Method of digit identity authentication based on features of non-biophysics

A technology of physical characteristics and digital identity, applied in the field of group encryption, can solve the problems of not being able to freely generate passwords, difficulty in understanding and trusting for ordinary people, and insecurity, etc., to cope with monitoring records and cracking analysis, the algorithm process is completely transparent, and the principle Simple and clear effect

Inactive Publication Date: 2005-10-26
林建春
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reasons are as follows: 1. These biophysical features are easy to be extracted and copied. For example, fingerprints can be easily extracted and made into fingerprint membranes, sounds can be extracted and re-synthesized, and the replication of retinal and appearance features is also completely possible.
2. The invariance of biophysical characteristics makes the characteristic data easy to be leaked in transmission and storage
3. When multi-party authentication is required, feature data will be stored in multiple places, and security issues will become more prominent
In fact, this is only the case when the authenticating party monitors the network. When monitoring the network near the authenticated party, it will obtain multiple authentication information of a very small number of users. Because the account number and password are not one-time, analysis and decryption will become possible. This method Security issues cannot be avoided
[0004] The "two-way" and "question-and-answer" or so-called "challenge password" authentication methods are adopted, which significantly improves the security of both sides of the authentication. Various "two-way" and "question-and-answer" authentication methods generate question-and-answer data and The encryption algorithms used are different, and the discussion on the security of the answer-based identity authentication method has never stopped. One type of method that is being used is the identity authentication method using the public key encryption system, which can conveniently complete digital signatures and identity authentication. authentication, but an important problem is that this type of method cannot generate passwords freely, there must be a fully trusted third-party password distribution agency, and the agency itself must be absolutely safe and credible, and the password distribution process is not subject to monitoring
Encryption algorithms based on algorithmic complexity and computational complexity are often only understood by experts, and some even experts cannot give clear security proofs, making it difficult for ordinary people to understand and trust; encryption based on complexity Algorithms, as technology advances and advances in mathematics create insecurities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of digit identity authentication based on features of non-biophysics
  • Method of digit identity authentication based on features of non-biophysics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] Embodiment 1: Using electronic identity tokens to realize identity authentication and data transmission of network systems

[0024] 1. The network identity authentication system includes network service computers, communication lines and electronic identity tokens.

[0025] The authenticated party holds an electronic identity token, and the required identity authentication data is automatically generated by the token. The electronic identity token hardware includes a processor, a memory, a display screen, buttons and an infrared, USB or wireless data transmission interface. Keys are used to key in ID codes, passwords, etc. The identity authentication process of the authenticated party is automatically realized by the above-mentioned hardware and identity authentication software. The main software process of the token as the authenticated party is: token startup initialization, waiting for interruption, if there is communication interruption, take out the received comm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Identity code and common basic cipher code are generated from identity registration in advance. In each identity authentication, two partial permutations chosen from basic cipher code generated in advance randomly are as two cryptographic cipher codes. Encrypting the random array generated this time obtains cryptograph data pair, which are enquiring data for authentication party and response data for party to be authenticated. Comparing response data and the data generated by own, the authentication party validates identity of the party to be authenticated. Advantages of the invention are: random arrays are used only once; response data are cryptograph without need of transferring plaintexts of random arrays; also plaintext or cryptograph of basic cipher code are not transferred. The cipher code is changed randomly. Thus, security of authentication procedure is assured.

Description

technical field [0001] The present invention relates to a digital identity authentication method with non-biophysical characteristics, to be more precise, it relates to a method of randomly selecting two partial arrangements from a pre-generated secret basic password as two actual passwords during each identity authentication. Encryption password, respectively encrypts the random array generated this time, and the obtained ciphertext data pair is used as a question-answer data pair for identity authentication. Background technique [0002] The identity authentication methods based on biophysical characteristics currently in use, such as fingerprints, retina, voice, appearance characteristics, etc. as the basis of authentication, have very limited security performance. The reasons are as follows: 1. These biophysical features are easy to be extracted and copied. For example, fingerprints can be easily extracted and made into fingerprint membranes, sounds can be extracted and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/00G09C1/00
Inventor 林建春
Owner 林建春
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products