CN103236927B - A kind of authentication method based on dynamic ID mark and system - Google Patents

A kind of authentication method based on dynamic ID mark and system Download PDF

Info

Publication number
CN103236927B
CN103236927B CN201310132283.0A CN201310132283A CN103236927B CN 103236927 B CN103236927 B CN 103236927B CN 201310132283 A CN201310132283 A CN 201310132283A CN 103236927 B CN103236927 B CN 103236927B
Authority
CN
China
Prior art keywords
identification information
user
dynamic
server
technical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310132283.0A
Other languages
Chinese (zh)
Other versions
CN103236927A (en
Inventor
罗文坚
赵冬冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Original Assignee
University of Science and Technology of China USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC filed Critical University of Science and Technology of China USTC
Priority to CN201310132283.0A priority Critical patent/CN103236927B/en
Publication of CN103236927A publication Critical patent/CN103236927A/en
Application granted granted Critical
Publication of CN103236927B publication Critical patent/CN103236927B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of authentication method based on dynamic ID mark and system, its method includes two kinds of technical schemes, its system includes client and server: in the first technical scheme, client passes through negative data storehouse generating algorithm, the dynamic ID identification information transmission being generated user by user real identification identification information is authenticated to server, and server is authenticated after then recovering the user real identification identification information that this dynamic ID identification information is corresponding;In the second technical scheme, client passes through one-way hash function and negative data storehouse generating algorithm, the dynamic ID identification information transmission being generated user by user real identification identification information and default secret parameter is authenticated to server, server is then generated dynamic ID identification information by same method by the secret parameter of locally stored user real identification identification information and correspondence, and is authenticated the dynamic ID identification information of the user received.By using method and system disclosed by the invention, improve safety.

