Check patentability & draft patents in minutes with Patsnap Eureka AI!

Personal identification process for dynamic cipher password bidirectional authentication based on multiple variables

A technology of dynamic password and authentication method, which is applied in the field of two-way authentication and information security, and can solve the problems of difficult large-scale popularization and use of the system, system incompatibility and transformation cost, long time and other problems

Inactive Publication Date: 2013-07-10
北京唐桓科技发展有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing two-way authentication protocols are basically realized by using digital certificates (PKI), but the system that uses digital certificates for two-way authentication also has problems such as difficult use by users, high construction costs of the authentication system, incompatibility with existing systems, and the need for transformation. Disadvantages such as high cost and long time make it difficult to promote the use of digital certificate systems on a large scale
Some systems simply use mutual challenge / response (challenge / response) between the server and the client to perform two-way authentication, and there will also be certain security holes (such as parallel session attacks, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal identification process for dynamic cipher password bidirectional authentication based on multiple variables
  • Personal identification process for dynamic cipher password bidirectional authentication based on multiple variables
  • Personal identification process for dynamic cipher password bidirectional authentication based on multiple variables

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0051] This example demonstrates the normal login process of the user, the schematic diagram is attached Figure 4 .

[0052] In the first step, the client submits the user account "Test001" and the static password "MyBirthDay+1" to the server, and the user's IP address is "61.134.1.1". After the authentication server receives the data submitted by the user, it retrieves the relevant authentication information according to the user account, and verifies that the user's static password is correct. Then set the flag Fs to 1, increase the synchronous counter value Ns by 1, that is, change from 0 to 1, and record the user's IP address.

[0053] The authentication server forwards the generated dynamic password "17297397" to the user in the second step, and the user judges the authenticity of the server based on this password. The user receives the password sent by the server, and then generates a password on his own password token. At this time, the synchronization counter value ...

example 2

[0056] This example demonstrates the principle of preventing the "Secret Treasure Terminator" Trojan horse attack, the schematic diagram is attached Figure 5 .

[0057] Assume that the attacker has obtained the account number and static password of the user in Example 1 by using the Trojan horse program "Secret Treasure Terminator" and other Trojan horse programs, and intercepted the dynamic password "95017043" submitted by the user to the authentication server in the third step of the authentication process. ", and at the same time modify the content in the user authentication data package, the user's dynamic password authentication process is unsuccessful. At this time, the state characteristics of the authentication server end are: the synchronization count value Ns=2, and the static password authentication success flag Fs=0. The following is the authentication process after the attacker obtains the user's dynamic password:

[0058] The attacker enters the user account "...

example 3

[0062] This example demonstrates the principle of preventing "parallel session attack", the schematic diagram is attached Image 6 .

[0063] The so-called "parallel session attack" means that the attacker deliberately runs multiple protocol processes concurrently, in an attempt to obtain the answer needed by a certain process in multiple running processes.

[0064] The first step of the attacker is to enter the user name "Test001" and the correct static password on the machine with the IP address "61.138.1.2", and the server sends a password "20014829" after passing the verification. Then enter the user name "Test001" and the correct static password on another machine with the IP address "61.138.1.3", and the server sends a password "07196154" after passing the verification, so the attacker can Complete the first authentication process, enter the password "07196154" on the machine with the IP address "61.138.1.2", and at this time the synchronization counter value on the aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides multivariable dynamic password two-way authentication based identification method technique. The core of the invention is the dynamic password generation technique adopting event synchronization, and by adopting the method in which a client end synchronizes a server end, a secure authentication flow is established. The technique not only can prevent attack by the various prior attack methods, but also is fully compatible with a prior static password authentication based network application system. The technique has the advantages of low upgrading and modifying costs of the system, short time needed for upgrading and modification of the system and unchanged use habit of a user; moreover, a user can independently determine whether the strong identity authentication method is selected to protect the security of an account number, so the method technique meets the security needs of users at different levels.

Description

technical field [0001] The present invention relates to identity identification and authentication technology in the field of information security, in particular to the technical field of dynamic password encryption based on one-time pad and the technical field of bidirectional authentication in network systems based on B / S and C / S frameworks. Background technique [0002] Identity authentication is an indispensable and crucial step to ensure the safe and stable operation of the system. When the user accesses the application system, he should first verify whether the user's identity is consistent with the claimed one through some authentication mechanism. Currently commonly used identity authentication technologies include static password authentication and dynamic password authentication. [0003] The static password authentication method adopts the authentication method of "user account + static password = someone's identity", and the password is set by the user. When lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 李春林李军平
Owner 北京唐桓科技发展有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More