Remote protocol authentication method based on biological features

A biometric, remote authentication technology, applied in the field of information security, can solve problems such as being unable to resist denial of service attacks, unable to protect user anonymity, and unable to provide performance

Active Publication Date: 2015-07-08
BEIHANG UNIV
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In recent years, a large number of biometric-based remote authentication protocols have been proposed, but none of them can provide sufficient security performance, and there is still room for improvement in computing performance.
In 2014, Huang Chaoyang proposed an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote protocol authentication method based on biological features
  • Remote protocol authentication method based on biological features
  • Remote protocol authentication method based on biological features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described in detail with reference to the accompanying drawings and embodiments.

[0043] This protocol uses an efficient elliptic curve cryptosystem algorithm, through a reasonable design of the protocol process, based on multiple factors such as biometric features, passwords and smart cards, it has strong security performance and fast calculation speed, and can be specifically applied in telemedicine and other systems, such as figure 1 The specific operation shown is as follows:

[0044] (1) System initialization

[0045] Server S will generate system parameters through the following steps.

[0046] (1) S selects the elliptic curve E:y 2 ≡x 3 +ax+b(modp),E p (a, b) is the nth-order point addition group of the elliptic curve E, and P is its generator, that is, n·P=O.

[0047] (2) S selection As your own private key and save it, calculate Y=s·P as the public key, and then choose a one-way hash function H ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a remote protocol authentication negotiation protocol method based on biological features and belongs to the field of information safety. An efficient elliptic curve coding system is adopted. The method comprises the following steps that (1) system initialization is carried out to generate elliptic curve data; (2) a user submits register information to a server through a safe channel, and the server conducts data processing and then stores the information into an intelligent card and sends the information to the user through the safe channel; (3) a user needs to calculate login information and sends the login information to the server; (4) the purpose of authentication and key negotiation between the user and the server can be achieved through two times of hand shaking, and a session key is generated; (5) the user can achieve the purposes of changing a password and the biological features through the operation of the intelligent card without the assistance of the server. By means of the design, the protocol is high in safety, all mentioned known attacks can be resisted, meanwhile, dynamic identity is adopted, the anonymity of the user is protected, and the calculation performance is also greatly improved. The method is suitable for online education, remote medical and other remote authentication systems.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a remote authentication protocol method based on biometric features. Background technique [0002] The development of communication technology provides a scalable platform for various services, and remote users can access servers from anywhere. Telematics systems offer unique online service opportunities so that users do not need a physically present service center. These services employ authentication and key agreement protocols to ensure authorization and secure access to resources. In 1981, Lamport first proposed a password-based authentication protocol, which has been widely used. However, because passwords need to be stored and are easily forgotten and lost, simple password-based authentication protocols cannot meet the needs of complex network environments. Factors such as biometric features are gradually used in protocol design, and a multi-facto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06F21/32
Inventor 张筱唐绍婷单宝松郑志明李轩昂
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products