Description

A kind of authentication method based on dynamic ID mark and system
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of authentication method based on dynamic ID mark and system.
Background technology
Along with the high speed development of network technology, emerge substantial amounts of network application.In many applications, user is required for Access server to obtain system resource.In order to ensure the legal use of user that server resource can only have been authorized, system Need user is carried out authentication.Identification information is the important evidence realizing authentication.But, in major part In application, identification information is all that this can cause the identity of user to be revealed in plain text or to use in the way of static state.
But, at many identity informations such as ecommerce, electronic voting system, Telemedicine System and Tele Financing system In sensitive actual application, the leakage of user identity can cause serious security threat.Such as, in e-commerce field In electronic auction application, the people of the meeting that takes part in auction must use legal identification information to prove oneself being to have permission Bidder, in order in auction process, carry out authentication, it is ensured that the every time non-repudiation of auction.But, for Some relate to the auction of important item, the leakage of the identification information of bidder may result in bidder safety and Privacy is on the hazard.For another example, in important electronic voting, electoral vote information must comprise its identity and power The identification information of limit, in order to system is able to verify that legitimacy and the effectiveness of this ballot.But, if failing effectively to hide throws Identification information in ticket information, may affect the fairness of election results.And for example, remote system is accessed as user Time, User Identity information is typically the important evidence of system authentication user identity legitimacy, if User Identity letter Breath comprises in the packet in a static manner, then assailant can obtain the body of user by modes such as eavesdropping or data intercept bags Part identification information, and on purpose follow the trail of user, camouflage user or user is carried out attack etc..If the identity mark of user Containing the sensitive information of user identity in knowledge information, the leakage of these information is also possible to bring serious damage to user Lose.Therefore, protection user identification information safety in the case of realize authentication it is critical that.
Negative data storehouse by Esponda et al. at paper " Enhancing Privacy through Negative Representations of Data " (UNM Computer Science Technical Report, 2004) and " Online Negative Database " (Proceedings of ICARIS, 2004) formally proposes.Generally, negative data storehouse is only deposited Store up the compression expression of the supplementary set of former data base.And solve the former data base of its correspondence by a negative data storehouse and be equivalent to solve One satisfiability problem, is np complete problem (uncertain problems of multinomial complexity).Therefore, negative data storehouse There is the function of the information security protecting former data base.
At present, negative data storehouse has been used for the fields such as secret protection, image watermarking and sensitive data collection.Such as, Dasgupta et al. is at document " An Investigation of Negative Authentication Systems " (Proceedings of3rd International Conference on Information Warfare and Security, 2008) in, negative data storehouse is applied to identity authorization system, but its authentication method is based on static password, not to Family identification information is protected, therefore, and its Shortcomings that remains unchanged in terms of user identity safety.
Summary of the invention
It is an object of the invention to provide a kind of authentication method based on dynamic ID mark and system, identified by dynamic ID The true identity information of user is not revealed while information realization authentication.
It is an object of the invention to be accomplished by:
A kind of authentication method based on dynamic ID mark, the method includes following two technical scheme:
First technical scheme includes: generation phase, is former data base with user real identification identification information, calls negative The negative data storehouse of this former data base is generated according to storehouse generating algorithm, and as the dynamic ID identification information of user;Send rank Section, replaces with user real identification identification information this dynamic ID identification information and sends to server;Authentication phase, The dynamic ID identification information received is carried out resolving the user real identification identification information obtaining correspondence by described server, And this user real identification identification information is authenticated;
Second technical scheme includes: generation phase, by user real identification identification information and default secret parameter, Call one-way hash function and negative data storehouse generating algorithm generates dynamic ID identification information, and update secret parameter;Send In the stage, user real identification identification information is replaced with this dynamic ID identification information and sends to server;Certification rank Section, after described server receives the dynamic ID identification information of user, server is based on locally stored each legal True identity mark and the corresponding secret parameter of user, generates this by one-way hash function and negative data storehouse generating algorithm The legal dynamic ID identification information in ground, and the user that the dynamic ID identification information generated according to this locality is to receiving is dynamic Identification information is authenticated, if certification is passed through, then corresponding user is validated user, and server update this locality is corresponding Secret parameter in this user.
A kind of Verification System based on dynamic ID mark, this system includes:
Client, for following two technical scheme: in first technical scheme, generation phase, with the true body of user Part identification information is former data base, calls negative data storehouse generating algorithm and generates the negative data storehouse of this former data base, and as using The dynamic ID identification information at family;Transmission phase, replaces with this dynamic ID mark letter by user real identification identification information Cease and send to server;In second technical scheme, generation phase, by user real identification identification information with pre- If secret parameter, call one-way hash function and negative data storehouse generating algorithm and generate dynamic ID identification information, and update Secret parameter;Transmission phase, replaces with user real identification identification information this dynamic ID identification information and sends to clothes Business device;
