Identity-free three-factor remote user authentication method
An authentication method and technology for remote users, applied in the field of remote user authentication, can solve problems such as reducing user experience and system fault tolerance, and violating three-factor authentication, achieving the effect of untraceability and anonymous login.
Inactive Publication Date: 2016-08-17
UNIV OF ELECTRONIC SCI & TECH OF CHINA
7 Cites 18 Cited by
AI-Extracted Technical Summary
Problems solved by technology
The invention belongs to the field of multi-factor authentication protocols and discloses an identity-free three-factor remote user authentication method. Identity-free three-factor authentication is realized through elliptic curve based public key cryptography. The method includes steps: 1, a server generates a public and private key pair and other public parameters; 2, a user submits registration information to the server, and a registration center returns corresponding data or a smart card; 3, the user inputs a password and biological features and inserts the smart card to calculate registration parameters which are sent to the server, and by corresponding data exchange between the user and the server, authentication and key agreement are realized, and a session key is generated. On the basis of a remote user authentication environment, user authentication can be smoothly realized through the server without identity input; on the basis of three-factor authentication with the password, the smart card and the biological features involved, safety of the method is guaranteed, and all referred attacks can be resisted, and the method is applicable to fields of security, finance and the like high in safety requirement.
Public key for secure communicationUser identity/authority verification
User authenticationMulti-factor authentication +7
- Experimental program(1)
Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.