Remote authentication protocol method based on password and intelligent card

A remote authentication, smart card technology, applied in the field of information security, can solve the problems of user tracking, failure to protect user anonymity, loss of smart card revocation function, etc.

Active Publication Date: 2015-09-09
BEIHANG UNIV
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most ECC-based protocol methods cannot protect user anonymity during information transmission, causing users to be tracked by attackers; the function of revocation of lost smart cards is missing. Once the smart card is lost or stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote authentication protocol method based on password and intelligent card
  • Remote authentication protocol method based on password and intelligent card
  • Remote authentication protocol method based on password and intelligent card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be further described in detail with reference to the accompanying drawings and embodiments.

[0053] The security and efficiency of this protocol are mainly reflected in optimizing the elliptic curve point product algorithm in the design, and embedding authentication codes and counting groups in appropriate nodes, which can be specifically applied in online banking and other systems, such as figure 1 The specific operation shown is as follows:

[0054] (1) Initialization phase

[0055] At this stage, server S will generate system parameters through the following steps.

[0056] 1) S selects the elliptic curve E:y 2 ≡x 3 +ux+v (modp), E p (u, v) is the nth-order point addition group of the elliptic curve E, and P is its generator, that is, n·P=O.

[0057] 2) S selection As your own private key and save it, calculate Y=s·P as the public key, and then choose a one-way hash function

[0058] 3) S keeps s secret, and announces its system ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a remote authentication protocol method based on password and an intelligent card, and belongs to the field of information safety. The protocol employs an optimized elliptical curve algorithm, a counting set and authentication codes are embedded, password can be modified, and the lost intelligent card can be canceled. The anonymity of a user is ensured, the method is safe and efficient, mutual authentication and negotiation of session key of the user are realized via twice interaction, and the method is suitable for remote authentication systems as e-cash, online education and remote medicine.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a remote authentication protocol method based on a password and a smart card. Background technique [0002] With the rapid development of computer networks and the Internet, communication technology has greatly improved the quality of online services. No matter at any time and any place, users can use the services on the remote server. This service is widely used in many fields such as e-finance, e-medicine, and e-education. However, because information is transmitted through public channels, attackers usually use attack methods such as eavesdropping, imitation, modification, and replay to hinder the interaction between users and servers, resulting in the leakage of user security and privacy. It is very important to design an efficient and secure remote authentication protocol to protect legitimate users from attacks. [0003] In 1981, Lamport first pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 张筱单宝松郑志明李轩昂
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products