Server, for following two technical scheme: in first technical scheme, authentication phase, for receiving Dynamic ID identification information carry out resolving and obtain corresponding user real identification identification information, and to this user real identification Identification information is authenticated;In second technical scheme, authentication phase, for receiving the dynamic ID mark of user After information, true identity based on locally stored each validated user mark and corresponding secret parameter, dissipated by unidirectional Array function and negative data storehouse generating algorithm generate local dynamic ID identification information, and the dynamic ID generated according to this locality The user's dynamic ID identification information received is authenticated by identification information, if certification is passed through, then corresponding user is for closing Method user, and update the local secret parameter corresponding to this user.
The authentication method and the system that are thered is provided by the invention described above are it can be seen that by using negative data storehouse technology (or negative data Storehouse technology and one-way hash function) generate dynamic ID identification information carry out authentication, each dynamic ID identification information Only use once, it is therefore prevented that the leakage of user real identification, be effectively improved safety.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, required use in embodiment being described below Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is only some embodiments of the present invention, for From the point of view of those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain according to these accompanying drawings Other accompanying drawings.
The registration phase flow chart of a kind of based on dynamic ID mark the authentication method that Fig. 1 provides for the embodiment of the present invention one;
The generation phase flow chart of a kind of based on dynamic ID mark the authentication method that Fig. 2 provides for the embodiment of the present invention one;
The authentication phase flow chart of a kind of based on dynamic ID mark the authentication method that Fig. 3 provides for the embodiment of the present invention one;
The registration phase flow process of another authentication method based on dynamic ID mark that Fig. 4 provides for the embodiment of the present invention two Figure;
The generation phase flow process of another authentication method based on dynamic ID mark that Fig. 5 provides for the embodiment of the present invention two Figure;
The authentication phase flow process of another authentication method based on dynamic ID mark that Fig. 6 provides for the embodiment of the present invention two Figure;
The schematic diagram of a kind of based on dynamic ID mark the Verification System that Fig. 7 provides for the embodiment of the present invention three.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly and completely Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Based on Embodiments of the invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into protection scope of the present invention.
The present invention carries out authentication based on dynamic ID mark.Dynamic ID identification method is that one can guarantee that user is true The safety of identity information also realizes identity authentication method.Compared to by real identification information with in plain text or static Mode use, dynamic ID identification method be based on user real identification identification information produce a series of different and Hold the new identification information (i.e. dynamic ID identification information) of certification.In dynamic ID identification method, user makes Substitute static, real identification information by the identification information being continually changing, and each identification information is only Use once, this assailant cannot be determined which packet belongs to same user, it is difficult to user is tracked and Attack.
The authentication method based on dynamic ID identification information that the present invention provides mainly has two kinds of implementations, for the ease of saying Bright, will be described in detail with embodiment two by embodiment one.The present invention provide based on dynamic ID identification information Verification System be made up of client and server, for purposes of illustration only, be then described in detail by example three.
Embodiment one
The embodiment of the present invention carries out authentication by dynamic ID identification information.In this embodiment, client directly with The true identity identification information of user generates negative data storehouse as former data base, and the negative data storehouse generated is dynamic ID Identification information;After server receives the message of user, from user message, extract dynamic ID identification information (the most negative Data base), and recover former data base by negative data storehouse, i.e. can get the true identity identification information of user and carry out Certification.The authentication method based on dynamic ID mark that the embodiment of the present invention provides mainly includes four-stage: register rank Section, generation phase, transmission phase and authentication phase.The present embodiment is described in detail by 1-3 below in conjunction with the accompanying drawings.
(1) registration phase
The validated user of one user's server to be become must be to server registration, and server only allows legal user to obtain Take system resource.Registration process is primarily to set up the information of sharing between user and server, in order to carry out follow-up Verification process.As shown in fig. 1, key step includes the flow process of execution in detail of registration phase:
Step 11, send registration request with user orientation server, and the true identity identification information of oneself is passed through safe lane It is sent to server.
Step 12, server authentication user the form of true identity identification information the most legal.If legal, proceed to step 13, otherwise, proceed to step 14.
Step 13, server send, to client, the message that succeeds in registration, and the true identity identification information storage of user are arrived In local validated user list item.
Step 14, server send registration failure message to client.
(2) generation phase
After completing registration phase, message can be sent to server and realize certification.Before the message, user is first Need to generate dynamic ID identification information by the true identity identification information of oneself.Generation phase is generation dynamic ID The process of identification information, main flow process is as in figure 2 it is shown, mainly comprise the steps:
Step 21, using user real identification identification information as former data base, and the generating algorithm calling negative data storehouse generates Negative data storehouse.
Step 22, the tuple in the negative data storehouse generated is carried out random alignment, and this negative data storehouse is moved as user State identification information.
