Password authentication method with high security

A password authentication and high-security technology, applied in the fields of information security and cryptography, can solve problems such as complex algorithms

Active Publication Date: 2016-12-14
NANJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this kind of data sharing technology that relies purely on encryption technology still has complex algorithms, and the algorithm needs to be updated in a timely manner to prevent the risk of being decrypted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password authentication method with high security
  • Password authentication method with high security
  • Password authentication method with high security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The specific embodiment of the present invention will be further described in detail in conjunction with the accompanying drawings.

[0064] The goal that the present invention will realize is:

[0065] (1) The user password can be modified or deleted by the user.

[0066] (2) The user name and password are transmitted in cipher text.

[0067] (3) No one can log in as a certain user.

[0068] (4) The plaintext form of the user name and password cannot be obtained by the server-side personnel.

[0069] (5) The authentication system can resist attacks such as replay attack, password guessing attack and masquerading attack.

[0070] (6) The authentication system has high efficiency.

[0071] (7) If the smart card is lost, the attacker holding the smart card cannot log in to the system by guessing the password.

[0072] The present invention comprises following four steps:

[0073] Step 1, user registration stage. Such as figure 1 As shown, the user chooses a user n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password authentication method with high security. By employing the mode of combining smart card hardware with a cipher algorithm, the method can be applied to the security mechanism of a series of network services such as finance, online shopping, social activities, and security. According to the method, the combination of a smart card and password authentication is focused, four stages of user registration, login, mutual authentication of a server and a user, and user password change are included, lightweight, high-efficiency and secure cipher protocols and methods such as Hash function, XOR operation, and symmetric keys are mainly applied, the security is high, special security processing of usernames and passwords is performed in an information transmission process, the stolen risk for the usernames and the passwords is reduced, replay attacks and information block attacks can be effectively prevented, and the users can freely change the passwords without the server.

Description

technical field [0001] The invention belongs to the technical fields of information security and cryptography, and in particular relates to a high-security password authentication method combined with a smart card. Background technique [0002] With the rapid development of computer network technology, cloud computing and cloud storage technology enable a large amount of data originally stored in the client to be stored in the cloud server. This not only greatly releases the storage space of the user end, reduces the pressure of local storage data, but also greatly expands the space range of user storage data, and realizes the sharing of data among different users. However, with the increase in the number of users using cloud services, how to protect user privacy from infringement has become a problem that cannot be ignored in the process of social informatization development. [0003] In response to the above problems, people have designed a variety of authentication mecha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 黄海平李正韬徐宁祁凌涛沙超王汝传
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products