Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

67 results about "Guessing attack" patented technology

PUF-based three-factor anonymous user authentication protocol method in Internet of Things

The invention discloses a PUF (Physical Unclonable Function)-based three-factor anonymous user authentication protocol method in the Internet of Things, which solves the security problems such as physical clone attacks and the like, and is implemented by the following steps that: a gateway generates a long-term key for registration and key negotiation of nodes and users; the node sends a PUF-basedchallenge and response to the gateway, and the gateway generates an authentication certificate and sends a node key to the node to complete registration; the user sends the identity identifier to thegateway, the gateway generates a user dynamic identity identifier and a user key and sends the user dynamic identity identifier and the user key to the user, and the user encrypts and stores the userdynamic identity identifier and the user key in the smart card to complete registration; and the user, the gateway and the node perform mutual authentication and key agreement to form a PUF-based three-factor anonymous user authentication protocol method in the Internet of Things. Based on three-factor authentication, smart card loss, password guessing attack and the like can be resisted; the method achieves the anonymity of the user and the node, is small in calculation amount, is high in efficiency, is suitable for IOT nodes with limited resources, and is used for IOT safety communication.
Owner:XIDIAN UNIV

Radio frequency identification system safety certification and key agreement method

The invention discloses a radio frequency identification system safety certification and key agreement method. According to the radio frequency identification system safety certification and key agreement method, transmission of public values of the two communication parties is simplified, the public values are transmitted through a certification server, influences on the safety performance are avoided, and therefore even through the server is broken into, it is certain that following certification can not be passed. In the certification process, three-round communication and seven-step operation are required to be executed to generate a session key, and compared with same-class methods, the radio frequency identification system safety certification and key agreement method has the advantage that efficiency is greatly improved. The radio frequency identification system safety certification and key agreement method has the advantages of being safe, low in storage cost and communication cost, novel, easy to implement and the like. By means of the radio frequency identification system safety certification and key agreement method, server leakage attack, midwayer attack, off-line guessing attack and not-detectable on-line guessing attack can be effectively defended, meanwhile, a bidirectional certification session key with high safety performance and forward safety performance are provided, and the radio frequency identification system safety certification and key agreement method is quite suitable for RFID application systems which must provide privacy protection.
Owner:NANJING UNIV OF POSTS & TELECOMM

Keyword searchable delay encryption method and system

PendingCN112861153AHigh costMeet the requirements of real-world scenariosDigital data protectionSpecial data processing applicationsInternet privacyCiphertext
The invention relates to a keyword searchable delayed encryption method and system. The method at least comprises the steps of generating a searchable ciphertext Cw and / or a file ciphertext for a keyword w of at least one to-be-uploaded file in a delayed encryption mode based on a public key PK, and uploading the searchable ciphertext Cw and / or the file ciphertext to a cloud server; at least one retrieval trap door Tw generated for the keyword w to be retrieved based on the private key SK is sent to a cloud server, the cloud server retrieves all the searchable ciphertexts Cw based on the retrieval trap door Tw to obtain the corresponding searchable ciphertexts Cw, and corresponding file ciphertexts are determined based on the searchable ciphertexts Cw obtained through retrieval and fed back to a receiving end. According to the method, the generation time of the searchable ciphertext is delayed, and the keyword guessing attack difficulty of an attacker is increased, so that the keyword guessing attack between the cloud server and the sending end and between the cloud server and the receiving end is realized in a scene without a secure channel, a specified trusted server, a priori keyword space and strict user authentication. The searchable public key encryption has the characteristic of resisting keyword guessing attack.
Owner:HUAZHONG UNIV OF SCI & TECH

Identity verification method for resisting password-guessing replay attack

InactiveCN106534196AAvoid the problem of password crackingAchieve the effect of anti-password guessing replay attackTransmissionTimestampWeb application
The invention relates to the technical field of identity authentication, in particular to an identity verification method for resisting a password-guessing replay attack. The identity verification method related by the invention comprises the following steps: first of all, carrying out time synchronization on a server and a user browser which needs identity verification; then obtaining a shared key by the user browser via an https mechanism; obtaining a current timestamp; carrying out encryption on a usename and the timestamp together with a password by employing the shared key by the user browser; then encrypting whole identity verification information with the shared key again; then carrying out two times of decryption by a server side to obtain two pieces of identity verification information; then making a comparison respectively, and if the two pieces of the identity verification information are completely consistent, comparing the timestamp with a current time; and at last, verifying whether a usename and password combination in the information is consistent with the usename and password combination stored in a system, and if yes, executing the verification is passed. According to the identity verification method related by the invention, the identity verification via the password-guessing attack is avoided; and the identity verification method can be used in the identity verification of a Web application.
Owner:G CLOUD TECH

Password strength evaluation method based on weak password deduction

ActiveCN108647511AEnhanced capabilities for guessing attacksHigh precisionDigital data authenticationPasswordFrequency of occurrence
The invention discloses a password strength evaluation method based on weak password deduction, and the method comprises the following steps: 1) generation of a weak password set: selecting highly ranked passwords as the weak password set from a password sample according to a mode of a descending order of frequency of occurrence; 2) grammar training: parsing passwords in a training set based on the weak password set, and generating a probability context-free grammar table with a weak password tag; 3) password strength evaluation: inputting the password, calculating probability of the passwordaccording to the grammar table generated through the grammar training, wherein the higher a probability value is, the lower the password strength is; 4) updating of the grammar table: according to theinput password, dynamically adjusting distribution probability of the probability context-free grammar with the weak password tag. In the method provided by the invention, the password similar as thepassword in the weak password set is deduced through the existing probability context-free grammar, the method inherits efficiency and robustness of the conventional password strength evaluation method and simultaneously can eliminate potential weak passwords, enhance password-guessing attack resistance ability of the passwords and improve security of users.
Owner:EAST CHINA NORMAL UNIV

Lightweight password guessing dictionary generation method and device based on variational auto-encoder

The invention belongs to the technical field of network security, and particularly relates to a lightweight password guessing dictionary generation method and device based on a variational auto-encoder, and the method comprises the steps: carrying out the preprocessing of passwords in a training set according to a preset condition, and obtaining a password set in a unified format; dividing the password set according to the structure to obtain password fragments, and segmenting each password fragment into character combinations by using an n-gram method; screening out a common character combination according to preset parameters, and then coding the password in a vector form; initializing a variational auto-encoder model, and training the variational auto-encoder model by using the vector form password until a loss function value does not decrease any more; and generating guess passwords by using the trained variational auto-encoder model, and performing descending order arrangement according to the occurrence frequency of the generated passwords to obtain a password guess dictionary. According to the method, the model training time and the generation time of the password guessing dictionary are greatly shortened, the success rate of password guessing is improved, and the timeliness of dictionary guessing attacks is ensured.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products