Identification authentication method based on N-dimension sphere

A technology of identity authentication and user identity, applied in the field of identity authentication based on N-dimensional sphere, can solve problems such as complex technology, high cost, and obstacles to promotion and application

Inactive Publication Date: 2009-08-19
SOUTH CHINA UNIV OF TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using biometric authentication technology, it is no longer necessary to memorize and set passwords, and it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification authentication method based on N-dimension sphere
  • Identification authentication method based on N-dimension sphere
  • Identification authentication method based on N-dimension sphere

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0099] A typical identity authentication system architecture is as follows: figure 1 As shown, the system includes an authentication server (CA), and user 1 and user 2. The authentication server (CA) and each user are connected through the Internet.

[0100] Such as figure 2 As shown in , after initialization, the authentication server (CA) sets relevant parameters, wherein the parameters in the solid line box are kept secret, and the dotted line boxes are public parameters. This embodiment selects the situation of N=2 to give a specific explanation, because in a 2-dimensional space, a "2-dimensional sphere" is actually a "circle", so in the following description, the term "2-dimensional circle" is used instead of "N Dimensional surface". As shown in the figure, the 2-dimensional vector S 1 and S 2 is a secret vector kept in secret (here, only a 2-dimensional vector is selected for simple explanation, and a higher-dimensional vector can be selected as a secret vector in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method based on an N-dimensional spherical surface, which comprises: an authentication server receives registration and identity authentication of users after being initialized; when a new user registers, the user calculates a vector by a safe one-way function according to passwords selected and submits the vector to the authentication server; the authentication server specifies an IDg for the user as the identification of the identity of the user; the authentication server combines a self secrete vector with the vector submitted by the user to determine the N-dimensional spherical surface; the authentication server randomly selects a plurality of different points on the N-dimensional spherical surface to form an encrypted file which is sent to the user through a safe channel; when the user requires identity authentication, the passwords and the encrypted file containing identity identification are utilized to calculate; the result of calculation is sent to the authentication server; and the authentication server checks and determines whether to accept the identity of the user after calculation. The method can effectively reduce the stored information and calculation load of the authentication server and prevent imitating the authentication server.

Description

technical field [0001] The invention relates to an identity authentication method in computer system security and network security, in particular to an identity authentication method based on an N-dimensional sphere. Background technique [0002] With the development of online transactions, e-commerce, and e-government, endless cybercrimes have caused a crisis of trust in people's online identities, so identity authentication has become more and more important. Identity authentication technology can be closely combined with business processes of enterprises and governments to prevent illegal access to important resources. It can also be said that identity authentication is the basis of the entire information security system. At present, the commonly used identity authentication methods include: password, dynamic password, smart card authentication, public key infrastructure (PKI), biometric authentication, etc. [0003] The basic idea of ​​password authentication is that e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30
CPCH04L9/32H04L9/3226
Inventor 唐韶华张华卢伯荣
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products