In embodiments of the present invention, negative data storehouse generating algorithm needs to generate complete and reversible negative data storehouse and (complete refers to Negative data storehouse covers the whole supplementary set of former data base, reversible refers to that recovering former data base by negative data storehouse is to calculate Feasible).Further, it is contemplated that the high efficiency of algorithm, prefix algorithm (Prefix algorithm) can be used to generate negative Data base.Prefix algorithm refers to the paper " Negative representations of information " of Esponda et al. (International Journal of Information Security, 2009).
(3) transmission phase
After completing generation phase, i.e. can get a dynamic ID identification information, this dynamic ID identification information can be used for recognizing Card.Sending message phase, user first by the dynamic ID identification information that generated replace in message all really Or the identification information of static state, transmit the message to server the most again.Owing to dynamic ID identification information is more static Identification information has higher safety, and dynamic ID mark is continually changing, therefore, and dynamic ID mark Knowledge information can protect the true identity information of user, and prevents tracked.
(4) authentication phase
In authentication phase, server receives the message that user sends, and therefrom extracts negative data storehouse (i.e. dynamic ID mark Knowledge information), and this negative data storehouse is carried out inverse transformation obtain former data base (i.e. the true identity identification information of user). Then, check that whether this identification information is the true identity identification information of the validated user in this earth's surface, the most then User passes through certification.The flow process of authentication phase is as it is shown on figure 3, mainly comprise the steps that
Step 31, server receive the message that user sends, and therefrom extract negative data storehouse.
Being inverted in the negative data storehouse extracted by step 32, server, obtains former data base.
Step 33, server check that whether this identification information is the true identity mark letter of the validated user in this earth's surface Breath.The most then user passes through certification;Otherwise, user authentication failure.
The embodiment of the present invention one carries out authentication by dynamic ID identification information, and user uses the identity mark being continually changing Know information substitution static state, real identification information, and each identification information only uses once, effectively carries High safety.
Embodiment two
In embodiments of the present invention, client not only have shared the true identity identification information of user with server, the most shared One secret parameter.Based on these shared data, client is raw by one-way hash function and negative data storehouse generating algorithm Become dynamic ID identification information.After server receives the message of user, can therefrom extract dynamic ID identification information. Then, based on locally stored validated user true identity mark and secret parameter, server by one-way hash function and Negative data storehouse generating algorithm generates dynamic ID identification information, and compares with the dynamic ID identification information in user message, To carry out authentication.The authentication method based on dynamic ID mark that this embodiment provides mainly includes four-stage: note Volume stage, generation phase, transmission phase and authentication phase.For the ease of understanding the present invention, below in conjunction with the accompanying drawings 4-6 make into One step explanation.
(1) registration phase
In the present embodiment, user not only have shared the true identity identification information of oneself at registration phase with server, also Have shared a secret parameter (such as, the random number seed of PRNG, maybe can produce the most different The parameter of data).Detailed process as shown in Figure 4, mainly comprises the steps that
Step 41, a default secret parameter (such as, selecting a random number seed).
Step 42, to server send registration request, and by user real identification identification information and preset secret parameter lead to Cross safe lane and be sent to server.
Step 43, server check that the form of the true identity identification information of this user is the most legal.If legal, then proceed to Step 44, otherwise, proceeds to step 45.
Step 44, server send the confirmation message succeeded in registration to client, and by the true identity identification information of user Store in local validated user list item with this secret parameter.
Step 45, server send registration failure message to client.
(2) generation phase
In embodiments of the present invention, not only used negative data storehouse during the generation of dynamic ID identification information and generate calculation Method, and employ one-way hash function, there is dual security mechanism, safety is higher.Additionally, dynamic ID mark The generation of knowledge information is together decided on by user real identification identification information and secret parameter.Detailed flow process is as it is shown in figure 5, lead Comprise following step:
Step 51, utilize secret parameter to produce next random number, and the random number of generation is connected to the true body of user The end of part identification information forms a new string.
Step 52, employing one-way hash function carry out hash to the new string after connecting and obtain hash code.
Step 53, this hash code is input in the generating algorithm of negative data storehouse as former data base, and generating algorithm is produced Raw negative data storehouse is as dynamic ID identification information.
Secret parameter (i.e. random number seed) is updated to current random number by step 54, client.
Further, in this enforcement example, one-way hash function may be selected to be the algorithm of SHA series, and use negative Data base's generating algorithm then needs to generate the negative data storehouse being difficult to resolve and (is difficult to resolve and refers to recover former data base from negative data storehouse at meter It is infeasible for counting in).In view of the high efficiency of algorithm, can negative data storehouse generating algorithm be further preferably that q-hidden calculates Method.About q-hidden algorithm, refer to paper " the Protecting Data Privacy through of Esponda et al. Hard-to-Reverse Negative Databases " (International Journal of Information Security, 2007) and paper " the Generating Hard Satisfiable Formulas by Hiding Solutions of Jia et al. Deceptively " (Proceedings of the20th National Conference on Artificial Intelligence, 2005).Wherein, parameter q of q-hidden algorithm is preferably 0.5, and parameter r is preferably 5.5.Negative data storehouse generating algorithm The random number of middle use is all produced by the random number seed shared, and which ensure that server is held same wheel with validated user The negative data storehouse produced in row is identical.
(3) transmission phase
