Customer authentication method, system, server and customer node

A user authentication and user node technology, applied in the field of network information security, can solve problems such as complex design and increased maintenance costs, and achieve the effects of enhanced security, easy maintenance, and two-way authentication

Inactive Publication Date: 2011-05-18
SHANGHAI JIAO TONG UNIV +1
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025]1. Need to use symmetric encryption algorithm, so the software (hardware) design is relatively complicated;
[0026]2. The server needs to maintain the verification table for storing (ID, E(K, pw)), which increases the maintenance cost;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Customer authentication method, system, server and customer node
  • Customer authentication method, system, server and customer node
  • Customer authentication method, system, server and customer node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] An embodiment of the present invention provides a user authentication method, the method comprising:

[0055] The server receives the identity information submitted by the user, generates a user password, and sends registration information including the user password and valid period to the user; the user generates login information parameters, and sends login information to the server; Click Generate User Session Key Parameters, and send the user session key parameters to the user; the user generates the user session key according to the received user session key parameters; the server and the user authenticate according to the session keys generated respectively.

[0056] Wherein, the algebraic curve may be an elliptic curve, a hyperelliptic curve or a conic curve. As shown in Figure 1, in the embodiment of the present invention, the user U is used as the user who accesses the resources, the server S is used as the trusted server providing resources, and the algebraic...

Embodiment 2

[0081] As shown in Figure 2, the embodiment of the present invention provides a method for the user to change the login password after mutual authentication has been passed between the user and the server. The specific steps of the method are as follows:

[0082] Step 201: The user U sends the identity ID, the old password pw and the valid period i to the server S through the secure channel established after mutual authentication with the server S;

[0083] Step 202: After the server receives the ID, the old password pw and the validity period i, check the equation pw=[h(K||ID||i)] k Whether it is established, if it is established, then the server S selects a new valid period i' and pw'=[h(K||ID||i')] k , and send (pw', i') to user U through a secure channel, so that the user gets new passwords pw' and i'.

[0084] In the method for a user to change a login password provided by the embodiment of the present invention, the server generates a new valid period and a new password...

Embodiment 3

[0086] As shown in Figure 3, an embodiment of the present invention provides a system for user authentication, including:

[0087] The server is used to receive the identity information submitted by the user node, select a valid period, generate a user password according to the identity information and the valid period, and send registration information including the user password and the valid period to the user node; and after receiving the login information of the user node, Generate server session key according to identity information, login information parameters and valid period, generate user session key parameter according to generation point of algebraic curve, send user session key parameter to user node; authenticate according to server session key and user node , after the authentication is passed, the user is authorized to access the resource.

[0088] The user node is used to submit identity information to the server. After receiving the registration information,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authentication method, a system, a server and a user node, which belongs to the field of network information safety. The method comprises the following steps: the server receives identify information referred by users, and sends registration information consisting of user passwords and effective duration to users; the users generate landing information parameters according to the user passwords and generation original points of an algebraic curve, and send landing information to the server; the server generates conversation keys of the server according to the identify information, the landing information parameters and the effective duration, and sends user conversation key parameters to the users; the users generate the user conversation keys; and the server and the users are mutually authenticated according to the conversation keys respectively generated. The system is composed of the server and the user node. The invention optimizes user authentication through structuring an algebraic curve group and using a safe hash function. The server has the advantages of simple maintenance and safety enhancement. Besides, the invention is also suitable for the user authentication under a grid calculation platform.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a user authentication method, system, server and user node. Background technique [0002] In recent years, grid computing has been extensively and deeply studied both in the academic field and in the field of applied research. Grid computing, as a distributed computing model, represents a new class of systems. These systems can combine various heterogeneous computing resources, such as computers, storage space, sensors, application software and experimental results, through Internet connections, thus providing convenient access to a wider range of user groups. For example, when users request some computing and data resources, the grid can provide them seamlessly, transparently, and dynamically through the Internet, in a way that is very similar to the electricity network supplying power to end users. [0003] However, since the purpose of grid computing is to only pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/08G06F21/445H04L9/3242H04L9/3273H04L9/32H04L9/0844
Inventor 曹珍富董晓蕾陆荣幸位继伟
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products