A user authentication device and an authentication method based on a physically non-clonable technology PUF

An authentication device and user authentication technology, applied in user identity/authority verification, public key for secure communication, digital transmission system, etc., can solve problems such as easy to be stolen, difficult to maintain, and difficult for users to create and remember. Satisfy the effect of non-cloning and copying

Active Publication Date: 2018-12-18
GUANGDONG UNIV OF TECH +1
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In recent years, the frequent occurrence of medium and large-scale data leakage incidents means that password-based online authentication technology has become difficult to maintain the security of the Internet
However, the traditional method of adding passwords to user names, such as mobile phone account passwords, payment passwords, WeChat passwords, etc., makes it difficult for users to create and remember, and because passwords are stored in a centralized database, they are also easy to be stolen, becoming a network The biggest hidden danger of payment, especially mobile payment with relatively more fragile security
Due to the traditional password-based authentication system due to its own security problems, the industry has proposed enhanced solutions such as hardware tokens (such as U-shields) and OTP dynamic password technology. However, these solutions have high deployment costs, difficult maintenance, cross-border Issues such as application compatibility, these solutions are currently only used by special fields such as finance and government or large enterprises, and do not meet the security needs of small and medium-sized enterprises and individual users, causing the latter to continue to face the risk of identity verification information being leaked. For this situation, based on the three principles of ease of use, privacy and security, and compatibility and universality, it has become the focus of the current security certification scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user authentication device and an authentication method based on a physically non-clonable technology PUF
  • A user authentication device and an authentication method based on a physically non-clonable technology PUF
  • A user authentication device and an authentication method based on a physically non-clonable technology PUF

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Hereinafter, the present invention will be further described in detail with reference to the examples and drawings, but the implementation of the present invention is not limited thereto.

[0050] Such as Figure 1~6 As shown, a user authentication device based on physical unclonable technology PUF includes a physical unclonable module PUF, an authentication module, an authentication control module, a random number generator, and a counter, where:

[0051] The physical unclonable module PUF is embedded in the authentication device for generating authentication-related key pairs;

[0052] The authentication module embeds an asymmetric algorithm and a digest algorithm to complete the operations required for authentication; the authentication module includes a public key generation module that uses the "response" of the physical unclonable module PUF to generate a public key, And transmit the public key to the server;

[0053] The user can manually control sending authentication ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authentication device based on a physically non-clonable technology PUF, comprising a physically non-clonable module PUF, an authentication module, an authentication control module, a random number generator and a counter, wherein, the physically non-clonable module PUF is embedded in the authentication device for generating authentication-related key pairs; The authentication module is embedded with an asymmetric algorithm and a digest algorithm to complete the operation to be executed by the authentication; The user can manually control sending authentication request and sending authentication information through the authentication control module; The invention is based on the three principles of simplicity, privacy security and compatibility, and meets therequirements of simplicity, high security and compatibility with a plurality of network servers. The chip inside the device adopts the non-clone technology PUF to ensure the uniqueness of the device,and meets the characteristics of non-clone replication and privacy security of the device.

Description

Technical field [0001] The invention relates to the technical field of data security authentication, in particular to a user authentication device and authentication method based on physical unclonable technology PUF. Background technique [0002] In recent years, the frequent occurrence of medium- and large-scale data breaches means that password-based online authentication technology has been difficult to maintain the security of the Internet. The traditional user name plus password method, such as mobile phone account password, payment password, WeChat password, etc., makes it difficult for users to create and remember, and because the password is stored in a centralized database, it is also easy to be stolen and become a network The biggest hidden danger of payment, especially mobile payment with relatively more fragile security. Due to the traditional password-based authentication system due to its own security issues, the industry has prompted the industry to propose enhan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30
CPCH04L9/3066H04L9/3278H04L63/0442
Inventor 熊晓明张盛仕胡湘宏
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products