primary aliasPprimeand a set of public parameters, so that in the future, if you wish, you can generate the appropriate podesigned. The registration process ends. Generation podesavanjima According to a variant implementation, shown in figure 2, to the PIM D220 not often had to generate aliases for a user, the primary aliasPprimegenerated by the PIM D220, in fact, not used in the hospital. In contrast, the phase S250, each time the user arrives at the hospital, the user device D230 independently generates at least one podesigned on the basis of primary SS is danima Pprimereceived from the PIM D220. In particular, at step S251, the user device D230 selects, for example, two random numbersk1,k2Zpfrom theZpon the basis of the stored set of public parameters. Then, at step S253, the user device D230 generates podesigned on the basis of two selected random number of the set of public parameters and primary aliasPprime. At this stage, the user device D230 can first calculate the following parameters: ; where, where- the inverse of the random numberk2i.e.. Then the user device D230 generates podesignedPpseu= <QA,QB,cA>that contains three members, on the basis of the above calculated parameters. On the above steps S251~S253, the user device D230 can generate different podesavanjima, choosing different random numberk1,k2Zp. In this case, information about the primary alias without the safe hidden in podesavanjima, as for the generation of podesavanjima a random number is usedk1,k2Zp. Others will be difficult to calculate information about the primary alias by reverse calculation based on the stolen podesavanjima. In addition, sincek1andk2are randomly selected among several podesavanjima generated by the same user device D230, will not be related characteristics. Thus, even in case of theft of podeshevleniyu generated by the user device D230, on the basis of these podeshevleniyu not have a primary alias that PIM has assigned to the user device. Thus, the user can safely use generated for him podesigned. In addition, although in this embodiment, to generate podesavanjima uses two random numbers, a specialist in the art it is obvious that you can generate podesigned on the basis of more than two random parameters in a well-calculated design. Thus, the invention is not limited to two random numbers that are listed in this variant implementation. Authentication podesavanjima Each time the user arrives at the hospital, the n uses the generated podesigned for registration in the medical system and hospitals. Phase S270, the medical system D210 hospital first authenticates the authentication of podesavanjima provided by the user device D230, i.e. authenticates generated if podesigned on the basis of primary alias that PIM has assigned to the user to ensure that the real user ID can be monitored with the appropriate PIM. According to figure 2, the authentication process begins with step S271. On the stage 271 user device D230 sends medical system D210 generated them podesignedPpseu= <QA,QB,cA>and the ID of theIDserverlocal PIM D220 (for example, the name or address of the PIM D220). At step S272, the medical system D210 receives a set of public parameters {g,g∂,G1,G2,ê,H2,p} from the corresponding PIM D220 on the basis ofIDserver. Receiving a set of public parameters, the medical system D210 can authenticate the authentication of podesavanjima provided by the user device D230, by interacting with the user device at step S273. The authentication process at step 273 can be implemented in various ways. For example, when the user fully trusts the medical system D10 (for example, local medical system, medical system D210 can take the primary alias from the user device D230. Receiving primary alias from the user device D230, the medical system D210 can authenticate that podesigned generated in accordance with the primary alias, and that the primary alias assigned by the Manager D220 personal identity Manager (PIM), identified byIDserveron the basis of primary alias and podesavanjima provided by the user. More preferably, in step S273, the medical system D210 can authenticate podesigned through the exchange without evidence of information transmission from the user device D230. Because the user device D230 is not required to disclose information about his primary alias of the medical system D210 in the process of exchange without evidence of information transmission, the method provides a higher level of protection. The exchange of evidence without information transfer can also be implemented in various ways. Figure 3 shows one implementation. According to figure 3, at step S373, the medical system D210 chooses a random numbertfrom theZpon the basis of the parameterpin the set of public parameters, i.e. thetZp. If it is, the medical system D210 can randomly choose the source session keyKsesand the content ofNaquery. ContentNathe request may be a random number or a random string represented by a sequence of 0 and 1. Selecting the parameters, the medical system D210 can generate a request message that contains three members, based on the selected parameterst,KsesandNa,gandH2in the set of public parameters, and accepted podesavanjimaPpseu= <QA,QB,cA> at step S374: , whereOB=ê(g∂,QA). In this request message, the first member of thegtcarries information about random numbertthe second memberequivalent encrypted session key, and the third member of theEnc(Kses,Na) expresses the encrypted content obtained by encrypting contentNaasking for a source session keyKses. Then, at step S375, the medical system D210 sends a request message to the user device D230 and waits for a response from the user device D230. On stage S376a, accepting the request message, the user device D230 computes the session keyK*ses from the request message according to the following equation:
wheredenotes the exclusive OR operation. From the above equation it follows that the memberin the right side of the equation represents the encrypted session key included in the request message, and a member of thein the right part of the equation is the supporting member generated by the user device D230 on the basis of primary alias of the set of public parameters and request messages. If the user device D230 stored primary aliasPprimeassigned by the Manager D220 personal identity Manager (PIM), i.e. storedthen the bilinear mappingêin the set of public parameters has the property that the result isin the above equation is exactly equal to 0. Then the encrypted member of the H2(OBtcAt) the session key can be deleted to obtain the source session keyKsesi.e. theK*ses=Kses. Then, at the stage S376b encrypted contentEnc(Kses,Na) decrypts the calculated session keyK*sesto obtain a decrypted contentNa*. If CEA is savy key K*ses=Ksesreceived correctly at the stage S376a, the decrypted content can correctly decrypt on stage S376b asNa*=Na. After that, the stage S376c, the user device D230 selects contentNbresponse corresponding to the decrypted contentNa*according to a predetermined rule, agreed in advance with the medical system D210 hospital. In this embodiment, a predetermined rule may be expressed, for example, in the form ofNb=Na*+1. Of course, a predetermined rule is not limited to this case. Selecting the content of the response, the user device D230 can encrypt the content ofNbanswer calculatedK*seson stage S376d for receiving response messagesEnc(K*ses,Nb). At step 377 user device D230 sends a response messageEnc(K*ses,Nbmedical system D210 hospital in response to the request message. At step S378, after receiving the response message, the medical system D210 decrypts the received response messageEnc(K*ses,Nb) the original keyKsesto obtain a decrypted contentNb*answer. At step S379, the medical system D210 determines whether the above-mentioned sarane the specific rule between the decrypted content Nb*answer and original contentNa. For example, in this embodiment, the medical system D210 determines whetherNb*=Na+1. As described above, if the user device D230 can correctly calculate the initial session key, i.e. theK*ses=Kses, the medical system D210 can correctly decrypt theNb*=Nb=Na+1 the original session keyKses.In other words, between the decrypted contentNb*response contentNathe request followed a predetermined rule. If at step S379 is determined that a predetermined rule between the content ofNb*response contentNarequest is observed, this means that podesigned user device D230 is genuine. Equivalently, it is confirmed that podesigned generated on the basis of primary alias assigned by the Manager of personal identity Manager (PIM), identified byIDserver. Due to the above-described authentication, if podesigned authenticated as genuine, the user successfully registers in the medical system D210. Then he can come to the hospital with podesavanjima, and his health document, the information may be stored and operated under the name podesavanjima Ppseu= <QA,QB,cA>. In the above-described authentication process podesigned user device D230, the authenticity of which is subject to authentication, must satisfy the pre-condition, namely that the user device D230 received information about the primary aliasassigned to the PIM D220. Since the set of personal parameters ∂ H1here is personal, and the first hash functionH1is irreversible, unauthorized users cannot restore the primary aliason the basis of podesavanjima and the set of public parameters, not knowing ∂ H1. Thus, the authentication result obtained by the exchange of evidence do not transmit the information on the steps S373~S379, reliable and safe. According to figure 2, the authentication process is performed between the medical system D210 and the user device D230. PIM D220 not involved in authentication and only provides a set of public parameters, the medical system D210. Regardless of whether the medical system D210 in the region PIM authentication of podesavanjima received by the user, it is possible, therefore, to authenticate provided that the medical system D21 can get a set of public parameters, published PIM D220, for example, in the network. According to a variant implementation, shown in figure 3, the medical system D210 hospital may, therefore, act as a third-party device in any region regardless of the PIM. Accordingly, the method of generation and authentication alias, as shown in figure 2, allows the user to safely use the interregional service alias. Although podesigned, provided the user device D230, authenticates the medical system D210 according to a variant implementation, shown in figure 2, the invention is not limited