After completing the generation phase of the present embodiment, user can obtain a dynamic ID identification information.In order to protect user True identity identification information, prevent tracked and opposing Replay Attack etc., user needs before the message by message Real or static identification information replaces with generated dynamic ID identification information, then sends it to service Device.
(4) authentication phase
After server receives user's dynamic ID identification information, the identity of user can be authenticated.If sending message User is validated user, then in server, the random number seed in this validated user list item is previous at generation phase with this user Cause.Owing to server cannot determine that the user sending message is corresponding with which list item in local validated user table, therefore, First server respectively generates a negative data storehouse according to the information of each validated user, and (this generation process is generating rank with user The process of Duan Zhihang is identical, and one-way hash function, negative data storehouse generating algorithm and algorithm parameter that server is used are equal With user generation phase used identical), then, server check from receive message extract negative data storehouse The most identical with certain negative data storehouse that this locality is generated.If there is the negative data storehouse of certain this locality and the negative data extracted Storehouse is identical, then prove that the user sending message is validated user, and this user passes through certification, and server update this locality corresponds to The secret parameter of this user.As shown in Figure 6, key step is as described below for detailed flow process:
Step 61, server receive the message that user sends, and therefrom extract negative data storehouse.
Each with being labeled as non-test status per family by local validated user table of step 62, server.
Step 63, server check that in local user's table, all of user is the most all labeled as test status.If so, tie Bundle authentication phase, user fails by certification;If it is not, then there is also not verified user's list item, perform step 64.
Step 64, server select a not verified user from local validated user table, use in this user's list item Random number seed produces next random number, and this random number is connected to the end of the true identity identification information of this user Tail, forms a new string.
Step 65, server are by the new hash code gone here and there of one-way hash function generation arranged with this user.
Step 66, server are by the negative data storehouse generating algorithm arranged with this user and PRNG, to be produced Raw hash code is former data base, generates negative data storehouse and as dynamic ID identification information.
The dynamic ID identification information generated in step 67, server check step 66 whether with step 61 in extract dynamic State identification information is identical.If identical, then perform step 69;If it is different, then perform step 68.
Step 68, server mark the user as checking, and jump to step 63.
Step 69, the user of transmission message pass through certification, and server allows user to log in, and are somebody's turn to do with current random number replacement Random number seed in user's list item, terminates authentication phase.
In this embodiment, owing to the identification information that dynamic ID identification information is more static has higher safety, And dynamic ID mark is continually changing, and therefore, dynamic ID identification information can protect the true identity of user to believe Breath, and prevent tracked.
For example and without limitation, the dynamic ID identification method in embodiment two can be used for solving the identity in electronic voting Hide and Verify Your Identity questions.Main implementation method is: the elector in electronic voting system is as validated user, and electric Vote-counting center in sub-election system, as server, processes identification information further in accordance with above-mentioned steps.Thus, Even if the election message person of being hacked that elector sends intercepts and captures, assailant also cannot be identified by the dynamic ID in message Information obtains the true identity identification information of user, therefore, it is impossible to determine the true identity information of this sender of the message, also The sender of message cannot be pretended.During additionally, due to send election message every time, the dynamic ID that identical user uses Identification information is the most different, and therefore, message interception person also cannot pass through certain dynamic ID identification information trace message sender The election information of next time.On the other hand, even if the message person of being hacked that elector sends intercepts and captures, assailant also cannot pass through Dynamic ID identification information in message determines the true identity information of sender, and this makes electoral true identity information Protected, it is ensured that elected fairness.Electoral every legal election message can pass through dynamic ID Identification information is by vote-counting center's success identity, and completes count of votes.
Hide and identity it addition, the dynamic ID identification method in embodiment two can be additionally used in the identity solved in electronic auction Authentication question.Main implementation method is: the bidder in electronic auction system is as validated user, and electronic auction system In auction center as server, process identification information further in accordance with above-mentioned steps.Thus, bidder sends Even if auction message intercepted by other people, due to that do not comprise any static state in message or real subscriber identity information, Interceptor also cannot obtain the true identity identification information of user, therefore, nothing by the dynamic ID identification information in message Method determines the true identity information of bidder, also cannot generate effective dynamic ID identification information, thus cannot pretend competing Bat person.Due in the message that bidder sends every time use dynamic ID identification information the most different, therefore, interceptor without Method is followed the trail of by the dynamic ID identification information of certain message and locks the auction message that certain bidder is next.Whole auction During, owing to the true identity information of bidder will not be compromised, this makes the fairness of auction be ensured.This Outward, the identity of bidder can be authenticated by auction center by the dynamic ID identification information in every auction message, and Verify legitimacy and the effectiveness of each auction, this guarantees the non-repudiation of auction.
In Tele Financing system and Telemedicine System etc. are applied, implementation like above can be used, it is achieved identity Hide and complete authentication, reaching to protect the purpose of user identity privacy.
Embodiment three
