A Three-Factor Remote Identity Authentication Method Based on Smart Card

An identity authentication and smart card technology, applied in the field of three-factor remote identity authentication based on smart cards, can solve problems such as inability to effectively extract and store biological information, smart card theft, anonymity attacks, and inability to resist denial of service attacks.

Active Publication Date: 2018-05-29
SHANDONG UNIV OF SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the 1970s, some researchers began to pay attention to biological information, but due to technical limitations, they could not effectively extract and store biological information, and could not use digital means to verify the correctness of biological information, so biometric technology has not been widely adopted. application
[0005] However, some methods provided in the prior art, such as the current common credit card identity verification method, have the problems of being unable to resist denial of service attacks, eavesdropping attacks, smart card theft attacks and anonymity attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Three-Factor Remote Identity Authentication Method Based on Smart Card
  • A Three-Factor Remote Identity Authentication Method Based on Smart Card
  • A Three-Factor Remote Identity Authentication Method Based on Smart Card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0023] Include three participants in the technical solution announced by the present invention, user U i , registration center RC and server S j ; Including three phases, registration phase, login phase and verification phase.

[0024] Such as figure 1 , 2 As shown in and 3, a three-factor remote identity authentication method based on a smart card, the method includes: registering the server in the registration center as a legal server in the multi-server system; the user submits a registration application to the registration center, and after the registration is successful, the user Obtain a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a three-factor remote identity authentication method based on a smart card, which comprises the following steps: a user and a server register with a registration center, wherein the smart card contains encrypted information; the user logs in; the smart card is locally verified; the registration center verifies the server and the user; Server Authentication Registry; Smart Card Authentication Server. The invention realizes the anonymity of the user, and successfully resists attack methods such as denial of service attack, eavesdropping attack and smart card theft attack.

Description

technical field [0001] The invention relates to the field of information security and network technology, in particular to a three-factor remote identity authentication method based on a smart card. Background technique [0002] The rapid development of network communication technology has made more and more people accustomed to obtaining services through the Internet, such as e-commerce, e-government, and electronic logistics. To obtain information from the server or enjoy the services provided by the server, the user first needs to log in to the server. Therefore, there needs to be a remote identity authentication scheme applied to the network to verify the legitimacy of the user. However, the Internet is a public environment, and anyone can intercept messages between users and servers, so how to protect user information and prevent illegal communication is very important. [0003] In practical applications, two-factor authentication methods in multi-server environments ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F21/34G06F21/32H04L29/06
Inventor 刘辉张小军崔建明刘奕辉
Owner SHANDONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products