Search

KR-102962970-B1 - Authentication Methods and Systems For Device Personalization

KR102962970B1KR 102962970 B1KR102962970 B1KR 102962970B1KR-102962970-B1

Abstract

An authentication method for device personalization according to one embodiment of the present disclosure comprises: a step in which a device having completed the injection of common data verifies a certificate chain received from an issuing server; a step in which the device verifies an issuing server signature using a public key of the issuing server obtained as a result of verifying the certificate chain; a step in which the device generates a device signature using an initial issuing key; a step in which the issuing server verifies the device signature received from the device using the initial issuing key; and a step in which the issuing server issues individual data to the device having completed authentication.

Inventors

  • 지성연
  • 위종식
  • 구경본

Assignees

  • 유비벨록스(주)

Dates

Publication Date
20260511
Application Date
20231229

Claims (15)

  1. In an authentication method for device personalization, A step in which a device that has completed the injection of common data verifies a certificate chain received from an issuing server; The above device verifies the issuing server signature using the public key of the issuing server obtained as a result of verification of the certificate chain; The above device generates a first session key using a device random, a server random, and an initial issuance key, and generates a device signature by encrypting the device random and the server random using the first session key; The issuing server generates a second session key using the device random, the server random, and the initial issuance key, and verifies the device signature received from the device using the second session key; and The above issuance server includes the step of issuing individual data to the above device that has completed authentication; wherein A method in which the first session key and the second session key are a pair of symmetric keys.
  2. In Article 1, The above common data is, A method comprising the initial issuance key and certificate information of a Root CA certificate included in the certificate chain.
  3. In Article 1, The step of verifying the above certificate chain is, A step of verifying a higher-level certificate included in the certificate chain using certificate information included in the common data; and A method comprising the step of verifying the signature of an issuing server certificate included in the certificate chain using a public key included in the upper certificate.
  4. In Article 1, The step of verifying the above-mentioned issuing server signature is, The step of the above device generating the device random and transmitting it to the issuing server; A step in which the issuing server generates the server random, and generates the issuing server signature using the device random, the server random, and the secret key of the issuing server; The above issuing server transmits the server random and the issuing server signature to the device; and A method comprising the step of the device verifying the issuing server signature using the public key of the issuing server.
  5. delete
  6. delete
  7. In Article 1, The step of issuing the above individual data is, The issuing server includes the step of encrypting the individual data using the second session key and issuing the encrypted individual data to the device. A method comprising the step of the above device decrypting the encrypted individual data using the first session key and storing the decrypted individual data.
  8. A computer-readable recording medium having a program for executing the method of claim 1 on a computer.
  9. In an authentication system for device personalization, Device in which the injection of common data is completed; and Includes an issuance server that issues individual data to an authenticated device; and The above device is, The method includes verifying a certificate chain received from the issuing server, verifying the issuing server signature using the public key of the issuing server obtained as a result of verifying the certificate chain, generating a first session key using a device random, a server random, and an initial issuance key, and generating a device signature by encrypting the device random and the server random using the first session key. The above issuance server is, Generating a second session key using the device random, the server random, and the initial issuance key, and verifying the device signature received from the device using the second session key, wherein A system in which the first session key and the second session key are a pair of symmetric keys.
  10. In Article 9, The above common data is, A system comprising the above initial issuance key and certificate information of a Root CA certificate included in the above certificate chain.
  11. In Article 9, The above device is, A system comprising verifying a parent certificate included in the certificate chain using certificate information included in the common data, and verifying the signature of an issuing server certificate included in the certificate chain using a public key included in the parent certificate.
  12. In Article 9, The above device is, It includes generating a random number from the device, transmitting it to the issuing server, and verifying the issuing server signature using the issuing server's public key. A system in which the above-mentioned issuing server signature is generated using the above-mentioned server random, the above-mentioned device random, and the above-mentioned issuing server's secret key.
  13. delete
  14. delete
  15. In Article 9, The issuing server encrypts the individual data using the second session key and issues the encrypted individual data to the device. A system comprising the above device decrypting the encrypted individual data using the first session key and storing the decrypted individual data.

Description

Authentication Methods and Systems For Device Personalization The present disclosure relates to an authentication method and system for device personalization. The issuing server injects not only common data such as operating systems (OS) and applications, but also individual data such as individual keys, public keys, and certificates into the secure element (SE) used in IoT devices, cards, and various user terminals, and provides them to the user. Here, common data such as the operating system (OS) and applications are all injected identically into the security chip (SE) so that it can be used when the security chip (SE) performs its basic functions. In contrast, for the security chip (SE) to perform network security functions such as authentication and personal data exchange, it must be personalized by receiving individual data such as private keys, public keys, and certificates. Meanwhile, the issuing server must manage individual data, such as master keys, public key pairs, and certificates, while maintaining security in order to inject individual data, and the issuance time required to inject individual data into each security chip (SE) also increases. The aforementioned background technology is technical information that the inventor possessed for the derivation of the present invention or acquired during the process of deriving the present invention, and it cannot be considered as prior art disclosed to the general public prior to the filing of the present invention. FIG. 1 is a diagram illustrating an example of an authentication system for device personalization according to one embodiment. FIG. 2 is a configuration diagram illustrating an example of the internal configuration of an issuance server of an authentication system according to one embodiment. FIG. 3 is a configuration diagram illustrating an example of the internal configuration of a device of an authentication system according to one embodiment. FIG. 4 is a flowchart illustrating an example of an authentication method for device personalization according to one embodiment. FIG. 5 is a flowchart illustrating another example of an authentication method for device personalization according to one embodiment. FIG. 6 is a flowchart illustrating another example of an authentication method for device personalization according to one embodiment. The advantages and features of the present invention, and the methods for achieving them, will become clear by referring to the embodiments described in detail together with the accompanying drawings. However, the present invention is not limited to the embodiments presented below, but can be implemented in various different forms and should be understood to include all modifications, equivalents, and substitutions that fall within the spirit and scope of the present invention. The embodiments presented below are provided to ensure that the disclosure of the present invention is complete and to fully inform those skilled in the art of the scope of the invention. In describing the present invention, detailed descriptions of related known technologies are omitted if it is determined that such detailed descriptions may obscure the essence of the present invention. The terms used in this application are used merely to describe specific embodiments and are not intended to limit the invention. The singular expression includes the plural expression unless the context clearly indicates otherwise. In this application, terms such as “comprising” or “having” are intended to specify the presence of the features, numbers, steps, actions, components, parts, or combinations thereof described in the specification, and should be understood as not precluding the existence or addition of one or more other features, numbers, steps, actions, components, parts, or combinations thereof. Some embodiments of the present disclosure may be represented by functional block configurations and various processing steps. Some or all of these functional blocks may be implemented by various numbers of hardware and/or software configurations that execute specific functions. For example, the functional blocks of the present disclosure may be implemented by one or more microprocessors or by circuit configurations for a specific function. Additionally, for example, the functional blocks of the present disclosure may be implemented in various programming or scripting languages. The functional blocks may be implemented as algorithms executed on one or more processors. Furthermore, the present disclosure may employ prior art for electronic configuration, signal processing, and/or data processing, etc. Terms such as “mechanism,” “element,” “means,” and “configuration” may be used broadly and are not limited to mechanical and physical configurations. Furthermore, the connecting lines or connecting members between the components depicted in the drawings are merely illustrative of functional connections and/or physical or circuit connections. In t