Fig. 7 is the schematic diagram of a kind of based on dynamic ID mark the Verification System that the embodiment of the present invention three provides.Such as Fig. 7 institute Showing, this system specifically includes that
Client 71, for following two technical scheme: in first technical scheme, generation phase, true with user Identification information is former data base, calls negative data storehouse generating algorithm and generates the negative data storehouse of this former data base, and conduct The dynamic ID identification information of user;Transmission phase, replaces with this dynamic ID mark by user real identification identification information Information also sends to server;In second technical scheme, generation phase, by user real identification identification information and The secret parameter preset, calls one-way hash function and negative data storehouse generating algorithm and generates dynamic ID identification information, and more New secret parameter;Transmission phase, replaces with user real identification identification information this dynamic ID identification information and sends extremely Server;
Server 72, for following two technical scheme: in first technical scheme, authentication phase, for reception To dynamic ID identification information carry out resolving and obtain corresponding user real identification identification information, and body true to this user Part identification information is authenticated;In second technical scheme, authentication phase, for receiving the dynamic ID mark of user After knowledge information, true identity based on locally stored each validated user mark and corresponding secret parameter, by unidirectional Hash function and negative data storehouse generating algorithm generate local dynamic ID identification information, and the dynamic body generated according to this locality The user's dynamic ID identification information received is authenticated by part identification information, if certification is passed through, then corresponding user is Validated user, and update the local secret parameter corresponding to this user.
Described client includes with server:
Wherein, described client 71 includes: information sending module 711, in first technical scheme, for by safety Registration request is sent to server 72 by channel with true identity identification information;In second technical scheme, it is used for passing through Registration request, true identity identification information and default secret parameter are sent to server 72 by safe lane;
Described server 72 includes: information authentication module 721, in first technical scheme, for the user received The form of true identity identification information is verified;If form is legal, then this user real identification identification information is stored in this In ground validated user list, and send the confirmation message succeeded in registration to client 71;Otherwise, return registration failure to disappear Breath;In second technical scheme, for the form of the user real identification identification information received is verified;If Form is legal, then the secret parameter of this user real identification identification information and correspondence be stored in local validated user list, And the confirmation message succeeded in registration is sent to client 71;Otherwise, registration failure message is returned.
Described server 72 also includes:
User authentication module 722, for the legitimacy of the authentication phase checking user in first and second technical scheme.
It should be noted that the specific implementation of function that each functional module comprised in said system is realized is front Each embodiment in face has a detailed description, therefore has here repeated no more.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, only with above-mentioned each function mould The division of block is illustrated, and in actual application, can distribute above-mentioned functions by different function moulds as desired Block completes, and the internal structure of device will be divided into different functional modules, with complete described above in whole or in part Function.
It is more than three embodiments of the present invention, describes authentication method based on dynamic ID identification information the most in detail And system, a following characteristics is mainly had compared to prior art:
1) time loss needed for calculating is the polynomial time of user real identification identification information length, and requisite space is also The multinomial magnitude of user real identification identification information length.Therefore, the present invention can be not only used for general purpose PC, it is possible to For the equipment (such as mobile device) that computing capability is relatively low.
2) algorithm (including negative data storehouse generating algorithm) that each stage is used is the most relatively simple, it is achieved step is the simplest Clean.Therefore, the present invention is easily achieved.
3) preferably solve hiding user real identification identification information, support the problems such as authentication, do not rely on other Security protocol and certificate scheme, can be independently operated, and also can be used in mixed way with other security strategy.
On the other hand, the embodiment of the present invention two, it also has the following characteristics that
1) the negative data storehouse that the negative data storehouse generating algorithm used generates is difficult to resolve, and has preferable safety.Therefore, Even if assailant has intercepted the message of user, also cannot therefrom recover the true identity identification information of user.This makes to use The true identity information at family will not be compromised.Further, even if assailant obtains all of message, cannot also be passed through these Message obtains the true identity identification information of user.In the case of there is no the true identity identification information of validated user, attack The person of hitting cannot generate effective dynamic ID identification information of this user, and therefore, assailant cannot pretend validated user.
2) the dynamic ID identification information that user uses every time depends not only upon real identification information, and depends on One secret parameter.Owing to have employed the dual protection mechanism that negative data storehouse combines with one-way hash function, even if attacking Person's a certain moment is guessed or enumerates the true identity identification information of user, in the situation that cannot obtain correct random number Under, still cannot verify that its conjecture is the most correct, also cannot produce correct dynamic ID identification information and pretend legal use Family.Therefore, it can resist exhaustive attack and guessing attack.
The above, the only present invention preferably detailed description of the invention, but protection scope of the present invention is not limited thereto, Any those familiar with the art in the technical scope of present disclosure, the change that can readily occur in or replace Change, all should contain within protection scope of the present invention.Therefore, protection scope of the present invention should be with claims Protection domain is as the criterion.