to this case. Alternatively, the authentication process can be implemented in the PIM D220. In this case, the user device D230 can send podesignedPpseu=<QA,QB,cA> on the PIM D220. Then PIM D220 interacts with the user device D230 for authentication podesavanjima. Because PIM D220 knows all personal settings, user device D230 can authenticate telling your primary alias Manager D220 personal identity Manager (PIM). Alternatively, authentication may be carried out through the exchange of evidence without transferring information between the PIM D220 and the user device D220. Tracking user ID</> According to figure 2, after podesigned, provided the user device D230, authenticated as genuine, as described above, the user can use various medical services in the hospital under the name podesavanjima. However, in some cases, the medical system D210 hospitals may wish to obtain a real IDIDuseruser (phase S290). When you want the real user ID, the medical system D210 sends podesignedPpseu=<QA,QB,cA>provided by the user device D230, PIM D220 at step S291 according to a variant implementation, shown in figure 2. Then, at step S293, the PIM D220 calculates the parameter Ver =ê(g∂,QA)cArequest corresponding to podeshevleniyu, on the basis of podesavanjimaPpseu= <QA,QB,cA> and g∂in the set of public parameters. Then, at step S295, the PIM D220 searches in the database, whereIDuserwith option Ver =ê(g∂,QA)cAquery. For example, for eachIDuserin the database, PIM D220 checks whether there is aID'usersatisfying the following equation. If it is determined thatI' usersatisfies the above equation with the parameterVerrequest, resultIDuseris taken as the real user ID corresponding to podeshevleniyu sent with the medical system D210. Finally, at step S297, the PIM D220 returns the result ofID'userthe medical system D210 hospital. The medical system D210 can, thus, temporarily to contact the user based on real user ID received from the PIM D220, when you need it. In the above-described process tracking identifierIDuseruser corresponding to podeshevleniyu can be found by searching the user IDs in the database. Even if the PIM D220 does not store primary alias that corresponds to the ID of theIDuseruser, according to the options of carrying out the invention corresponding to the real user ID can thus be found according to podeshevleniyu from the medical system D210. This mechanism reduces the workload on the PIM D220, while reducing its cost. Of course, the tracking method that meets the invention is not limited to this case, and to find the user ID you can use other alternative methods. The method of generating and authenticating p is avgonima according to a variant embodiment of the invention has been described in detail above with reference to figure 2. Each step is a logical block diagram shown in figure 2, can be implemented in software, hardware or their combination. Figure 4 shows an example where three objects exchange messages when the method is presented in figure 2, is implemented in hardware. According to figure 4, the PIM D220 provides a set of public parameters (message M1) of the user device D230 and medical system D210 hospital and assigns primary aliasPprime(message M3) to the user in response to the request (IDuser) register an alias (message M2) from the user device D230. The user device D230 can generate podesignedPpseuon the basis of the assigned primary aliasPprimeand send the medical system D210 podesignedPpseuand IDIDserverPIM D220 (message M4) as the registration request of the hospital. On the basis of podesavanjimaPpseuand the set of public parameters obtained from the PIM D220 identified byIDserver, the medical system D210 can authenticate the authentication of podesavanjimaPpseutransmitting the request message (message M5) on the user device 30 and receiving the response message (message M6) from the user is skogo device D230. The medical system D210 can also pass on the PIM D220 requesting request (message M7), containing podesignedPpseuto obtain from the PIM D220 real IDID'useruser corresponding to podeshevleniyu (message M8). Messages, shown in figure 4, are merely illustrative, while the invention is subject to various modifications and is not limited in this respect. Figure 5-7 shows the block diagram of each of the three objects shown in figure 4. Specialist in the art it is obvious that each block in the flowcharts figure 5-7, if desired, can be combined with other or can be divided into smaller units in accordance with their functions. Thus, the hardware structure shown in figure 5-7, given by way of example, but not limitation. Figure 5 shows the block diagram of the PIM D220. According to figure 5, PIM D210 contains block 510, block 520 generating unit 530 definitions, block 540 transmission, storage device 550, block 560 search and block 570 calculations. According to figure 5, the block 530 definitions can define a set of public parameters {g,g∂,G1,G2,ê,H2,p} and the set of public parameters used for the generation and authentication alias. The set of public parameters, you can pass through the block 540 transmission Liu the second other device, for example, user device D230 or medical system D210 hospital in any region. On the one hand, the block 510 reception, shown in figure 5, takesIDuser(message