Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile commerce identity authentication method

An identity authentication and business technology, applied in the field of mobile business information security, can solve the problems that traditional authentication protocols cannot be directly applied to mobile business environment, password sequence method decimal attack, time synchronization scheme is not easy to implement on mobile network, etc.

Inactive Publication Date: 2011-02-09
BEIJING JIAOTONG UNIV
View PDF1 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing identity authentication systems use public-key cryptography, and the public-key cryptography is mostly based on large number calculations, resulting in a huge computational load for the entire authentication system. This is the main reason why traditional authentication protocols cannot be directly applied to the mobile business environment. reason
[0006] (3) A limited-length password sequence or hash chain needs to be registered repeatedly
And if the fixed-length hash chain value is calculated once at the mobile terminal, since the length N is usually a large integer, multiple hashes will affect the authentication efficiency of the mobile terminal
[0007] (4) The password sequence method is vulnerable to decimal attacks
[0008] (5) The computing load of the challenge / response method may not meet the computing power of the mobile terminal
The challenge / response method is mostly used in PC calculations in fixed networks, and the overly complex response algorithm is not suitable for mobile terminals
[0009] (6) The time synchronization scheme is not easy to implement in the mobile network
Since the construction and development of trusted third-party certification bodies for mobile commerce are still inferior to fixed networks, the cost of using timestamps to achieve synchronization in mobile networks is huge
[0010] (7) Most OTP methods do not support two-way authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile commerce identity authentication method
  • Mobile commerce identity authentication method
  • Mobile commerce identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] Authentication model architecture such as figure 1 As shown, the model divides the authentication into two levels, the first level is the authentication of the identity of the user 1 by the mobile device 2, and the second level is the two-way identity authentication between the mobile device 2 and the authentication server 3. The first level verifies that the user 1 using the mobile device 2 is a legitimate user, and the second level verifies the legitimacy of the mobile device 2 and the authentication server 3, that is, it is not a counterfeit terminal. If the first-level verification fails, there will be no communication between the mobile device 2 and the authentication server 3 . If the first-level verification is passed, the mobile device 2 automatically communicates with the authentication server 3, and the user 1 cannot see the process and can only know whether the verification is passed.

[0084] like Figures 2 to 4 The flowcharts are the registration stage, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mobile commerce identity authentication method. In the method, key negotiation is realized by the most efficient elliptic curve-based public key cryptosystem in public key cryptosystems. An elliptic curve algorithm has the characteristics of low calculated amount and high safety, so the elliptic curve algorithm is used for generating a public key and a private key, and a public key cryptosystem without a third-party is realized and applied to the two-way authentication service of a client and a server.

Description

technical field [0001] The invention belongs to the technical field of mobile commerce information security, and in particular relates to a mobile commerce identity authentication method and system. Background technique [0002] According to the security issues considered by traditional e-commerce and the characteristics of mobile commerce itself, the security of mobile commerce needs to achieve the security of the mobile terminal itself, the security of the wireless communication network, the identity authentication and non-repudiation of both parties in the mobile commerce transaction. Each aspect of the requirements, these four security requirements are all based on the authentication problem as the basis for realizing the security requirements. It can be seen that the status of the identity authentication system in the security system is extremely important. It is the most basic security service, and other security services must rely on it. Once the identity authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 华蕊张润彤尚小溥李丹丹谷秀君杨泽东朱晓敏
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products