Supercharge Your Innovation With Domain-Expert AI Agents!

A Two-way Authentication Method Based on Smart Card

A smart card and identity authentication technology, which is applied in the field of security identity recognition and communication, can solve problems such as low efficiency, information leakage, and long authentication time

Active Publication Date: 2021-05-18
XIAN UNIV OF POSTS & TELECOMM
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2015, Sarvabhatla and others pointed out that the Islam scheme cannot resist key attacks such as password guessing and user simulation, and proposed a smart card two-way authentication scheme based on dynamic ID, which can resist all password attacks
To sum up, in the current smart card application authentication process, there are problems of information leakage caused by attacks such as man-in-the-middle, parallel sessions, forgery and replay, and at the same time, there are problems of long authentication time and low efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Two-way Authentication Method Based on Smart Card
  • A Two-way Authentication Method Based on Smart Card
  • A Two-way Authentication Method Based on Smart Card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0012] In one example, see figure 1 , which discloses a smart card-based identity authentication method, including a registration step, a login step and an authentication step, wherein,

[0013] The registration step includes, the user submits to the background server S B Register, background server S B Issue smart cards C to users, and each smart card C stores two latest random keys k 1 , k 2 and the unique identifier ID of the smart card C ;

[0014] The login step consists of, the user inserts the smart card C into the card reader R C In order to log in to the background server S B ;

[0015] The authentication steps include, after successful login, authenticate the smart card C and the background server S B The validity of , where the two random keys k 1 , k 2 Use the improved ECC signature method for digital signature, and use the shared key K...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity authentication method based on a smart card, including a registration step, a login step and an authentication step, wherein the registration step includes that the user registers with a background server, and the background server issues a smart card to the user, and two latest random passwords are stored in each smart card. key and the unique identifier of the smart card; the login step includes that the user inserts the smart card into the card reader to log in to the background server; the authentication step includes, after successful login, verifying the legitimacy of the smart card and the background server, wherein the two random passwords The key uses the improved ECC signature method for digital signature, uses the shared key to encrypt the digital certificate, random key and signature as a whole through the AES encryption algorithm, and updates after the smart card successfully authenticates the background server and the background server successfully authenticates the smart card. random key. The method can resist common man-in-the-middle, parallel session, forgery and replay attacks, and improve the security and efficiency of the authentication process.

Description

technical field [0001] The disclosure belongs to the technical field of security identity recognition and communication, and specifically relates to a smart card-based two-way authentication method. Background technique [0002] With the rapid development of the smart card industry, smart cards are more and more widely used, so ensuring the mutual authentication between the smart card and external devices is very important for the safe transmission of data. Since Lamport first proposed a remote password authentication protocol based on an insecure channel in 1981, many researchers have proposed a remote user authentication protocol to improve the security of data exchange. In 2014, Huang HF et al. proposed an improved time stamp-based smart card user authentication scheme. The remote server does not need to provide any authentication information for the user, which can safely resist all possible attacks. However, Amin et al. found that the Huang HF scheme cannot safely resi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34
CPCG06F21/34
Inventor 杨小宝惠小强刘圆王敏刘亚雪
Owner XIAN UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More