Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-factor remote identity authentication method based on smart card

An identity authentication and smart card technology, applied in the field of two-factor remote identity authentication based on smart cards, can solve problems such as unsuitable for practical applications, personal information leakage, and system failure

Inactive Publication Date: 2015-11-18
SHANDONG UNIV OF SCI & TECH
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the campus card and financial card are lost and the key information is stolen by the attacker, it will lead to the leakage of personal information and even property loss
Although the existing technology provides some solutions, such as commonly used credit card verification methods, there is no local verification step in these methods. If an attacker obtains a smart card in a certain way, he can continue to send login requests to the server. , so that the system cannot work normally, resulting in a denial of service attack; not only that, in the login phase of these methods, the user transmits his identity to the server in plain text through a public channel, and the attacker can intercept the communication between the user and the server to monitor the user's identity. The login time and regularity can realize anonymous attacks; in addition, in these methods, the user identity is stored in the smart card, so that the method can be attacked by smart card theft; in addition, these methods cannot change the password, which is not suitable for practical applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor remote identity authentication method based on smart card
  • Two-factor remote identity authentication method based on smart card
  • Two-factor remote identity authentication method based on smart card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0022] Include three participants in the technical solution announced by the present invention, user U i , registration center RC and server S j ; Including three phases, registration phase, login phase and verification phase.

[0023] A two-factor remote identity authentication method based on a smart card, the method includes: a user and a server respectively register in a registration center, and the server obtains an encrypted value after registration, such as figure 1 As shown; after registration, the user gets a smart card with specific information stored, and the values ​​stored in the sma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-factor remote identity authentication method based on a smart card. The method comprises the following steps that a user and a server register; the user logs in; the smart card verifies locally, if passing the verification, the smart card generates first verification data and sends the first verification data to the server; the server verifies the identity of the smart card, if passing the verification, the server generates second verification data and sends the second verification data to the smart card; the smart card verifies validity of the identity of the server, if passing the verification, the smart card generates a smart card end session key and third verification data and sends the third verification data to the server; and the server carries out second verification on the identity of the smart card according to the received third verification data, if passing the verification, the server generates a server side session key. The method has the beneficial effects of user anonymity, capabilities of resisting a Dos attack and a stolen attack of the smart card and the like.

Description

technical field [0001] The present invention relates to the field of information security and network technology, in particular to a smart card-based two-factor remote identity authentication method Background technique [0002] The rapid development of network communication technology has made more and more people accustomed to using the services provided by the network, such as e-commerce, e-government, and electronic logistics. To obtain information from the server or enjoy the services provided by the server, the user must first log in to the server. Therefore, there needs to be a remote identity authentication scheme applied to the network to verify the legitimacy of the user. However, the Internet is a public environment, and anyone can intercept messages between users and servers, so how to protect user information and prevent illegal communication is very important. [0003] The two-factor authentication method is to judge the identity of the user through the two f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0853H04L63/083
Inventor 孙承爱崔建明张小军刘奕辉杜巧林
Owner SHANDONG UNIV OF SCI & TECH