Long-distance password identifying method based on smart card, smart card, server and system

A remote authentication and smart card technology, applied in the field of remote authentication, can solve the problems of obtaining user passwords, delay, inability, etc.

Inactive Publication Date: 2007-01-03
SHANGHAI JIAO TONG UNIV +1
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For this kind of attack, the following resistance methods can often be used: 1) Delayed response: the server responds slowly to the request, which makes it impossible for the attacker to exhaust all passwords within a limited time
2) Account lock: When the password login fails for an account several times, the server locks the account, making the account temporarily unusable
In this way, even if the information in the smart card is obtained by the attacker, the attacker cannot obtain the user password through offline dictionary attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Long-distance password identifying method based on smart card, smart card, server and system
  • Long-distance password identifying method based on smart card, smart card, server and system
  • Long-distance password identifying method based on smart card, smart card, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The authentication scheme of the present invention is mainly divided into four stages: a registration stage, a login stage, and an authentication stage. Wherein, the two-way authentication stage is optional. During the registration phase, the new user submits his identity ID and password PW to the server. After receiving the registration request, the server first verifies the ID. If the identity verification is passed, the user will receive a smart card containing user information. In the login stage, the user inserts the smart card into the terminal, and enters his identity ID and password PW. The calculation of the login request is done by the smart card, and the login request is sent to the remote server. In the authentication stage, after receiving the login request, the remote server will complete the authentication operation. In a preferred embodiment, to implement mutual authentication, the server proceeds to generate responses and send them back to the user....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides a remote authentication method based on an intelligent card password, the intelligent card applying said method, a server and a system and a method for changing passwords and a system, in which, the password remote authentication method includes: the server utilizes a first Has function value inputting a system cryptographic key and a second Has inverse function value with the user password as the input to generate ciphered user information to be stored in an intelligent card, when a remote server is logged on, the intelligent card uses the second Has function value with the user password as the input to act on the ciphered user information in the same mode to the inverse function of the second Has function to get the second ciphered user information, computes the third Has function value with the second ciphered user information as the input to send the log-on request information containing the third Has function value to the server, which verifies the third Has function value so as to authenticate passwords.

Description

technical field [0001] The invention relates to remote authentication, in particular to a smart card-based password remote authentication method and system, and a password changing method and system. Background technique [0002] With the rapid development of computer networks, users can easily use the network to access resources in remote systems, such as home office needs to access company files, or registered users access online resources and so on. While users enjoy convenience and speed, the safety and efficiency of remote access become the key to the design of the entire system. [0003] Authentication is to prevent counterfeiting and unauthorized network access, thereby protecting information in remote systems from being obtained illegally. In computer network system, password authentication is one of the most popular verification methods used to solve the system's confidentiality and security problems. However, the traditional way of relying solely on user name and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/10G06F9/45G06K19/07
CPCG06F21/445H04L2209/38G07C9/00039H04L9/3236H04L9/3226H04L9/3234G06F21/34G07C9/23H04L9/50
Inventor 曹珍富董晓蕾柴震川郑志彬位继伟
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products