Online rapid identity verification method based on Hash chain

An authentication method and hash chain technology, applied in the field of online rapid authentication, can solve the problems of difficulty in maintaining a trusted list and a large number of UAF clients, so as to reduce the attack surface, ensure security, and improve the verification speed. Effect

Active Publication Date: 2022-05-03
XIDIAN UNIV
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But its disadvantage is that the number of UAF clients is huge, and the maintenance of the trusted list will be extremely difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Online rapid identity verification method based on Hash chain
  • Online rapid identity verification method based on Hash chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to further illustrate the technical means and effects adopted by the present invention to achieve the intended invention goal, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0030] The present invention is an improvement to the existing online rapid identity authentication protocol FIDO, that is, by adding hash chain verification between the authenticator specific module, UAF client and user agent, the two processes of FIDO protocol registration and authentication are guaranteed to be normally executed Under the circumstances, it increases its security, reduces the attack surface of the protocol, and realizes fast online identity authentication using non-traditional text passwords.

[0031] refer to figure 1 , the implementation steps of this example are as follows:

[0032] Step 1, initialize each related entity of FIDO.

[0033] The existing online rapid identity authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an online rapid identity authentication method based on a hash chain, and mainly solves the problems that according to an existing online rapid identity authentication protocol FIDO, a malicious UAF client and a malicious authenticator specific module possibly appear in the normal registration or authentication process of a honest entity, so that messages are leaked, the protocol confidentiality is affected, and malicious login is caused. The implementation scheme is as follows: initializing each related entity of the FIDO protocol; calling a local security environment instruction to verify the integrity of the entity; performing hash chain registration; the FIDO protocol is operated, on the premise that normal operation of the protocol is guaranteed, verification of the authenticator specific module and the user agent to the UAF client side and verification of the UAF client side to the authenticator specific module are achieved based on the Hash chain, the security of the protocol is enhanced, and identity registration and authentication of the user in online service are achieved. The method is high in security, high in speed and low in overhead, and can be used for remote login, identity authentication and transaction authentication of online services.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an online rapid identity verification method, which can be used for remote login, identity authentication, and transaction authentication of online services. Background technique [0002] For a long time, passwords have been used as an important means of identity verification. Entering user names and passwords for verification once became the identity verification method for all online websites. When the password becomes a user's unique identity authentication mark, the leakage of the password will undoubtedly bring great harm. With the development of technology, more means of identity verification appear, and people try to use unique biometric features, such as fingerprints, faces, irises, etc., for personal identity verification. The application of biometrics in today's life is becoming more and more popular and mature, but there are still many shortcoming...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3239Y04S40/20
Inventor 孙聪高玉堃马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products