Multi-factor identity authentication method based on chaotic mapping
A chaotic mapping and identity authentication technology, applied in the field of information security, can solve problems such as low efficiency, decreased computational efficiency, and failure to provide security analysis of the original protocol, and achieve the effect of improving security, safe and efficient identity authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] Below in conjunction with accompanying drawing, further describe the present invention through embodiment, but do not limit the scope of the present invention in any way.
[0038] The multi-factor identity authentication protocol based on chaotic mapping designed by the method provided by the present invention is used for user identity authentication, and the existing multi-factor user authentication protocol can be transformed into authentication with security attributes such as anonymity, forward security, and user-friendliness. protocol to achieve safe and efficient multi-factor authentication.
[0039] The user identity authentication process of the present invention includes an initialization stage, a user registration stage, a login authentication stage and a credential update stage. figure 1 Shown is the process of designing and implementing the authentication protocol of the present invention. Below, the protocol published on IEEEInternet ofThings Journal by Ro...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


