A multi-user authentication method and system

An authentication method and authentication system technology, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as security risks, share and authentication key leakage, and achieve the effect of improving security and avoiding share leakage.

Active Publication Date: 2020-11-03
贵州玛迩比特通信科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In practice, the system assigns the authentication key to each user in a secret sharing manner. During the authentication, the participating users need to show their share, and after recovering the complete authentication factor together, compare it with the authentication key inside the system. Judging whether the authentication is passed, this "secret sharing" method makes the user's shares and authentication keys have the risk of being leaked
[0004] Moreover, the traditional authentication system is mainly based on the "single authentication server" method. The authentication key is only stored on a single server, which has great security risks. For example, hackers only need to break through the single server to steal the authentication. key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-user authentication method and system
  • A multi-user authentication method and system
  • A multi-user authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0047] figure 1 A multi-user authentication method provided by Embodiment 1 of the present invention is applied to multiple network terminals. In this embodiment, the architecture of the multi-user authentication system is as follows figure 2 As shown, the system includes four entities: a network terminal group (including M keyers), a storage group (including N storages), a key management center, and authentication and verification nodes, and there is a network connection between each entity.

[0048] Such as figure 2 As shown, each entity is equipped with a unified symmetric encryption algorithm and Hash algorithm, and the symmetric encryption algorithm and Hash algorithm are used to encrypt or reverse the key. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multi-user authentication method and system. The method includes the steps that random authentication secret keys generated by a secret key management center are acquired, and multiple different authentication portions are generated for the random authentication secret keys; the multiple different authentication portions are randomly sent to multiple network terminals and multiple memories; values are generated in entities, the values are sent to authentication verification nodes, the values are calculated, and if the values obtained after calculation are matched with preset values, authentication succeeds. The multiple different authentication portions are generated for the authentication secret keys and distributed to participants, and the authentication resultis judged in a value calculation mode. The defect that portions owned by users leak is avoided, and the security of the system is greatly improved.

Description

technical field [0001] The present invention relates to the field of Internet of Things technology and big data technology, in particular to a multi-user authentication method, and also to a multi-user authentication system. Background technique [0002] The traditional multi-user authentication system mainly uses the "secret sharing" method for authentication, that is, the authentication key. The idea of ​​"secret sharing" is to split the secret in an appropriate way, and each share after splitting is shared by different participants. Management, a single participant cannot recover the secret information, only several participants cooperate together to recover the secret information. [0003] In practice, the system assigns the authentication key to each user in a secret sharing manner. During the authentication, the participating users need to show their share, and after recovering the complete authentication factor together, compare it with the authentication key inside t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0822H04L9/0825H04L9/083H04L9/085
Inventor 马敏耀
Owner 贵州玛迩比特通信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products