CN105119721B - A kind of three factor remote identity authentication methods based on smart card - Google Patents

A kind of three factor remote identity authentication methods based on smart card Download PDF

Info

Publication number
CN105119721B
CN105119721B CN201510477113.5A CN201510477113A CN105119721B CN 105119721 B CN105119721 B CN 105119721B CN 201510477113 A CN201510477113 A CN 201510477113A CN 105119721 B CN105119721 B CN 105119721B
Authority
CN
China
Prior art keywords
smart card
server
registration center
user
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510477113.5A
Other languages
Chinese (zh)
Other versions
CN105119721A (en
Inventor
刘辉
张小军
崔建明
刘奕辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University of Science and Technology
Original Assignee
Shandong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University of Science and Technology filed Critical Shandong University of Science and Technology
Priority to CN201510477113.5A priority Critical patent/CN105119721B/en
Publication of CN105119721A publication Critical patent/CN105119721A/en
Application granted granted Critical
Publication of CN105119721B publication Critical patent/CN105119721B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of three factor remote identity authentication methods based on smart card, include the following steps:User and server are registered to registration center, wherein, smart card includes encryption information;User logs in;Smart card local verification;Registration center's authentication server and user;Server authentication registration center;Smart card authentication server.The present invention realizes user anonymity, has successfully resisted Denial of Service attack, eavesdropping attack and smart card and has been stolen the attack patterns such as attack.

Description

A kind of three factor remote identity authentication methods based on smart card
Technical field
The present invention relates to information security and network technique field, more particularly to a kind of long-range body of three factors based on smart card Identity authentication method.
Background technology
Network communication technology is quickly grown so that more and more people's custom is serviced by network, such as electronics business Business, E-Government, E-logistics etc..User obtains information from server or enjoys the service that server provides, and needs first Log on to server.Therefore, need there are one the long-distance identity-certifying scheme for being applied to network, to verify the legitimacy of user.But It is that internet is a public environment, anyone can intercept the message between user and server, so how to protect User information prevents that illegal communication is extremely important.
In practical application, the Dual-factor identity authentication method under environment of multi-server is widely used, but such method is still not The environment of high safety, such as finance, military, national security field can be met the requirements.Biological characteristic, such as fingerprint, iris, have Uniqueness, and it is not easy to lose, not malleable, be not easy to usurp, just meet the needs of high safety occasion.Twentieth century 70 years Generation, some researchers begin to focus on biological information, but due to technology restriction, can not efficiently extract, store biological information, The correctness of biological information can not be verified with digital means, so biological identification technology is failed to be used widely.With finger The development of line identification technology, iris recognition technology and voice recognition technology, biological identification technology have come into multiple fields, wherein One important field is exactly identity identifying method.
Three factor identity identifying methods are verified by three factors (" known to user ", " user owns ", " whom user is ") User identity, using biological information it is uniquely constant the characteristics of, enhance the security of identity identifying method.User wants login service During device, in addition to password and identity are provided, input biological information is also needed;If it is gathered when biological information and the registration of input The matching degree of biological information is not up to secure threshold, and server will not provide service to registrant.
But the certain methods provided in the prior art, such as credit identity verification method generally used now, exist Denial of Service attack can not be resisted, the problem of eavesdropping attack, smart card are stolen attack and anonymous sexual assault.
The content of the invention
For disadvantages described above, it is an object of the invention to provide intelligence is based under a kind of safer environment of multi-server Card three factor remote identity authentication methods, can resist Denial of Service attack, eavesdropping attack, smart card be stolen attack, simultaneously With fingerprint identification function.
In order to achieve the above objectives, the present invention adopts the following technical scheme that:
A kind of three factor remote identity authentication methods based on smart card, the described method includes:By server in registration The heart is registered as the legal server in multi-server system;User submits application for registration, after succeeding in registration, user to registration center The smart card for having specific information is obtained, the specific information is { Pi,Di,Ci,Gi,Vi,Zi,Bi, h () }, wherein, Pi、Di、Ci、 Gi、Vi、ZiAnd BiIt is encryption information, Pi provides password PW by useriCryptographic Hash P twicei=h (h (PWi)), Di is use Family identity UIDiSecret valueCiFor the secret value of userRUi= h(UIDi| | x), GiFor the secret value of systematic parameterViFor the secret value of fingerprint feature pointZiAnd BiFor the encryption information of registration center generationb For the random number of smart card generation, z and the key that x, y are registration center;User uses the smart card login service device; The entry password that the smart card is provided according to user carries out local verification, if password is correct, smart card further verifies user Biological characteristic, if being verified, generate first verification data and send it to the server, otherwise terminate session; After the server receives first verification data, generate to prove the second verification data of the server identity, and by the One verification data and the second verification data issue the registration center;The registration center is first according to the second verification number received According to the legitimacy of authentication server identity, then according to the legitimacy of first verification data verification user identity, server and use After the identity at family is all verified, the 3rd verification data of registration center's generation and the 4th verification data, and the 3rd and four are verified Data sending gives the server;The server tests registration center's identity according to the 3rd received verification data Card, if server authentication the 3rd verifies that data are sent out really by the registration center, the server generates server end meeting Key is talked about, and gives the 4th verification data sending to the smart card;Whether the 4th verification data that the smart card authentication receives Legal, if by verification, smart card completes the inspection of server identity legitimacy, and generation smart card end session key is described Smart card is encrypted and is communicated using the session key and symmetrical encipher-decipher method of each self-generating with the server, is otherwise terminated Session.
