Identity authentication method adopting password firewall

A technology of identity authentication and password authentication, applied in the field of information security, can solve problems such as inconvenience and increase the cost of computer application system construction and operation, and achieve the effect of careful security protection and low cost

Inactive Publication Date: 2011-05-04
郑建德
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This situation not only increases the cost of computer application system construction and operation, but also brings inconvenience and confusion to users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method adopting password firewall
  • Identity authentication method adopting password firewall
  • Identity authentication method adopting password firewall

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Please refer to figure 1 , the present invention is an identity authentication method using a password firewall, the system applied to the method physically / logically includes a password firewall, a private key generator, a user terminal and a password authentication server, wherein the private key generator can be regarded as a password firewall The client side is physically / logically outside the password firewall, and the password authentication server is physically / logically inside the password firewall. This identity authentication method is made up of initialization mechanism (A) and user identity authentication mechanism (B), it is characterized in that: described initialization mechanism (A) comprises the steps:

[0036] Step (A1), the private key generator performs an initialization operation, uses software or hardware to randomly generate two secret large prime numbers, which are recorded as p and q respectively, and uses them to form the master key required by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity authentication method adopting a password firewall. An initialization mechanism of the identity authentication method comprises the following steps: carrying out an initialization operation; establishing an account number and registering a password; applying a private key based on the password; calculating a public key based on the password; and extracting the private key based on the password. A user identity authentication mechanism comprises the following steps: sending out a request; generating an inquiry code; calculating a message; generating a digital signature; returning to the password firewall by a response code; calculating the public key of a user; reversely calculating the password of the user; and logging in a password authentication server by a user agent. The identity authentication method converts a password authentication mechanism of the physical / logical inner side of the firewall into an inquiry-response authentication mechanism of the physical / logical outer side of the firewall so as to overcome the weak point of password authentication and improve the safety of the authentication system. The inquiry-response authentication mechanism adopts the digital signature based on the password and provides the authentication service of the signature public key without depending on a public key infrastructure. The digital signature adopts a novel and quick algorithm with the speed hundreds of times higher than that of a conventional algorithm so as to be convenient for curing in a token.

Description

technical field [0001] The invention belongs to the technical field of information security, and more specifically relates to a challenge-response identity authentication method using a novel digital signature method. Background technique [0002] User identity authentication is the basis of computer system security. If the identity of system visitors cannot be reliably confirmed, other security measures will be useless. Although the traditional password authentication technology developed in the stand-alone era is relatively mature, and has the advantages of portability and high efficiency, its security strength is not high enough, and it is vulnerable to eavesdropping, replay, brute force and other attacks. After entering the network era, distributed computer application systems are increasingly developed, and the above authentication technologies can no longer meet their growing needs. [0003] Using conventional digital signature algorithm with challenge-response authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L9/32H04L29/06
Inventor 郑建德
Owner 郑建德
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products