M2) from the user device D230. AcceptedIDuseris stored in the data storage device 550 for a request from the hospital. At the same time acceptedIDusergoes to block 520 generation. Based on theIDuserand set your personal settings ∂ and a specific block 530 definitions, block 520 generation can generate primary aliascorresponding toIDuser. The primary aliasPprime(message M3)generated by block 520 generation, can be sent to the user device D230 through the block 540 transfer. On the other hand, the block 510 will accept podesignedPpseu(message M7) from the medical system D210 hospital. According to figure 5, the adopted podesignedPpseuarrives at block 570 calculations to calculate the parameter Ver =ê(g∂,QA)cAquery. Block 570 calculation displays the calculated parameter Ver request block 560 search. On the basis of the input parameterVerquery block 560 search can search in the database of the storage device 550 on the subject ofID'userwith what slowjam . If it can be found, block 560 search can send foundID'userthe medical system D210 through the block 540 transmission as a user ID corresponding to podeshevleniyuPpseu(message M8). Figure 6 shows the block diagram of the user device D230 according to a variant embodiment of the invention. According to Fig.6, the user device D230 contains block 610 reception, storage device 620, block 630 generation, which includes block 632 choice and block 636 calculation unit 640 transmission and block 650 authentication, which includes block 652 obtain a session key block 654 and decryption block 656 encryption. On the one hand, block 640 transmission, shown in Fig.6, sends real IDIDuserthe user pre-stored in the storage device 620, as registration request (message M2) on the PIM D220. Then block 610 accept from the PIM D220 response registration, i.e. the primary alias(message M3). At the same time, block 610 also receives a set of public parameters {g,g∂,G1,G2,ê,H2,p} (message M1) from the PIM D220. Adopted a set of public parameters and the primary aliasPprimestored in the storage device 620 for use when generating pumps is danima. In block 630 generation unit 632 selection selects two random numbersk1andk2on the basis of the stored set of public parametersk1,k2Zpand sends them to block 636 calculations. Block 636 calculations can generate podesignedPpseu= <QA,QB,cA>k1andk2, the set of public parameters and primary aliasPprimestored in the storage device. Generated podesignedPpseu= <QA,QB,cA> and the ID of theIDserverPIM D220 (message M4) can be transferred to the medical system D210 through the block 640 transmission, for use in the hospital. On the other hand, after the block 640 transmission sends podesignedPpseu= <QA,QB,cA> in the medical system D210, the medical system D210 can authenticate the authentication of podesavanjima. For example, block 610 reception at 6 receives a messagerequest for authentication (message M5) medical system D210. The received request message arrives at block 652 obtain the session key in block 650 authentication. Block 652 obtain the session key vychislyaet the session key K*seson the basis of the set of public parameters and primary alias stored in the storage device 620 according to the following equation:
The calculated session keyK*sesarrives at block 654 decryption. Block 654 decryption decrypts the encrypted contentEnc(Kses,Nain the request message the calculated session keyK*sesto obtain a decrypted contentNa*. The decrypted contentNa*arrives at block 656 encryption. Block 656 encryption selects contentNbresponse corresponding to the decrypted contentNa*according to a predetermined rule, and encrypts the contentNbanswer computed the session keyK*sesto receive response messagesEnc(K*ses,Nb). Response messageEnc(K*ses,Nb) (message M6) can be passed through the block 640 transmission in the medical system D210 for authentication. The block authentication can be implemented by various means, not limited to the configuration shown in Fig.6. 7 shows the configuration of the medical system D210 according to a variant embodiment of the invention. According to Fig.7, the medical system D210 contains block 710 reception : size is nausea device 730, block 740 authentication and block 750 transmission. Block 740 authentication contains the block 741 selection, block 743 generation request message, block 745 decryption and block 747 definition. According to Fig.7, the block 710 accept podesignedPpseuand IDIDserverto identify the PIM D220, with which the user is actually logged. According to Fig.7, the block 710 accept podesignedPpseuand IDIDserverto identify the PIM D220, which registers the user (message M4), from the user device D230. A receiving unit (not shown) receives a set of public parameters {g,g∂,G1,G2,ê,H2,p} (message M1), published by the relevant PIM D220 through the block 710 reception, on the basis ofIDserver. AcceptedPpseuand a set of public parameters stored in the storage device 730 and sent to block 740 authentication at the same time to confirm the authenticity of thePpseuwe can authenticate in block 740 authentication. The authentication unit, shown in Fig.7, can be implemented in various ways. 7 shows only one of these methods. In particular, block 741 selection in block 740 authentication selects a random numbert Zporiginal