Further, a kind of the step of three factor remote identity authentication methods based on smart card, server registration, is into one Step includes:Registration center uses key y encryption server identity SIDj, generation cryptographic Hash RSj=h (SIDj| | y), and will {RSj, g, h () } and by safe lane deposit server, wherein g is the parameter of system.
Further, a kind of three factor remote identity authentication methods based on smart card, user are noted in registration center The step of volume, further comprises:User submits User Identity UID to registration centeriWith password PWi, and typing fingerprint;It is described Registration center extracts digitized fingerprint feature point Fi, generate the cryptographic Hash P twice of passwordi=h (h (PWi)), identity adds Close valueThe secret value RU of useri=h (UIDi| | x) andSystematic parameter Secret valueAnd the secret value of fingerprint feature pointThe smart card generates one Random number b, the registration center calculateAnd then it generatesX, y and z are registration centers Key;The registration center is by encryption information { Pi,Di,Ci,Gi,Vi,Zi,Bi, h () } and it is stored in smart card.
Further, a kind of three factor remote identity authentication methods based on smart card, user's login step are further wrapped It includes:The user inputs the password PW of oneself by smart cardi *, smart card judges equation Pi=h (h (PWi *)) whether true, if It sets up, smart card prompting user's typing fingerprint, and extracts its characteristic value Fi *, otherwise terminate session;The smart card passes through calculating Reduce registered fingerprint characteristic valueAnd examine Fi *With FiMatching degree, if the matching degree of the two does not have More than the secure threshold of setting, then login is terminated, if more than the threshold value, logined successfully.
Further, a kind of three factor remote identity authentication methods based on smart card, smart card generate and send first The step of verifying data further comprises:The smart card generation random number ruAnd bnew, and reduce user identifierIt calculatesWithReductionAnd it counts Calculate first verification dataWherein TiIt is the timestamp that smart card end represents current time;Intelligence It can block and auxiliary is verified into dataWith first verification data M1It is sent to server.
Further, a kind of three factor remote identity authentication methods based on smart card, server are sent to registration center The step of first verification data and the second verification data, further comprises:The server receives the verification data of smart card transmission Afterwards, its time stamp T is verifiediValidity, if timestamp terminates communication not in service time scope;Otherwise, server is given birth to Into random numberFor the multiplication of integers group of mould q, q is Big prime, and calculates the second verification dataWherein TjIt is the timestamp that server end represents current time;The server is by first Verify data, the second verification data and related auxiliary verification data such as Registration center is issued Deng whole.
Further, a kind of three factor remote identity authentication methods based on smart card, registration center examine server and User identity legitimacy further comprises:The registration center first verifies that time stamp TiAnd TjWhether effectively, if invalid, Session is terminated, otherwise carries out following steps, the registration center calculates RS'j=h (SIDj| | y) andThen equation M' is examined2=M2Whether true, if set up, it is legal that server has Property, otherwise terminate session;The registration center calculatesWithAnd reduce User IdentityCalculate RU 'i=h (UIDi| | x) andJudge M '1With M1Whether Equal, if equal, the identity of user is legal.
Further, a kind of three factor remote identity authentication methods based on smart card, registration center generate simultaneously The step of sending the 3rd verification data and the 4th verification data further comprises:The registration center calculates3rd verification dataWith the 4th verification DataAnd by { Qj,M3,M4Issue server.
Further, pair of a kind of three factor remote identity authentication methods based on smart card, server and user identity Further comprise to verification step:The server authentication the 3rd verifies whether data are sent out by registration center, if by verifying, Server verifies message to the 4th verification data of smart card forwarding and auxiliaryIt is close to generate server end simultaneously Otherwise key terminates session;The smart card authentication the 4th verifies whether data are sent out by registration center, if by verification, gives birth to Into smart card end key, session is otherwise terminated.
