Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method and system

A technology of identity authentication and identity information, applied in the field of communication, can solve problems such as inability to resist server forgery attacks, inability to guarantee data transmission security, complex calculation operations, etc., achieve low requirements for equipment computing capabilities, ensure session security, and improve security Effect

Active Publication Date: 2015-04-29
ZHEJIANG UNIV
View PDF4 Cites 83 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods have at least the following problems: the one-way authentication between the server and the client cannot resist server forgery attacks; In addition, some identity authentication protocols only implement identity authentication before normal communication, and do not regularly reconfirm the identity of the communication entity during the normal data interaction phase, so as to maintain the sustainable and effective identity of the communication entity; authentication data is transmitted in plain text , can not guarantee the security of data transmission; in occasions where a session key is required to encrypt data, the generation of the key often requires the support of a third-party trusted organization, which is inconvenient to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system
  • Identity authentication method and system
  • Identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the above objects, features and advantages of the present invention more comprehensible, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0064] The identity authentication method and system provided in the embodiments of the present invention aim at the problems existing in the prior art, and propose a two-way identity authentication method based on multi-factor dynamic password and random key negotiation, with random numbers, dynamic identity information and The fixed identity information is combined with the hash value calculated from the original text as a dynamic password, and the identity of the communicating party is verified by verifying the dynamic password. At the same time or after the identity authentication, the server and the client work together to generate a random key sequence, and negotiate the session key according to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and an identity authentication system. The method comprises the following steps: fixed identity identification information, a key schedule and a dynamic identity function are exchanged between a server and a client; a first random number is transmitted to the server and first response information transmitted by the client and second random number are received; the hash values of the first random number, the first dynamic identity information and the fixed client identity identification information as original texts are calculated and compared with the first response information, if the same hash values are present, the authentication is qualified; second response information is calculated and transmitted to the client, so that the hash values of the second random number, the second dynamic identity information and the fixed server identity identification information as the original texts are calculated by the client and compared with the second response information; if the same hash values are present, the authentication is qualified. The method is characterized in that the dynamic identity information is flexible and changeable, the information can be prevented from being revealed, the password encoding difficulty is increased and the security of the identity authentication is improved. Besides the method further comprises the following steps of key negotiation, heartbeat authentication and key schedule update, and thus the communication security and the periodic identity authentication are ensured.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an identity authentication method and system. Background technique [0002] The vigorous development of network and communication technology has subtly affected people's life and production. In recent years, more and more information security incidents such as hacker attacks and large-scale website account password leaks have occurred, making information security a focus of attention. As the first checkpoint of the information system, the identity authentication mechanism prevents illegal external intrusion and ensures the safe and orderly operation of the system by confirming the identity of the communication entity accessing the network. The essence of identity authentication is to use the uniqueness of identity characteristics, that is, the identity characteristics of the authenticated party. Except for the authenticated party itself, no third party (except some certif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 冯冬芹徐珊珊
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products