Remote protocol authentication method based on passwords
A technology of remote authentication and protocol, applied in the field of password-based remote authentication protocol, it can solve the problems of hidden security risks, small data volume, inability to prevent favor, etc., and achieve the effect of resisting replay attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The present invention is realized based on the elliptic curve cryptographic algorithm. In the system initialization sub-protocol, the user negotiates with the server the parameters of the elliptic curve cryptographic system needed for authentication afterwards;
[0038] (1) User registration sub-agreement:
[0039] At the beginning of registration, user U A Choose your own identity and user password PW A , And then submit it to the server S in a secure way;
[0040] Server S receives new user U A Identity ID submitted by registration A And user password PW A ; After that, calculate W A =h(ID A ||d S )⊕PW A , And then put the data (ID A ,W A ) Is stored in the authentication database of the server, where d S Represents the private key of the server, and h represents a one-way hash function.
[0041] (2) Authentication and key agreement sub-protocol:
[0042] 1) User U A First enter your own identification ID A And user password PW A ; The user freely chooses a random number r 1 ,r...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com