Dynamic multi-factor identity authentication method and communication method based on threshold

An identity authentication and multi-factor technology, applied in the field of information security, to achieve high user-friendliness and improve security

Active Publication Date: 2022-01-07
PEKING UNIV
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

No research has yet considered dynamic multi-factor authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic multi-factor identity authentication method and communication method based on threshold

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Below in conjunction with accompanying drawing, further describe the present invention through embodiment, but do not limit the scope of the present invention in any way.

[0027] The dynamic multi-factor user identity authentication based on password, multi-device, and biometric features designed by the method provided by the present invention improves the security of the existing key exchange protocol and supports users to randomly select t factors from n factors according to their needs. Authentication factors are used for authentication, and at the same time, it has basic security properties such as forward security and user-friendliness. Realized safe and efficient dynamic multi-factor authentication.

[0028] The user identity authentication process of the present invention includes initialization stage, user registration and authentication stage. figure 1 Shown is the basic structure of the identity authentication protocol of the present invention. Among them, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic multi-factor identity authentication method and a communication method based on a threshold. According to the invention, a user is allowed to perform identity authentication through a password, a plurality of selectable devices and biological characteristics, and the user is supported to autonomously select t factors from n authentication factors for authentication according to requirements. A threshold-based casual pseudo-random function and an authentication key exchange protocol are utilized to construct a threshold multi-factor authentication protocol framework. According to the method, any one of other t-1 factors except a password is used, the password is enhanced into a random key through a modified TOPRF protocol, and the random key is used for running an AKE protocol to perform identity authentication. Except for the password, other factors correspond to one secret key in the TOPRF. The secret key of the equipment factor is stored locally, and the biological factor extracts the biological characteristics of the user into the secret key through a fuzzy extraction technology so as to prevent the leakage of the biological factor when the storage file of the server is leaked.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to a dynamic and practical user identity authentication method, in particular to a threshold-based dynamic multi-factor identity authentication protocol design and implementation method. Background technique [0002] In recent years, Multi-factor Authentication (MFA) has gradually penetrated into people's production and life. Such as authentication methods based on bank cards and PIN codes, authentication based on passwords and SMS verification codes, authentication based on biometric features and electronic passports, etc. User authentication factors are usually divided into three categories: what the user knows (such as password, PIN code, etc.), what the user owns (such as smart card, smart phone, etc.), and what the user is (such as voice, fingerprint, etc.). The multi-factor authentication method is Combine many of these factors. Different from the authentication me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08H04L9/14
CPCH04L63/08H04L63/0861H04L9/3239H04L9/0869H04L9/14
Inventor 王平李文婷程海波
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products