session keyKsesand the content ofNarequest to generate a request message. The original session keyKsesis used to encrypt contentNarequest for obtaining the encrypted contentEnc(Kses,Na). Based on the selected parameter, the selected block 741 choice, podesavanjima and the set of public parameters, block 743 generation request message generates a messagerequest and sends the request message (message M5) on the user device D230 through the block 750 transmission. Then, taking the response message ofEnc(K*ses,Nb) (message M6) from the user device D230, block 710 reception sends a response message at block 740 authentication. Block 745 decryption block 740 decrypts the authentication response messageEnc(K*ses,Nb) the original session keyKses. Block 747 definition determines whether a predetermined rule between the decrypted contentNb*response contentNarequest, and determines that podesignedPpseuauthenticated as a genuine subject of a pre-defined rule. Specific embodiments of the invention described above with reference to Fig-7. In these embodiments, the implementation of the user device can safely generate at least one podesigned on the basis of primary alias from the PIM D220 at every hospital visit. Thus, according to variants of the invention, the PIM D220 not have to frequently generate aliases for the user, and the workload on PIM reduced. In addition, according to the above-described variants of the medical system D210 hospital can authenticate podesigned generated by the user, by interacting with the user device D230 on the basis of the set of public parameters obtained from the PIM D220. Thus, podesigned generated by the user, can be used in hospitals in different regions and, thus, it is possible to implement interregional service alias. Additionally, according to the above-described variants of the implementation of the PIM D220 can find the appropriate user ID, fingering theIDuserstored in the database for the corresponding user ID on the basis of podesavanjima provided by the medical system D210. Thus, the PIM D220 do not want to keep the primary alias for each user, which further reduces database requirements for PIM D220 and, thus,reduces its value. Specific embodiments of the invention described above with reference to the accompanying drawings. Note that the above-described embodiments of the above to illustrate and not to limit the invention. Specialist in the art can offer various improvements and modifications of the invention in relation to the device and method, without departing from the scope of the invention, the scope of which is defined by the claims. In addition, no symbol in the claims is not intended to limit the claims. 1. The method of controlling a personal identification containing phases in which 2. The method according to claim 1, further comprising stages, which are: 3. The method according to claim 1, additionally containing phases in which 4. The method according to claim 1, additionally containing phases in which 5. The way the management of personal identification to the user device, the method contains the steps that 6. The method according to claim 5, 7. The method according to claim 6, further comprising stages, which 8. The method according to claim 6, further comprising stages, which 9. The method according to claim 7 or 8, in which the step authentication 10. The method according to claim 9, in which at the stage of exchange of evidence without the transfer of information from the authenticator 11. The authentication alias for a third party device, the method contains the steps that 12. The method according to claim 11, in which the step authentication 13. The method according to item 12, in which at the stage of exchange of evidence do not transmit the information 14. The method according to claim 11, in which 15. Manager personal identity Manager (PIM)that contains 16. Manager personal identification § 15, in which the reception unit is additionally adapted to take podesignedPpseu= <QA,QB,cA> from third-party devices, 17. The user device containing 18. Custom device 17, in which the generating block contains 19. User device b, in which 20. The user device according to claim 19, in which the authentication unit adapted to authenticate the authentication of podesavanjimaPpseuthrough the exchange of evidence do not transmit the information with a third party. 21. The user device according to claim 20, in which the authentication unit adapted to receive the request message from the external device via the reception unit, and the request message is generated in accordance with a set of public parameters by podesavanjima Ppseuand is expressed as, 22. Third-party device with which the user requests a service, with a third-party device contains 23. Third-party device according to item 22, in which the authentication unit adapted to authenticate the authentication of podesavanjimaPpseuthrough the exchange without evidence of information transmission from the user device. 24. Third-party device according to item 23, in which the authentication unit contains 25. Third-party device according to paragraph 24, in which 26. Third-party device according to item 22, in which the external device is a medical system in the hospital.
|
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |