Unlock instant, AI-driven research and patent intelligence for your innovation.

Temperature-assisted authentication system and authentication method thereof

An authentication method and authentication system technology, which is applied in the field of authentication auxiliary systems for temperature-assisted authentication, can solve problems such as system security reduction, key leakage, and reliability degradation, and achieve enhanced system security, physical encryption, and enhanced resistance sexual effect

Active Publication Date: 2022-04-12
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the system is not assisted by encryption, and the relay attack easily leads to the leakage of the key, which greatly reduces the security of the system. [1] Use environmental detection sensors to measure and compare the environmental physical quantities of both authentication parties, making it a part of the authentication system and assisting security authentication, which can reduce the risk of system crashes after relay attacks and improve the robustness of the system
However, the controllability of this auxiliary method is poor, it is completely dependent on objective factors, and the fluctuation of change is very small. If things go on like this, the reliability will gradually decline, and the probability of being attacked and cracked will greatly increase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Temperature-assisted authentication system and authentication method thereof
  • Temperature-assisted authentication system and authentication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0036] An authentication method for temperature-assisted authentication such as figure 1 shown, including the following steps:

[0037] S1. The client sends an authentication request to the authentication server, requesting identity authentication;

[0038] S2. The authentication server judges whether the identity of the client is legal, and if it is legal, generates a random number and encrypts it as a challenge and sends...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a temperature-assisted authentication system, which is characterized in that a controllable voltage and temperature adjusting module is additionally arranged in the authentication system to realize secondary authentication, the voltage and temperature adjusting module is additionally arranged, and the two parties respond to temperature change according to challenges, so that further encryption and decryption mapping is realized; and the auxiliary authentication effect is finally realized by depending on the internal authentication mechanisms of the two parties. Meanwhile, the invention provides a temperature-assisted authentication method, and compared with the condition that the environment temperature is difficult to control, the chip temperature can be effectively adjusted through factors such as voltage and frequency. The client and the server both adopt customized chips, perform data transmission and temperature adjustment according to authentication requirements of both parties, and further perform encoding and decoding, so that the data can be transmitted under specific conditions and serve as a part of security authentication, thereby realizing auxiliary physical encryption. Therefore, the capability of the authentication system for resisting relay attacks is enhanced, and the robustness of the system is very high.

Description

technical field [0001] The invention relates to the field of authentication protocols, in particular to an authentication auxiliary system for temperature-assisted authentication and an authentication method thereof. Background technique [0002] The traditional challenge-response authentication system encrypts and decrypts through encryption algorithms such as AES to protect the key from being stolen and impersonated, so that the server and the client can authenticate each other safely. However, the system is not assisted by encryption, and the relay attack easily leads to the leakage of the key, which greatly reduces the security of the system. [1] The environmental detection sensor is used to measure and compare the environmental physical quantities of both authentication parties, making it a part of the authentication system and assisting security authentication, which can reduce the risk of the system crashing after the relay attack and improve the robustness of the sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08
Inventor 许怡楠姜书艳黄乐天
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA