Identity authentication system based on quantum key card

An identity authentication and key fob technology, applied in user identity/authority verification, transmission systems, digital transmission systems, etc., can solve problems such as insufficient security, time stamp replay attacks, and high requirements for system time synchronization, and achieve good safety effect

Inactive Publication Date: 2018-11-06
RUBAN QUANTUM TECH CO LTD
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) Existing identity authentication technology based on the Kerberos authentication scheme uses time stamps, resulting in the possibility of replay attacks
[0008] (2) The requirements of the Kerberos protocol are based on clock synchronization in the network, which has high requirements for time synchronization of the entire system, and is difficult to achieve in large-scale distributed systems
[0009] (3) In the prior art, the client key is stored in the client memory and can be stolen by malicious software or malicious operations
[0010] (4) In the existing technology, the long-term key of the client is unchanged, and the security is not high enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system based on quantum key card
  • Identity authentication system based on quantum key card
  • Identity authentication system based on quantum key card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] Embodiment 1, authentication of two client terminals belonging to the same quantum network service station in the local area network

[0086] In the following steps, the encryption, decryption and encryption operations involved in each client side are all performed in the matched quantum key card. The encryption and decryption operations involved in the identity authentication server and ticket permission server are completed in the encryption and decryption server of the quantum network service station.

[0087] like figure 2 As shown, when both client A and client B belong to the same quantum network service station, the quantum key card involved in the identity authentication process is registered and issued at the local quantum network service station. For specific steps, see Figure 4 , in the figure, the curly brackets indicate the encrypted part, and the content immediately following indicates the key used, such as {Ainfo+N 1}K A Indicates the use of K A En...

Embodiment 2

[0139] Embodiment 2, identity authentication of two client terminals in the wide area network

[0140] like image 3 As shown, when client A and client B do not belong to the same quantum network service station, the quantum key cards involved in the identity authentication process are registered and issued by the quantum network service station to which the client belongs. The difference between the system architecture in this embodiment and Embodiment 1 is that it is applied in a wide area network. The first-level switching center is a quantum network core station in a prefecture-level city or a fairly large area, and the second-level switching center is a county-level city or equivalent. The quantum network core station of a large or small area, the quantum network service station is a quantum communication access site of a fairly large area of ​​a township or street office.

[0141] The primary switching center is connected with multiple subordinate secondary switching ce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication system based on a quantum key card, which comprises a client A, a client B and a quantum network service station, wherein the client A applies for TGT(A) to the quantum network service station and obtains TGT(B) via the client B; and the client A applies for a corresponding Ticket to the quantum network service station according to the TGT(A) andthe TGT(B), and accesses to the client B by using the obtained Ticket. Each client is respectively configured with a quantum key card, and a corresponding quantum key is stored between the quantum keycard and the quantum network service station; and identity authentication is performed by using the configured quantum key cards when communication is performed between the client A and the quantum network service station and between the two clients. The identity authentication system uses a quantum true random number to replace a timestamp in the prior art, and solves the possibility of replay attacks. The quantum key card is independent hardware equipment, and the possibility of key stealing is greatly reduced. In addition, the key can be frequently changed, so that the security is greatlyimproved.

Description

technical field [0001] The invention relates to the technical field of quantum communication, in particular to an identity authentication system based on a quantum key card. Background technique [0002] Identity authentication is the basic technology to achieve information security. The system checks the user's identity to confirm whether the user has access and use rights to certain resources, and can also perform identity authentication between systems. [0003] Currently, the identity authentication system in the communication network generally adopts the Kerberos authentication scheme. Kerberos is a network authentication protocol designed to provide strong authentication services for client / server applications through a key system. The realization of the authentication process does not depend on the authentication of the host operating system, does not require trust based on the host address, does not require the physical security of all hosts on the network, and assu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0852H04L9/3213
Inventor 富尧钟一民
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products