Identity authentication method based on visual cryptography

A technology of identity authentication and visual cryptography, which is applied in the field of information security and can solve problems such as identity authentication methods that have not yet been discovered

Inactive Publication Date: 2012-02-01
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, there is no relevant information on the identity authentication method under the condition of dynamic password using the principle of visual cryptography technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on visual cryptography
  • Identity authentication method based on visual cryptography
  • Identity authentication method based on visual cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be described in detail below in conjunction with examples.

[0043] figure 1 It is a schematic flow chart of the principle of the present invention, Figure 2 to Figure 5 It is an example diagram of simulation experiment 1 carried out by using a specific embodiment of the present invention, Figure 6 to Figure 9 It is the result of the second simulation experiment using the specific embodiment of the present invention.

[0044] like figure 1 As shown, the present invention is divided into two steps, and the first step is the registration of a new user. Randomly select the basic map points composed of 2*2 pixels to arrange, generate a new user's mask map, distribute the mask map to the new user, and send other information of the new user (such as the user's name, valid certificate number and other user personal information) and the mask Figure 1 will be stored in the database as the registration information of the new user. like figure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method realizing a dynamic password encryption mode. The technical scheme comprises the following steps of: I, registering a new user, generating a mask picture M of the new user, and storing the other information and the mask picture M of the new user in a database as the registration information of the new user; II, authenticating the legal identity of the user; if the identity of any user needs authentication, executing the following steps: (1) generating a random cipher; (2) generating a cipher picture; (3) generating a cipher sub-picture;and (4) entering passwords to prove whether the user to be authenticated is a registered user. The invention has the beneficial effects that dynamic passwords can be realized, the decryption mode is simple, and the security is high. In spite of dynamic passwords, cipher transfer is not involved in the authentication process, thus the security is further improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and more specifically, the invention relates to an identity authentication method realized by using visual passwords. Background technique [0002] The principle of visual cryptography is that the original image is decomposed into two random visual codon graphs, and it is impossible to obtain the original image information from a single visual code subgraph. The original image could only be reproduced if the two visual codon maps were completely coincident. [0003] In the current information security field, the identity authentication environment of legitimate users plays a very important role. Only on the basis of safe and reliable authentication can various user activities be carried out safely and efficiently. [0004] Regardless of the remote authentication system on the network or the actual identity authentication link, most authentication systems currently use traditional st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06T1/00
CPCH04L9/3226G09C5/00
Inventor 张权温沙蒙张翔卢哲俊鲜明董健
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products