Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key negotiation method based on SD cards

A key negotiation and session key technology, applied in the field of identity authentication, can solve the problems of small character space, PAKE scheme password dictionary attack, limited password length, etc., and achieve the effect of resisting phishing, simple and convenient implementation, and high-strength security protection

Inactive Publication Date: 2015-12-02
INST OF INFORMATION ENG CAS
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The other is a brute force attack on passwords. Because the length of general passwords is limited and the character space is small, the PAKE scheme is vulnerable to password dictionary attacks compared to general symmetric key-based authentication key agreement schemes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key negotiation method based on SD cards
  • Secret key negotiation method based on SD cards
  • Secret key negotiation method based on SD cards

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The implementation process of the technical solution of the present invention will be described in detail below with reference to the accompanying drawings and specific examples.

[0036] In the mobile payment scenario, the user communicates remotely with the payment system through the payment client installed on the mobile phone to complete four processes including user registration, authentication and key negotiation, password update, and SD card replacement. The payment client calls the secure API interface of the built-in SD card in the mobile phone to complete the secure computing operation. working model as figure 1 shown.

[0037] The user purchases a secure SD card issued by the payment system in advance. The preset secret information in the secure SD card is sw, and the payment system can obtain sw by querying the serial number SID of the secure SD card. The secure SD card is protected with a PIN code on the phone. Furthermore, the working parameters {q,g,E...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a secret key negotiation method based on SD cards. The secret key negotiation method based on the SD cards comprises the steps of 1) using a server to set the secret information for each SD card and saving the secret information in the corresponding SD cards; 2) using the SD card in a client to calculate the secret key negotiation information X according to an inputted user identifier CID and a password pw, then generating the user authentication information AuthC according to the CID, the pw, the sw and the X, and then sending a message Mc=<CID, X, AuthC> to the server; 3) using the server to verify the AuthC, if the verification passes, generating the secret key negotiation information Y and a session key SK, then generating the authentication information AuthS according to the CID, the pw, the sw, the Y and the SK, and then sending a message Ms=<Y, AuthS> to the client; 4) using the SD card to calculate a session key SK' and verify the AuthS, if the verification passes, accepting the session key SK'. The secret key negotiation method based on the SD cards of the present invention provides the high-intensitive safety protection for the communication.

Description

technical field [0001] The invention relates to a key negotiation method based on an SD card, and belongs to the technical field of identity authentication. Background technique [0002] Mobile payment, also known as mobile payment, refers to a commercial transaction that is realized through a mobile communication network by using mobile terminal equipment as a carrier for certain goods or services. In recent years, driven by factors such as the rise and rapid development of e-commerce and mobile Internet, mobile payment has shown a strong growth momentum. However, with the proliferation of malicious software on smartphones, the security of mobile payment has been greatly tested. Malicious software often disguises itself as normal mobile software, tricks users into entering secret information such as account numbers and passwords, and secretly sends them to the attacker's mobile phone or server through SMS and other channels, and further induces users to install Trojan hors...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 杨婧
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products