Three-factor remote identity authentication method based on intelligent card

An identity authentication and smart card technology, which is applied in the field of three-factor remote identity authentication based on smart cards, can solve the problems of inability to effectively extract and store biological information, inability to use digital means to verify the correctness of biological information, smart card stolen attacks, anonymity attacks, etc. question

Active Publication Date: 2015-12-02
SHANDONG UNIV OF SCI & TECH
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the 1970s, some researchers began to pay attention to biological information, but due to technical limitations, they could not effectively extract and store biological information, and could not use digital means to verify the correctness of biological information, so biometric technology has no

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-factor remote identity authentication method based on intelligent card
  • Three-factor remote identity authentication method based on intelligent card
  • Three-factor remote identity authentication method based on intelligent card

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0023] The technical solution disclosed in the present invention includes three participants, user U i , Registry RC and server S j ; Including three phases, registration phase, login phase and verification phase.

[0024] Such as figure 1 , 2 As shown in and 3, a three-factor remote identity authentication method based on a smart card, the method includes: registering a server in a registration center as a legal server in a multi-server system; a user submits a registration application to the registration center. After the registration is successful, the user Obtain a smart card with specific ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses three-factor remote identity authentication method based on an intelligent card. The method comprises the following steps that a user and a server log in a registration center, wherein the intelligent card comprises encryption information; the user logins; local verification is performed on the intelligent card; the registration center verifies the server and the user; the server verifies the registration center; and the intelligent card verifies the server. By using the method of the invention, user anonymity is realized; and attacking modes of denial of service attacking, eavesdropping attacking, intelligent-card stolen attacking and the like are successfully resisted.

Description

technical field [0001] The invention relates to the field of information security and network technology, in particular to a three-factor remote identity authentication method based on a smart card. Background technique [0002] The rapid development of network communication technology has made more and more people accustomed to obtaining services through the Internet, such as e-commerce, e-government, and electronic logistics. To obtain information from the server or enjoy the services provided by the server, the user first needs to log in to the server. Therefore, there needs to be a remote identity authentication scheme applied to the network to verify the legitimacy of the user. However, the Internet is a public environment, and anyone can intercept messages between users and servers, so how to protect user information and prevent illegal communication is very important. [0003] In practical applications, two-factor authentication methods in multi-server environments ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06F21/34G06F21/32H04L29/06
Inventor 刘辉张小军崔建明刘奕辉
Owner SHANDONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products