User name password authentication method implemented on basis of public key algorithm

An authentication method and public key technology, applied in the field of identity authentication based on user name and password, can solve security problems, cannot resist rainbow table attacks, website user name and password leakage and other problems

Inactive Publication Date: 2014-04-02
KOAL SOFTWARE CO LTD
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But cannot defend against rainbow table attack
Previously, there have been a large number of leaked website user names and passwords on the Internet.
[0005] Due to the simplicity of the password-based authentication method, this method is widely used on the Internet, but at the same time, its security also has major problems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User name password authentication method implemented on basis of public key algorithm
  • User name password authentication method implemented on basis of public key algorithm
  • User name password authentication method implemented on basis of public key algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0027] The present invention aims at the security problems existing when the software platforms such as websites and information systems use the existing password authentication method to authenticate user passwords, and introduces a public key (asymmetric) encryption algorithm into the password authentication. The most notable feature of public-key encryption algorithms is that a pair of keys are involved in the encryption: a public key and a private key. Data encrypted with a public key can only be decrypted with the corresponding private key, and data encrypted with a private key can only be decrypted with the corresponding public key.

[0028] The scheme provided by the present invention is based on this feature, and authentication is perfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user name password authentication method implemented on the basis of a public key algorithm. According to the user name password authentication method, the public key algorithm is introduced in the authenticating process; the authentication is implemented by using the public key algorithm; a user password is not directly used for authenticating, but is used for protecting a private key of a user. According to the invention, on the premise of not increasing the authentication difficulty of the user, safety of a user name password authentication mode is improved and a rainbow table attack can be effectively resisted.

Description

technical field [0001] The invention relates to the field of information security, and more specifically relates to an identity authentication method based on a username and password. Background technique [0002] In the Internet, various websites generally use a user name plus a password to authenticate the identity of the website user. Password-based authentication usually has the following implementation methods: [0003] The first method: directly record the original text of the password in the system database. When the user initiates authentication, the plain text of the password is submitted to the server, and the server compares it with the password recorded in the database. If they match, the authentication is passed. This method has extremely low security, and the original password is stored and transmitted in plain text. The attacker can obtain the user's password through network interception, attacking the database, and other means. [0004] The second method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 吴一博杨文山任伟许俊
Owner KOAL SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products