Claims (10)

1. an authentication method based on dynamic ID mark, it is characterised in that the method includes following two technical side Case:
First technical scheme includes: generation phase, is former data base with user real identification identification information, calls negative The negative data storehouse of this former data base is generated according to storehouse generating algorithm, and as the dynamic ID identification information of user;Send rank Section, replaces with user real identification identification information this dynamic ID identification information and sends to server;Authentication phase, The dynamic ID identification information received is carried out resolving the user real identification identification information obtaining correspondence by described server, And this user real identification identification information is authenticated;
Second technical scheme includes: generation phase, by user real identification identification information and default secret parameter, Call one-way hash function and negative data storehouse generating algorithm generates dynamic ID identification information, and update secret parameter;Send In the stage, user real identification identification information is replaced with this dynamic ID identification information and sends to server;Certification rank Section, after described server receives the dynamic ID identification information of user, server is based on locally stored each legal True identity mark and the corresponding secret parameter of user, generates this by one-way hash function and negative data storehouse generating algorithm The legal dynamic ID identification information in ground, and the user that the dynamic ID identification information generated according to this locality is to receiving is dynamic Identification information is authenticated, if certification is passed through, then corresponding user is validated user, and server update this locality is corresponding Secret parameter in this user.
Method the most according to claim 1, it is characterised in that also included registration phase before generation phase, and The step of registration phase includes:
In first technical scheme, by safe lane, registration request is sent to service with true identity identification information Device;The form of the server user real identification identification information to receiving is verified;If form is legal, then by this use Family true identity identification information is stored in local validated user list, and sends the confirmation message succeeded in registration to client; Otherwise, server returns registration failure message;
In second technical scheme, by safe lane by registration request, true identity identification information and default secret Parameter sends to server;The form of the server user real identification identification information to receiving is verified;If form Legal, then the secret parameter of this user real identification identification information and correspondence is stored in local validated user list, and to Client sends the confirmation message succeeded in registration;Otherwise, server returns registration failure message.
Method the most according to claim 1, it is characterised in that the step of described generation phase includes:
In first technical scheme, call negative data storehouse generating algorithm and generated negative data storehouse by described former data base, and right Tuple in this negative data storehouse carries out random alignment, it is thus achieved that the dynamic ID identification information of this user;
In second technical scheme, utilize the secret parameter preset to produce a random number, and be connected to this random number use The end of family true identity identification information forms new string;Use one-way hash function that this new string carries out hash and obtain hash Code, using this hash code as former data base, calls negative data storehouse generating algorithm and is generated negative data storehouse by described former data base, And using this negative data storehouse as the dynamic ID identification information of user.
Method the most according to claim 3, it is characterised in that described authentication phase includes:
In first technical scheme, server carries out inverse transformation to the dynamic ID identification information of user, obtains user true Real identification information, and judge whether described user real identification identification information is locally stored validated user information; The most then this user passes through certification;Otherwise, this user authentication failure;
In second technical scheme, the dynamic ID identification information of some validated users that this locality is generated by server is successively Compared with the user's dynamic ID identification information received, if there is identical dynamic ID mark, then this user passes through Certification, updates this locality secret parameter corresponding to this user;Otherwise, this user authentication failure, do not update secret parameter.
5. according to the method described in any one of claim 1-4, it is characterised in that described negative data storehouse includes:
In first technical scheme, the negative data storehouse of generation covers the whole supplementary set of former data base, and this negative data storehouse The user real identification identification information of correspondence can be recovered by parsing;
In second technical scheme, what user real identification identification information and default secret parameter generated cannot recover Go out the negative data storehouse of former database information.
6. according to the method described in any one of claim 1-4, it is characterised in that described default secret parameter includes:
The random number seed of PRNG, maybe can produce the parameter of a large amount of different data.
7. according to the method described in any one of claim 1-4, it is characterised in that described negative data storehouse generating algorithm bag Include:
Prefix algorithm for first technical scheme;And the q-hidden algorithm for second technical scheme.
8. a Verification System based on dynamic ID mark, it is characterised in that this system includes:
Client, for following two technical scheme: in first technical scheme, generation phase, with the true body of user Part identification information is former data base, calls negative data storehouse generating algorithm and generates the negative data storehouse of this former data base, and as using The dynamic ID identification information at family;Transmission phase, replaces with this dynamic ID mark letter by user real identification identification information Cease and send to server;In second technical scheme, generation phase, by user real identification identification information with pre- If secret parameter, call one-way hash function and negative data storehouse generating algorithm and generate dynamic ID identification information, and update Secret parameter;Transmission phase, replaces with user real identification identification information this dynamic ID identification information and sends to clothes Business device;
Server, for following two technical scheme: in first technical scheme, authentication phase, for receiving Dynamic ID identification information carry out resolving and obtain corresponding user real identification identification information, and to this user real identification Identification information is authenticated;In second technical scheme, authentication phase, for receiving the dynamic ID mark of user After information, true identity based on locally stored each validated user mark and corresponding secret parameter, dissipated by unidirectional Array function and negative data storehouse generating algorithm generate local dynamic ID identification information, and the dynamic ID generated according to this locality The user's dynamic ID identification information received is authenticated by identification information, if certification is passed through, then corresponding user is for closing Method user, and update the local secret parameter corresponding to this user.
System the most according to claim 8, it is characterised in that described client includes with server:
Wherein, described client includes: information sending module, in first technical scheme, is used for passing through safe lane Registration request is sent to server with true identity identification information;In second technical scheme, for being believed by safety Registration request, true identity identification information and default secret parameter are sent to server by road;
Described server includes: information authentication module, in first technical scheme, for true to the user received The form of identification information is verified;If form is legal, then this user real identification identification information is stored in local conjunction In method user list, and send the confirmation message succeeded in registration to client;Otherwise, registration failure message is returned;? In two technical schemes, for the form of the user real identification identification information received is verified;If form closes Method, then be stored in the secret parameter of this user real identification identification information and correspondence in local validated user list, and to visitor Family end sends the confirmation message succeeded in registration;Otherwise, registration failure message is returned.
System the most according to claim 8 or claim 9, it is characterised in that described server also includes:
User authentication module, for the legitimacy of the authentication phase checking user in first and second technical scheme.
CN201310132283.0A 2013-04-16 2013-04-16 A kind of authentication method based on dynamic ID mark and system Expired - Fee Related CN103236927B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310132283.0A CN103236927B (en) 2013-04-16 2013-04-16 A kind of authentication method based on dynamic ID mark and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310132283.0A CN103236927B (en) 2013-04-16 2013-04-16 A kind of authentication method based on dynamic ID mark and system

