Identity authentication method based on S/Key system

An authentication method and one-time technology, applied in the field of identity authentication, can solve the problems of S/Key system defects, S/Key system cannot resist decimal attacks, easy to be illegally intercepted, etc., to avoid decimal attacks, high security, improve safety effect

Inactive Publication Date: 2008-05-07
LANZHOU UNIVERSITY +1
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the S/Key system still has serious flaws
Firstly, the S/Key system cannot resist decimal attacks; secondly, if the attacker obtains the user's secret password through keyboard monitoring and other attack methods, he can still pretend to be a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on S/Key system
  • Identity authentication method based on S/Key system
  • Identity authentication method based on S/Key system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] A two-way identity authentication method based on the combination of a one-time password of the S / Key system and biometric identification comprises the following steps:

[0032] (1) The client user sends an identity authentication request to the server;

[0033] User ID A ;

[0034] (2) The server sends a response message to the client according to the username sent by the client:

[0035] The server sends the iteration value N, the seed value S and the one-time password P used to decrypt the biometric value during the last authentication to the client i-1 ;

[0036] (3) The client calculates the current one-time password according to the current iteration value N-i, the seed value S, and the secret passphrase W. Calculated as follows:

[0037] P i =H N-i (W+S);

[0038] (4) The client saves the current password P i , and for the current password P i Perform another hash operation, calculated as follows:

[0039] P' i-1 =H(P i );

[0040] The client will P...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to an ID identification method based on the S/Key system. The present invention submits the registration data comprising a user name, a code and password, iteration value and the biological property value to an identification server through a user side; the server forms the seed value corresponding to the user and calculates the first one-off password of the password sequence. A duplex identification between the client side and the server which is also the duplex identification of the combination of the one-off password of the registered user and the biological proper value is implemented in the process of user ID identification. .

Description

technical field [0001] The invention relates to an identity authentication method in the field of computer network security, in particular to an identity authentication method based on an S / Key system. Background technique [0002] Identity authentication is the first barrier in the network security system, and other security services depend on it. Once the identity authentication system is breached, all the security measures of the system will be useless. At present, the main identity authentication method is still static identity authentication based on user name / password. However, there are many disadvantages in this authentication. Firstly, the user must memorize some complex passwords, and secondly, the static passwords are easy to be intercepted during transmission. Currently, a more secure identity authentication method is to adopt a one-time password authentication method, or an identity authentication method of biometric identification. The main idea of ​​one-tim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06K9/00H04L12/28H04L29/06
Inventor 申永军陈平徐华龙陈文江
Owner LANZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products