Method for realizing three-factor anonymous identity authentication based on SM2 algorithm
An identity authentication and three-factor technology, applied in the field of network information security, can solve problems such as offline dictionary attacks, user behavior sensitive information leakage, etc., and achieve the effect of solving sensitive information leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.
[0048] This SM2 algorithm of the present invention realizes the method for three-factor anonymous identity authentication, which comprises the following steps:
[0049] (1) System initialization, the server generates a private key d and a public key P, keeps the private key d secret, and releases the public key P;
[0050] (2) User registration;
[0051] (3) User offline pre-authentication;
[0052] (4) Online two-way authentication and key agreement;
[0053] (5) User password update.
[0054] As a preferred embodiment of the present invention, described step (2) specifically includes the following steps:
[0055] (2.1) The user terminal collects the user's self-selected identification ID, password PW and biometric feature B;
[0056] (2.2) Fuzzy extraction is carried out to the biometric feature of the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com