Method of digit identity authentication based on features of non-biophysics

A technology of physical characteristics and digital identity, applied in the field of group encryption, it can solve the problems of inability to generate passwords freely, difficult for ordinary people to understand and trust, and insecurity. Simple and clear effect

Inactive Publication Date: 2004-03-10
林建春
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reasons are as follows: 1. These biophysical features are easy to be extracted and copied. For example, fingerprints can be easily extracted and made into fingerprint membranes, sounds can be extracted and re-synthesized, and the replication of retinal and appearance features is also completely possible.
2. The invariance of biophysical characteristics makes the characteristic data easy to be leaked in transmission and storage
3. When multi-party authentication is required, feature data will be stored in multiple places, and security issues will become more prominent
In fact, this is only the case when the authenticating party monitors the network. When monitoring the network near the authenticated party, it will obtain multiple authentication information of a very small number of users. Because the account number and password are not one-time, analysis and decryption will become possible. This method Security issues cannot be avoided
[0004] The "two-way" and "question-and-answer" or so-called "challenge password" authentication methods are adopted, which significantly improves the security of both sides of the authentication. Various "two-way" and "question-and-answer" authentication methods generate question-and-answer data and The encryption algorithms used are different, and the discussion on the security of the answer-based identity authentication method has never stopped. One type of method that is being used is the identity authentication method using the public key encryption system, which can conveniently complete digital signatures and identity authentication. authentication, but an important problem is that this type of method cannot generate passwords freely, there must be a fully trusted third-party password distribution agency, and the agency itself must be absolutely safe and credible, and the password distribution process is not subject to monitoring
Encryption algorithms based on algorithmic complexity and computational complexity are often only understood by experts, and some even experts cannot give clear security proofs, making it difficult for ordinary people to understand and trust; encryption based on complexity Algorithms, as technology advances and advances in mathematics create insecurities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of digit identity authentication based on features of non-biophysics
  • Method of digit identity authentication based on features of non-biophysics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Embodiment 1: Use an electronic identity token to realize identity authentication and data transmission of a network system.

[0022] 1. The electronic identity token includes a processor, memory, display screen, keys, and an infrared, USB or wireless transmission interface. The transmission interface is used to communicate and transmit data with the corresponding communication interface of the computer, and the key is used to input the identity code. With various passwords, processors, memory and corresponding software, the algorithm and process of identity authentication of the present invention are automatically completed, and the display screen is used to display processing results, time, etc.

[0023] 2. System registration: The two parties who need identity authentication, such as the network service computer and the user, register the identity code generated by each other with each other, and use reliable confidential means to transmit and generate a basic password (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Identity code and common basic cipher code are generated from identity registration in advance. In each identity authentication, two partial permutations chosen from basic cipher code generated in advance randomly are as two cryptographic cipher codes. Encrypting the random array generated this time obtains cryptograph data pair, which are enquiring data for authentication party and response data for party to be authenticated. Comparing response data and the data generated by own, the authentication party validates identity of the party to be authenticated. Advantages of the invention are: random arrays are used only once; response data are cryptograph without need of transferring plaintexts of random arrays; also plaintext or cryptograph of basic cipher code are not transferred. The cipher code is changed randomly. Thus, security of authentication procedure is assured.

Description

Technical field [0001] The present invention relates to a digital identity authentication method with non-biological physical characteristics. Specifically, it relates to a method for randomly selecting two partial arrangements from a pre-generated secret basic password during each identity authentication. Encryption password, respectively encrypt the random array generated this time, and the obtained ciphertext data pair is used as the method of identity authentication for the question and answer data pair. Background technique [0002] The identity authentication methods currently in use based on biophysical characteristics, such as fingerprints, retina, voice, and appearance characteristics as the basis for authentication, have very limited security performance. The reasons are: 1. These biophysical features are easy to be extracted and copied. For example, fingerprints can be easily extracted and made into a fingerprint film, sounds can be extracted and re-synthesized, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/00G09C1/00
Inventor 林建春
Owner 林建春
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products