Further, a kind of three factor remote identity authentication methods based on smart card, smart card authentication server identity Following steps are further included after legal:Smart card calculatesAnd with { Znew,BnewReplace it the preceding { Z storedi, Bi}。
{ P is stored in smart card in the inventive solutionsi,Di,Ci,Gi,Vi,Zi,Bi, h () }, except hash function Outside, other information is all secret value, even if being stolen by attacker, will not reveal sensitive information, and intelligence is resisted so as to reach The stolen attack of card and the target for resisting eavesdropping attack.P in smart cardi=h (h (PWi)), user is after password is inputted, smart card The cryptographic Hash twice of password will be calculated, and verified whether and PiIt is equal, so as in the correctness of local verification password, make up The prior art can not local verification password correctness the defects of, well resisted Denial of Service attack.Moreover, the present invention improves The storage of fingerprint and verification method, using feature point extraction and the matched method of threshold value so that fingerprint recognition is easier to realize. In addition, by the present invention in that realize good anonymity with the method that random number encryption and smart card update storage, can resist Anonymous sexual assault.
Description of the drawings
Fig. 1 is the schematic diagram of the specific embodiment server registration stage etch of the present invention;
Fig. 2 is the schematic diagram of the specific embodiment user's registration stage etch of the present invention;
Fig. 3 is the specific embodiment entry stage of the present invention and the schematic diagram of Qualify Phase step.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, not For limiting the present invention.
Include three participants, user U in the technical solution that the present invention is announcedi, registration center RC and server Sj; Including three phases, registration phase, entry stage and Qualify Phase.
As shown in Figure 1,2 and 3, a kind of three factor remote identity authentication methods based on smart card, the described method includes:It will Legal server of the server in registration center is registered as multi-server system;User submits application for registration to registration center, After succeeding in registration, user obtains the smart card for having specific information, and the specific information is { Pi,Di,Ci,Gi,Vi,Zi,Bi,h () }, wherein, Pi、Di、Ci、Gi、Vi、ZiAnd BiIt is encryption information, PiPassword PW is provided by useriCryptographic Hash P twicei= h(h(PWi)), DiFor User Identity UIDiSecret valueCiFor the secret value of userRUi=h (UIDi| | x), GiFor the secret value of systematic parameterViIt is special for fingerprint Levy the secret value of pointZiAnd BiFor the encryption information of registration center generationB is the random number of smart card generation, x, y and the key that z is registration center; User uses the smart card login service device;The entry password that the smart card is provided according to user carries out local verification, if Password is correct, and smart card further verifies the biological characteristic of user, if being verified, generating first verification data and being sent out The server is given, otherwise terminates session;After the server receives first verification data, generate to prove the service Second verification data of device identity, and first verification data and the second verification data are issued into the registration center;The registration It according to the legitimacy of the second verification data verification server identity received, is then verified first according to first verification data at center After the identity of the legitimacy of user identity, server and user are all verified, the 3rd verification data of registration center's generation and the Four verification data, and give the 3rd and four verification data sendings to the server;The server is according to the received the 3rd Verification data verify registration center's identity, if server authentication the 3rd verifies that data are really the institute of registration center Hair, then the server generation server end session key, and give the 4th verification data sending to the smart card;The intelligence Whether the 4th verification data that card verification receives are legal, if by verification, smart card completes the inspection of server identity legitimacy It tests, generation smart card end session key, the smart card is added with the server using the session key of each self-generating and symmetrically Communication is encrypted in decryption method, otherwise terminates session.
{ P is stored in smart card in the inventive solutionsi,Di,Ci,Gi,Vi,Zi,Bi, h () }, except hash function Outside, other information is all secret value, even if being stolen by attacker, will not reveal sensitive information, and intelligence is resisted so as to reach The stolen attack of card and the target for resisting eavesdropping attack.P in smart cardi=h (h (PWi)), user is after password is inputted, smart card It will calculate the cryptographic Hash twice of password, and with verifying whether and PiIt is equal, so as in the correctness of local verification password, this Compensate for the defects of prior art can not carry out local password verification.Moreover, storage and authentication present invention improves over fingerprint Method, using feature point extraction and the matched method of threshold value so that fingerprint recognition is easier to realize.In addition, the present invention is by by the One verification data realize good anonymity using the method that random number encryption and smart card update storage, and can resist anonymity Attack.Authentication server and smart card are carried out by registration center, then server authentication registration center, smart card authentication service Device, this verification method integrally can be achieved to resist the technique effect of server simulated strike.
Further, the step of server registration further comprises:Registration center uses key y encryption server identity marks Know SIDj, obtain cryptographic Hash RSj=h (SIDj| | y), and by { RSj, g, h () } and by safe lane deposit server, wherein g is comprehensive The parameter of collaboration system.The system that integrated system refers to the compositions such as registration center, smart card, server.
