Smart card password authentication and password modification method

An authentication method and password modification technology, applied in electrical components, transmission systems, etc., can solve the problems of battery exhaustion of security tokens, slow encryption speed of block ciphers, difficulty in resisting dictionary attacks, etc., to prevent replay attacks and information Effects of intercepting attacks, reducing stress, mitigating risks

Active Publication Date: 2017-12-05
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Use the user password to encrypt the private key and store it on the user device. This method is now widely used in various fields, but it is difficult to resist dictionary attacks
[0006] (2) Use hardware devices such as smart cards and USBKEY to strengthen private key protection, but if the smart card is lost, user information may be leaked
[0007] (3) Using the block cipher system and the public key encryption system, the communication parties will establish a session key and protect the user password at the same time, avoiding dictionary attacks, but the block cipher encryption speed is slow and there is a hidden danger of ciphertext transmission errors
[0008] (4) One-time password authentication, such as MD5, so that the user password is different every time you log in, but the use of security tokens has to face the trouble of running out of battery power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart card password authentication and password modification method
  • Smart card password authentication and password modification method
  • Smart card password authentication and password modification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0048] Step one, the registration stage. At this stage, the registered user needs to apply for a smart card first, which stores various information of the user, such as date of birth, home address, mobile phone number and personal signature.

[0049] (1) In the initial stage of user registration, the user first randomly generates a random number X C and put X C Confidentially stored in the smart card. In order to ensure the security of the system, X C It should be greater than 1024bit.

[0050] (2) The user freely chooses his user name (ID) and password (PW).

[0051] (3) In order to protect ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password authentication and password changing method combining a smart card, and is widely applied in security guaranty mechanisms of e-commerce and other social networking services. The method combining the smart card and the password authentication comprises four complete stages including user registration, server authentication, user authentication and user password changing, among which, a lightweight efficient and secure cryptographic protocol and an algorithm are designed. The function that a remote server does not store a user password is achieved; the risks that the user password is stolen at the server end are reduced; and meanwhile, as a timestamp and a counter are added into a password authentication protocol, replay attacks and information interception attacks can be effectively prevented, and a user can freely change the password without an application to the server.

Description

technical field [0001] The invention relates to the technical fields of information security and cryptography, in particular to a password authentication and password modification method combined with a smart card. Background technique [0002] In the fast-paced urban life, online transactions and online recharge undoubtedly save people more time. However, the more humans rely on information systems, the more prominent information security issues will be. Since the vigorous development of e-commerce, cases of stealing users' property through the Internet have occurred from time to time, and the issue of information security has become a problem that cannot be ignored in the process of social information development. [0003] In order to solve the above problems, people have designed a variety of authentication mechanisms using symmetric encryption and asymmetric encryption in modern cryptography. Among them, password authentication is more concise and convenient than other...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0838H04L63/0853
Inventor 黄海平李正韬伍一鸣吴敏李艳王汝传沙超蒋凌云
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products