Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same

A key exchange and factor technology, applied to the usage of multiple keys/algorithms, and key distribution, can solve problems such as the inability of passwords to resist dictionary attacks, written on paper or used in many places, and password exposure.

Inactive Publication Date: 2006-10-11
KT CORP
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, passwords are exposed to attackers through social engineering (e.g., deception or threats)
Third, ciphers are weak against dictionary attacks because of their low entropy in terms of entropy
Fourth, passwords are exposed because of bad habits of users, such as writing passwords on paper or using passwords in many places without updating

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
  • Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In the following detailed description, there are shown and described only the preferred embodiments of the invention by way of illustration of the best mode contemplated by the inventors for carrying out the invention. As will be realized, the invention is capable of modifications in various obvious respects, all without departing from the invention. Accordingly, the drawings and description are to be regarded as illustrative of substance, and not as restrictive. Components not described in the specification are omitted for clarity, and those components for which similar descriptions are provided have the same reference numerals.

[0043] An authentication method using the TAKE protocol according to an embodiment of the present invention will be described.

[0044] figure 1 A flowchart of the TAKE protocol according to a preferred embodiment of the present invention is shown.

[0045] The symbols described in the preferred embodiments are defined as follows.

[0046...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A two-factor authentication key exchange method. The user station sends a value generated by using the identifier and the public key of the authentication server to the authentication server via the access point. The authentication server uses this value to check the user's password, the key stored in the token, and the authentication server's secret key to generate a random number. The user station uses the random number, password, and key to send the encrypted value and the user's authentication code to the authentication server. The authentication server creates a second value generated by using the cryptographic key of the decrypted key and the random number to decrypt the encrypted value, verifies the user's authentication code, and sends the authentication server's authentication code to the user station. The user station authenticates the verification code of the verification server by using the key and the password.

Description

field of invention [0001] The present invention relates to an AKE (Authentication and Key Establishment) protocol. In particular, the present invention relates to the TAKE (Two-Factor Authenticated Key Exchange) method in services such as the Internet, wireless LANs, and public access wireless LANs, a secure method for authenticating entities and establishing keys using the TAKE method , and a recording medium storing a program including the TAKE method. Background technique [0002] Conventional authentication and key establishment methods include the TLS (Transport Layer Security) method using authentication, the SRP (Secure Remote Password) method using passwords and the EAP (Extensible Authentication Protocol)-MD5 method, and the PEAP (Protected EAP) method and EAP-TTLS (Tunneled TLS), each of which has advantages and disadvantages. That is, the TLS method requires complex and costly PKI (Public Key Architecture), and the authentication management system, the SRP metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/08
CPCH04L9/0844H04L9/3213H04L2209/80H04L63/06H04L2463/082H04L63/0869H04L63/162H04W84/12H04W12/0471H04L9/3226
Inventor 朴永晚李圣春车镕柱
Owner KT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products