Supercharge Your Innovation With Domain-Expert AI Agents!

Bidirectional self-authentication method based on identification password

A technology for identifying passwords and authentication methods, applied in the field of computer network security, can solve the problems of attackers forging or stealing tokens, inability to perform double authentication, and management pressure, etc., to increase defense capabilities, simple and efficient two-way authentication, and simple implementation. Effect

Active Publication Date: 2019-04-16
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, each method has drawbacks: attackers may forge or steal tokens; users may forget passwords or lose tokens; biometric authentication systems have various problems, such as dealing with false positives and false negatives, Cost, convenience, privacy protection, etc.
[0011] 1) Inefficient, authentication can only be performed after the authentication information is forwarded by the NAS to the third-party authentication server;
[0012] 2) The third-party server needs to store and manage all user passwords or certificates, which has management pressure and has become a security weakness;
[0013] 3) Double authentication cannot be performed, because all authentication information is forwarded by the NAS, so the RADIUS server must trust the NAS to complete the authentication; therefore, the user may be attacked by a phishing network if he confirms the legitimacy of the NAS identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional self-authentication method based on identification password
  • Bidirectional self-authentication method based on identification password
  • Bidirectional self-authentication method based on identification password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in detail below in conjunction with the accompanying drawings. The description in this part is only exemplary and explanatory, and should not have any limiting effect on the protection scope of the present invention. In addition, those skilled in the art can make corresponding combinations of features in the embodiments in this document and in different embodiments according to the descriptions in this document.

[0030] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily Describe a particular order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein, for example, can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a bidirectional self-authentication method based on an identification password. In combination with the identification password, forced authentication and control are carried out on access user and equipment, so that a connection between communication entities can be trustable and controllable; for IBC elliptic curve-based bidirectional identity self-authentication established on the basis of a two-layer transmission protocol, under the condition that a certificate and a third-party trust mechanism are not required to be online, the negotiation of a shared key is realized, the real-name identity authentication of the access user is rapidly completed, and meanwhile, the user can authenticate an accessed network; and a port of an access switch runs a bidirectional self-authentication protocol of a self-authentication network to authenticate a user terminal / device connected to the port.

Description

technical field [0001] The invention belongs to the technical field of computer network security, in particular to a two-way self-authentication method based on an identification password. Background technique [0002] Access identity authentication of network entities is a fundamental aspect of system security. It is used to confirm the identity of any user attempting to log in or access network resources. This kind of authentication is very important in interactive networks. It is the most basic and important line of defense in most computer security environments, and it is the basis for access control and user responsibility. RFC 2828 defines user authentication as follows. [0003] Methods for verifying identity are proposed by or for a system entity. The authentication method consists of the following two steps: [0004] In the authentication phase, identity marks are provided to the security system (the identity marks must be assigned carefully, because the authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L29/06
CPCH04L9/3066H04L9/3073H04L63/083H04L63/0869H04L63/1483
Inventor 王小峰陈曙晖王飞谢岢洋郭佳朴卢珊邢倩倩
Owner NAT UNIV OF DEFENSE TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More