Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User ID authentication method and system based on quantum network

A technology of user identity and verification method, which is applied in the direction of user identity/authority verification, transmission system, electrical components, etc., can solve problems such as insecurity and operation insecurity, and achieve the effects of protecting information security, improving transmission efficiency and transmission security

Inactive Publication Date: 2010-10-06
朱律波
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the above-mentioned scheme has the following disadvantages: First, in order to ensure the uniqueness of the identity, both the authentication center and the user must save the user's private information. In the above-mentioned scheme, the storage and verification of the private information are all completed in the computer. Computers are not a safe environment, therefore, it is not safe for users' private information to be calculated in computers; second, in the process of users sending information in a quantum state, eavesdroppers can eavesdrop on part of the data without being detected, and this Quantum state information is generated by the user's private key. Therefore, an eavesdropper can steal part of the private key. When the eavesdropper eavesdrops enough times, the entire key information can be obtained. Therefore, the above quantum public key authentication method is not safe.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User ID authentication method and system based on quantum network
  • User ID authentication method and system based on quantum network
  • User ID authentication method and system based on quantum network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to enable those skilled in the art to better understand the technical solution of the present invention, the quantum network-based user identity verification method and system provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0048] The user identity verification method based on the quantum network provided by the present invention is used to realize the identity verification between the user and the verification center through the quantum network.

[0049] see figure 1 , the quantum network-based user authentication method provided by the present invention includes the following steps:

[0050] Step 10), the verification center makes an identity verification card for each user, and backs up the private information corresponding to the user's identity verification card. The authentication card stores the user's private information in the form of a data matrix, where the data element a in the data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user ID authentication method and system based on a quantum network, which comprises the following steps that: an authentication center issues an ID authentication card; a user sends an authentication request; a quantum communication protocol creates shared data; the user summates the shared data and calculates the bit error rate, and the authentication center selects part of the summated shared data as a polarization mode after determining that the bit error rate belongs to a preset threshold range; the authentication center sends a pseudo selection code and a correction code; the user calculates a selection code according to the pseudo selection code and the correction code so as to obtain an ID authentication code; the users mutually authenticate or the user authenticates with the authentication center; and the authentication center backups the authentication result. The user ID authentication method can effectively protect the private information of the user, and has the advantages of safety and reliability. The invention also provides a user ID authentication system based on the quantum network, which similarly can effectively protect the private information of the user, and has the advantages of safety and reliability.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a quantum network-based user identity verification method and system. Background technique [0002] With the rapid development of computer and network technology, people can achieve more and more things through the Internet. At the same time, the information security problem in the network has been highly valued by all countries in the world because it involves many important fields such as military affairs, economy, and politics. [0003] Private information is the only important information that can prove the user's identity in cyberspace. To ensure information security, it is necessary to confirm the user's identity and not leak the user's private information at the same time. Therefore, effectively protecting the security of private information is the key to ensuring network security. At present, the security measures taken by people mainly use some enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 朱律波
Owner 朱律波
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products