Remote identity authentication method based on password, smart card and biological features

An identity authentication and smart card technology, applied in the field of information security and network, can solve the problems of not being able to resist denial server attacks, authentication table theft attacks, replay attacks and forward secrecy attacks

Active Publication Date: 2013-10-09
SHANDONG UNIV OF SCI & TECH
View PDF1 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the method of Li et al. cannot resist denial of server attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote identity authentication method based on password, smart card and biological features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0020] The meanings of the symbols that appear are shown in the table below:

[0021] U i

i-th user

ID i

User ID

PW i

user's password

B i

User's biological information

N

The random number N generated by the smart card

RPW i

encrypted user password

CID i

encrypted user ID

R s

Encrypted user biometric information

[0022] R c

Random number generated by smart card

X s

The master key shared by the registry and the server

y

The private key that the registry shares w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention a remote identity authentication method based on a password, a smart card and biological features. The method includes the step of registration, the step of logging in and the step of authentication. According to the method, a registration center generates a first parameter set and stores the first parameter set onto the smart card; the smart card verifies local legitimacy of the identity of a user, and if the identity of the user is legal, first verification data relevant to random numbers are generated and sent to a server; the server verifies the legitimacy of the identity of the user, and if the identity of the user is legal, second verification data used for verifying the identity of the server are generated and sent to the smart card; the smart card verifies the legitimacy of the identity of the server, and if the identity of the server is legal, third verification data are generated and sent to the server; the server verifies the identity of the user for the second time, and if the identity of the user is legal, the server and the smart card generate the same session key. The method can resist server denial attacks, verification table theft attacks, replay attacks and the problem of forward secrecy.

Description

technical field [0001] The invention relates to the fields of information security and network technology, in particular to a remote identity authentication method based on passwords, smart cards and biometric features. Background technique [0002] With the rapid development of network technology and communication technology, traditional forms of identity authentication methods are no longer safe, user names and passwords can be stolen by attackers, smart cards are easily stolen or lost, and passwords may also be forgotten or leaked. Danger. However, biometric technologies such as fingerprints, faces, and irises provide a more reliable and automated means of authentication based on important physical or behavioral characteristics. These biometrics are usually universally available, unique and cannot be copied, lost and forgotten. [0003] Due to the above advantages, some remote user authentication schemes based on biometrics are designed to solve the single-password auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06F21/32G06F21/34
Inventor 崔建明张小军王凤杰李恒忠刘辉高建新刘奕辉霍永孙晓明黄贤青
Owner SHANDONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products