A method of identity authentication based on n-dimensional sphere

A technology of identity authentication and user identity, applied in the field of identity authentication based on N-dimensional sphere, can solve problems such as complex technology, high cost, and obstacles to promotion and application

Inactive Publication Date: 2012-02-22
SOUTH CHINA UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using biometric authentication technology, it is no longer necessary to memorize and set passwords, and it is more convenient to use, but the high cost and complicated technology hinder its promotion and application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of identity authentication based on n-dimensional sphere
  • A method of identity authentication based on n-dimensional sphere
  • A method of identity authentication based on n-dimensional sphere

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0099] A typical identity authentication system architecture is as follows: figure 1 As shown, the system includes an authentication server (CA), and user 1 and user 2. The authentication server (CA) and each user are connected through the Internet.

[0100] Such as figure 2 As shown in , after initialization, the authentication server (CA) sets relevant parameters, wherein the parameters in the solid line box are kept secret, and the dotted line boxes are public parameters. This embodiment selects the situation of N=2 to give a specific explanation, because in a 2-dimensional space, a "2-dimensional sphere" is actually a "circle", so in the following description, the term "2-dimensional circle" is used instead of "N Dimensional surface". As shown in the figure, the 2-dimensional vector S 1 and S 2 is a secret vector kept in secret (here, only a 2-dimensional vector is selected for simple explanation, and a higher-dimensional vector can be selected as a secret vector in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An identity authentication method based on N-dimensional sphere is provided by the present invention. An authentication server accepts a user registration and an identity verification after initialization; when a new user registers, the user computes a vector via a security one-way function according to a password selected by himself and submits it to the authentication server, the authentication server appoints an IDg as an identifier of the user identity for the user; the authentication server determines a N-dimensional sphere by combining its own secret vectors and the vector submitted by the user; the authentication server selects several different points on the N-dimensional sphere randomly, forms an encrypted file with them and sends it to the user via a security channel; when requiring for identity authentication, the user performs computation by using his own password and the encrypted file containing the identity authentication identifier, and transmits the result to the authentication server. After performing computation, the authentication server verifies and determines whether the user identity should be accepted. The present invention can reduce the storing information and the calculation amount of the authentication server efficiently, and can prevent fake authentication servers.

Description

technical field [0001] The invention relates to an identity authentication method in computer system security and network security, in particular to an identity authentication method based on an N-dimensional sphere. Background technique [0002] With the development of online transactions, e-commerce, and e-government, endless cybercrimes have caused a crisis of trust in people's online identities, so identity authentication has become more and more important. Identity authentication technology can be closely combined with business processes of enterprises and governments to prevent illegal access to important resources. It can also be said that identity authentication is the basis of the entire information security system. At present, the commonly used identity authentication methods include: password, dynamic password, smart card authentication, public key infrastructure (PKI), biometric authentication, etc. [0003] The basic idea of ​​password authentication is that e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30
CPCH04L9/32H04L9/3226
Inventor 唐韶华张华卢伯荣
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products