Publications (2)

Publication Number Publication Date
CN103236927A CN103236927A (en) 2013-08-07
CN103236927B true CN103236927B (en) 2016-09-14

Family

ID=48884945

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310132283.0A Expired - Fee Related CN103236927B (en) 2013-04-16 2013-04-16 A kind of authentication method based on dynamic ID mark and system

Country Status (1)

Country Link
CN (1) CN103236927B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294909B (en) * 2016-04-04 2020-10-02 汪风珍 Electronic identity real-name authentication product and method
CN107872429A (en) * 2016-09-26 2018-04-03 中国电信股份有限公司 The method and system that identity is examined is realized in VXLAN
CN107770183B (en) * 2017-10-30 2020-11-20 新华三信息安全技术有限公司 Data transmission method and device
CN108182401B (en) * 2017-12-27 2021-09-03 武汉理工大学 Safe iris identification method based on aggregated block information
CN110868374A (en) * 2018-08-27 2020-03-06 京东方科技集团股份有限公司 Security authentication method, server and client device
CN111586688B (en) * 2020-04-24 2023-12-05 深圳市塔洛思技术有限公司 Method for generating and verifying identity based on environment perception
CN112217861B (en) * 2020-09-02 2022-10-28 中国人民解放军战略支援部队信息工程大学 5G network boundary network element identification protection method and device based on identification jump
CN112203279B (en) * 2020-09-02 2022-07-12 中国人民解放军战略支援部队信息工程大学 5G network boundary network element address protection method and device based on discrete address change
CN113378623A (en) * 2021-04-08 2021-09-10 武汉理工大学 Face recognition method and system based on negative database algorithm encryption
CN112989398B (en) * 2021-05-18 2021-07-30 腾讯科技(深圳)有限公司 Data processing method and device for block chain network, computer equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045601A (en) * 2009-10-22 2011-05-04 中兴通讯股份有限公司 Optical network unit (ONU) activating method and system in gigabit passive optical network (GPON) system
CN103020571A (en) * 2013-01-17 2013-04-03 合肥学院 Radio-frequency identification based bidirectional authentication method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045601A (en) * 2009-10-22 2011-05-04 中兴通讯股份有限公司 Optical network unit (ONU) activating method and system in gigabit passive optical network (GPON) system
CN103020571A (en) * 2013-01-17 2013-04-03 合肥学院 Radio-frequency identification based bidirectional authentication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
An investigation of negative authentication systems;Dasgupta, D;Azeem, R;《3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY,PROCEEDINGS》;20080425;第117页至126页 *

Also Published As

Publication number Publication date
CN103236927A (en) 2013-08-07

Similar Documents

Publication Publication Date Title
CN103236927B (en) A kind of authentication method based on dynamic ID mark and system
Jiang et al. Three-factor authentication protocol using physical unclonable function for IoV
CN102647461B (en) Communication means based on HTTP, server, terminal
CN101674304B (en) Network identity authentication system and method
CN104735065B (en) A kind of data processing method, electronic equipment and server
CN103338201B (en) The remote identity authentication method that under a kind of environment of multi-server, registration center participates in
CN102685093A (en) Mobile-terminal-based identity authentication system and method
Ibrahim et al. Electionblock: an electronic voting system using blockchain and fingerprint authentication
CN108777616B (en) Electronic election method, management device and electronic election system for resisting quantum computer attack
CN105681470A (en) Communication method, server and terminal based on hypertext transfer protocol
CN110737915B (en) Anti-quantum-computation anonymous identity recognition method and system based on implicit certificate
CN105791274B (en) A kind of distributed cryptographic storage and method for authenticating based on local area network
CN112329519A (en) Safe online fingerprint matching method
Schneider et al. Survey on remote electronic voting
CN109245894A (en) A kind of distributed cloud storage system based on intelligent contract
CN103347018A (en) Long-distance identity authentication method based on intelligent card and under multiple-service environment
CN111355591A (en) Block chain account safety management method based on real-name authentication technology
CN106060097A (en) Management system and management method for information security competition
CN101667917B (en) Dynamic password input rule
Yuan et al. A universally composable secure grouping‐proof protocol for RFID tags
Kumar et al. Blockchain and internet of things (IoT) enabled smart e-voting system
CN116976890A (en) Multi-sign encryption transaction system of block chain
CN112787810A (en) Electronic voting method and device based on block chain and safe multi-party calculation
CN104009851B (en) A kind of bank net one-time pad two-way authentication secure log technology
CN116318901A (en) Privacy and verifiable internet of things data aggregation method integrating blockchain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160914

CF01 Termination of patent right due to non-payment of annual fee