A Double Verification Method for Remote User Password Based on Smart Card

A technology of double authentication and remote user, applied in the field of dual authentication of remote user password based on smart card, it can solve the problems of unable to resist replay attack, refusal of server attack to lose smart card attack, unable to resist three types of attack, unable to realize user anonymity, etc. , to achieve the effect of realizing user anonymity, overcoming denial server attacks and user impersonation attacks, and resisting smart card loss attacks

Active Publication Date: 2016-10-26
SHANDONG UNIV OF SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, Khan et al. found that the method proposed by Wang et al. still has security flaws, and proposed an improved method
In 2010, He et al. pointed out that the method proposed by Khan et al. is still not resistant to three attack types
In fact, the method proposed by Qi Xie cannot achieve user anonymity, and cannot resist replay attacks, denial of server attacks, and smart card loss attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Double Verification Method for Remote User Password Based on Smart Card
  • A Double Verification Method for Remote User Password Based on Smart Card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the purpose, technical method and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0018] In the smart card-based remote user password double verification method proposed by the present invention, two participants are included: user U i and server S, the server generates private key x;

[0019] A smart card-based remote user password double verification method, including a registration step, a login step and an authentication step, wherein the registration step further includes that the smart card and the server store the registration information provided by the user into the smart card after conversion; the login step further includes, The smart card performs local legality veri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a remote user password dual-verification method based on an intelligent card, which comprises the steps of registration, login and authentication, wherein the register step further comprises the step that registration information provided by a user is stored in the intelligent card through the intelligent card and a server after being converted; the login step further comprises the step that local legality verification is performed to the identification of the user through the intelligent card, and if the identification is legal, the intelligent card generates first verification data and sends the data to the server; the authentication step further comprises the step that local legality verification is performed to the identification of the user through the server, if the identification is legal, second verification data is generated and sent to the intelligent card, the intelligent card performs legality verification to identification of the server, if the identification of the server is legal, third verification data is generated and sent to the server, a conversation secret key is generated at the same time, and the server performs secondary verification to the identification of the user, if the identification is legal, the conversation secret key is generated. The user anonymity is realized, the lose attack of the intelligent card can be resisted, and server attack is avoided.

Description

technical field [0001] The invention relates to the technical fields of information security and communication, in particular to a method for double verification of remote user passwords based on smart cards. Background technique [0002] In 1990, Hwang, Chen and Laih et al proposed a password authentication method based on smart cards. In their method, the user information is stored in the smart card, and the remote server does not need to store the password table containing the user's private information. [0003] In 1993, Chang-Wu introduced a smart card-based public key cryptographic authentication method, which not only requires a public key directory, but also has a large amount of calculation. Later, many researchers successively proposed many authentication methods based on smart card without public key cryptography. However, the above methods usually store the secret parameters directly in the smart card. Once the parameters are leaked, the user is vulnerable to o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 张小军崔建明高建新王翀王凤杰刘奕辉霍永孙晓明李恒忠
Owner SHANDONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products