User identity authentication system and method

An identity authentication and user-side technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as low security, undisclosed keys, and large demand for keys

Active Publication Date: 2017-01-25
ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
View PDF3 Cites 79 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the same key is used for encryption and decryption in the symmetric cryptography system, and the key cannot be disclosed, so that the authentication process using the symmetric cryptography system in a multi-user environment requires a huge amount of secret keys, and the generation, distribution and update of the authentication system key relatively difficult
In "Computer Engineering and Design" in 2013, the document "Design of Authentication System Based on Combined Symmetric Key Technology" proposed an authentication system design scheme using combined key technology on the basis of symmetric cryptosystem, using "key seed" , random parameters and key generation algorithm realize the one-time change of the key in each authentication, which effectively solves the problems of key generation, quantity, distribution, and update, but it comes from the pseudo-random number "key" generated by the software system. "Seed" is low in security and easy to leak
[0006] The patent document with the publication number CN201510881727 discloses an identity authentication method based on quantum key encryption. The key used for identity authentication is a quantum key generated by a quantum key generation device, and the absoluteness of the key is guaranteed based on the uncertainty principle. It is safe, but the quantum key is generated in real time during the identity authentication process. When the quantum key control server does not store enough quantum keys, the encryption operation of the identity authentication is in a waiting state until there is enough key amount. In the scenario where multiple users perform identity authentication at the same time, the authentication speed will be limited by the speed of quantum key generation
[0007] In the existing technology, the identity authentication method based on the symmetric cryptosystem has a large demand for keys, and the existing solutions are relatively one-sided, and there is no balance between the amount of keys and the security of keys.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication system and method
  • User identity authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] Such as figure 2 As shown, the identity authentication method between the client terminal and the quantum network service station in the local area network, wherein the quantum key card involved is registered and issued at the local quantum network service station, and the identity authentication method includes:

[0092] a. Authentication initiation: the client submits an authentication application to the identity authentication server of the current quantum network service station, and the authentication application includes at least the quantum key card ID and the key seed ID of the key seed that will be used in this identity authentication. After submitting the authentication application, the identity authentication server sends a random number RANDS (equivalent to the first random number) to the client.

[0093] b. User authentication key generation: After the quantum key card matched by the user end obtains the random number RANDS, the quantum key card uses the s...

Embodiment 2

[0107] The identity authentication method between the user terminal and the quantum network service station in the wide area network includes:

[0108] a. Authentication initiation: the client submits an authentication application to the identity authentication server of the current quantum network service station, and the authentication application includes at least the quantum key card ID and the key seed ID of the key seed that will be used in this identity authentication. After submitting the authentication application, the identity authentication server sends a random number RANDS (equivalent to the first random number) to the client.

[0109] b. User authentication key generation: After the quantum key card matched by the user end obtains the random number RANDS, the quantum key card uses the software random number generator inside the card to generate a random number RANDU (equivalent to the second random number).

[0110] Using the key generation algorithm FK and the r...

Embodiment 3

[0120] Another identity authentication method between the client and the quantum network service station in the WAN, including:

[0121] a. Authentication initiation: the client submits an authentication application to the identity authentication server of the current quantum network service station, and the authentication application includes at least the quantum key card ID and the key seed ID of the key seed that will be used in this identity authentication. After submitting the authentication application, the identity authentication server requests the quantum network service station pointed to by it to generate and send the random number RANDS (equivalent to the first random number) to the client according to the key seed ID.

[0122] b. User authentication key generation: After the quantum key card matched by the user end obtains the random number RANDS, the quantum key card uses the software random number generator inside the card to generate a random number RANDU (equiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity authentication system and a user identity authentication method. The user identity authentication system comprises quantum network service stations disposed on a network side and user ends disposed on a user side, and further comprises a quantum key card, wherein the network side generates true random numbers which are respectively stored on the quantum key card and the network side so as to generate corresponding user side secret keys, and the user side secret keys on the quantum key card and the network side are respectively used for generating authentication commands so as to perform comparison authentication. The true random numbers are generated by a certain quantum network service station on the network side, and the quantum key card and the certain quantum network service station respectively store the true random numbers so as to generate the corresponding user side secret keys. The user identity authentication method is an identity authentication method of a symmetric cryptographic system, uses the safety random keys generated by a quantum true random number generator as secret key seeds based on a mobile secret key device, is repeatedly used in identity authentication, and considers both secret key quantity and safety problems.

Description

technical field [0001] The invention relates to the technical field of quantum communication, in particular to a system and method for identity authentication based on a quantum network service station. Background technique [0002] Identity authentication is the basic technology to achieve information security. The system checks the user's identity to confirm whether the user has access and use rights to certain resources, and can also perform identity authentication between systems. [0003] The identity authentication system in the current communication network generally adopts the asymmetric cryptosystem. In the asymmetric cryptosystem, the encryption key and the decryption key are different, and the decryption key cannot be calculated from the encryption key, which ensures the security of the decryption key and enables the authentication system using the asymmetric cryptosystem to achieve reliable user authentication. Identity authentication, and the encryption key can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/083H04L9/0852H04L63/062
Inventor 富尧钟一民王真真
Owner ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products