Mobile commerce identity authentication method

A technology for identity authentication and business, which is applied in the field of mobile business information security, and can solve the problems that the computing load does not meet the computing power of the mobile terminal, the decimal attack of the password sequence method, and the OTP method does not support two-way authentication, etc.

Inactive Publication Date: 2013-08-21
BEIJING JIAOTONG UNIV
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing identity authentication systems use public-key cryptography, and the public-key cryptography is mostly based on large number calculations, resulting in a huge computational load for the entire authentication system. This is the main reason why traditional authentication protocols cannot be directly applied to the mobile business environment. reason
[0006] (3) A limited-length password sequence or hash chain needs to be registered repeatedly
And if the fixed-length hash chain value is calculated once at the mobile terminal, since the length N is usually a large integer, multiple hashes will affect the authentication efficiency of the mobile terminal
[0007] (4) The password sequence method is vulnerable to decimal attacks
[0008] (5) The computing load of the challenge / response method may not meet the computing power of the mobile terminal
The challenge / response method is mostly used in PC calculations in fixed networks, and the overly complex response algorithm is not suitable for mobile terminals
[0009] (6) The time synchronization scheme is not easy to implement in the mobile network
Since the construction and development of trusted third-party certification bodies for mobile commerce are still inferior to fixed networks, the cost of using timestamps to achieve synchronization in mobile networks is huge
[0010] (7) Most OTP methods do not support two-way authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile commerce identity authentication method
  • Mobile commerce identity authentication method
  • Mobile commerce identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] Authentication model schema such as figure 1 As shown, the model divides the authentication into two levels. The first level is the authentication of the identity of the user 1 by the mobile device 2, and the second level is the two-way identity authentication between the mobile device 2 and the authentication server 3. The first level verifies that the user 1 using the mobile device 2 is a legitimate user, and the second level verifies the legitimacy of the mobile device 2 and the authentication server 3, that is, it is not a counterfeit terminal. If the first-level verification fails, then the mobile device 2 and the authentication server 3 will not communicate. If the first-level verification is passed, the mobile device 2 automatically communicates with the authentication server 3, and the user 1 is invisible to the process and can only know whether the verification is passed.

[0085] like Figures 2 to 4 They are the flow charts of the registration phase, login ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile commerce identity authentication method. In the method, key negotiation is realized by the most efficient elliptic curve-based public key cryptosystem in public key cryptosystems. An elliptic curve algorithm has the characteristics of low calculated amount and high safety, so the elliptic curve algorithm is used for generating a public key and a private key, and a public key cryptosystem without a third-party is realized and applied to the two-way authentication service of a client and a server.

Description

technical field [0001] The invention belongs to the technical field of mobile commerce information security, and in particular relates to a mobile commerce identity authentication method and system. Background technique [0002] According to the security issues considered by traditional e-commerce and the characteristics of mobile commerce itself, the security of mobile commerce needs to meet the security of the mobile terminal itself, the security of the wireless communication network, and the identity authentication and non-repudiation of both parties in the mobile commerce. These four security requirements all take identity authentication as the basis for realizing the security requirements. It can be seen that the status of the identity authentication system in the security system is extremely important, and it is the most basic security service, and other security services must depend on it. Once the identity authentication system is breached, all the security measures...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 华蕊张润彤尚小溥李丹丹谷秀君杨泽东朱晓敏
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products