Further, user further comprises the step of registration center is registered:When registration phase starts, Yong Huxiang User Identity UID submits in registration centeriWith password PWi, and typing fingerprint;The registration center extracts digitized fingerprint Characteristic point Fi, calculate the cryptographic Hash P twice of passwordi=h (h (PWi)), identity secret valueWith Family secret value RUi=h (UIDi| | x) andThe secret value of integrated system parameterWith And the secret value of fingerprint feature pointThe smart card generates a random number b, and the registration center calculatesAnd then it calculatesX, y and z herein is the key of registration center;The registration center By encryption information { Pi,Di,Ci,Gi,Vi,Zi,Bi, h () } and it is stored in smart card, and pass through safe lane and smart card is issued into use Family.
Further, login step further comprises:The user inputs the password PW of oneself by smart cardi *, intelligence Card is by judging equation Pi=h (h (PWi *)) whether correct into Rob Roy inspection user password.Only in password by correct defeated After entering, smart card prompting user's typing fingerprint, and extract its characteristic value Fi *;The smart card is special by calculating reduction registered fingerprint Value indicativeAnd examine Fi *With FiMatching degree, if the matching degree of the two be not above setting safety Threshold value (such as 90%), then terminate login, if more than the threshold value, smart card may be considered the login that the user implements Operation.
Further, smart card generates and sends the step of first verification data and further comprises:The smart card generation Random number ruAnd bnew, and reduce user identifierIt calculatesWithReductionAnd calculate first verification data Wherein TiIt is the timestamp that smart card end represents current time, finally, auxiliary will be verified data by smart cardWith first verification data M1It is sent to server.
Further, the step of server sends first verification data and the second verification data to registration center is further wrapped It includes:After the server receives the verification data of smart card transmission, its time stamp T is verifiediValidity, if timestamp does not exist Service time scope then terminates communication, otherwise server generation random numberWherein,For the multiplication of integers group of mould q, Q is Big prime, and calculates the second verification dataWherein TjIt is that server end represents current The timestamp of time;The server all sends out first verification data and the second verification data and related auxiliary verification data To registration center, includingWith
Further, registration center examines server and user identity legitimacy to further comprise:The registration center is first First verify time stamp TiAnd TjIt is whether effective, if effectively, then the identity of authentication server identity legitimacy, then verification user Legitimacy;On the premise of server and user are legal, registration center to server send the 3rd verification data, server and User completes the two-way authentication of the two according to the 3rd verification data.
Further, registration center examines server identity legitimacy to further comprise:The registration center calculates RS'j =h (SIDj| | y) andThen equation M' is examined2=M2It is whether true, if set up, Prove the information that the message that the server is sent includes key y, also turned out the legitimacy of server, if equation not into Vertical, then registration center terminates this session.
Further, registration center examines user identity legitimacy to further comprise:The registration center calculatesWithAnd reduce User IdentityCalculate RU 'i=h (UIDi| | x) andJudge M '1With M1It is whether equal, if equal, the identity of provable user It is legal.
Further, registration center generate and send the 3rd verification data and the 4th verification data the step of further wrap It includes:The registration center calculatesWithAnd the 3rd verification dataWith the 4th verification dataAnd by { Qj,M3, M4Issue server.
Further, the bi-directional authentication steps of server and user identity further comprise:The server passes through confirmation 3rd verification data are sent out the identity of indirect verification user by registration center really, after demonstrating user identity, server to While the 4th verification data of smart card forwarding, also need to send auxiliary verification messageThe smart card passes through true Recognize the identity that the 4th verification data are sent out indirect verification server by registration center really.
Further, further included after smart card authentication server identity is legal:Update the storage content of smart card;Smart card It calculatesAnd with { Znew,BnewReplace it the preceding { Z storedi,Bi}。
Further, identical session key is calculated after smart card and server authentication
Another as the present invention is more nearly the specific embodiment of application, and registration phase completes user UiAnd service Device SjIn the registration work of registration center, communicate and carried out in safe lane.It is as follows described:
For legal server, it is necessary to submit its identity SID to registration centerj, registration center's calculating secret value RSj=h (SIDj| | y), and by { RSj, g, h () } and by safe lane deposit server, wherein g is the parameter of system.
For validated user, when registration, needs to submit User Identity UID to registration centeriWith password PWi, and typing Fingerprint, registration center extract digitized fingerprint feature point Fi.Then, registration center follows the steps below:
1. registration centers of Step calculate the cryptographic Hash P twice of passwordi=h (h (PWi)), identity secret valueThe secret value RU of useri=h (UIDi| | x) andThe encryption of systematic parameter ValueAnd the secret value of fingerprint feature point
2. smart cards of Step generate a random number b, and registration center calculatesAnd thenZ and x, y herein is the key of registration center.
3. registration centers of Step are by { Pi,Di,Ci,Gi,Vi,Zi,Bi, h () } and it is stored in smart card, and pass through safe lane Smart card is issued into user.
It logs in and Qualify Phase will complete verification, the service of smart card local verification, registration center to server and user The verification for the verification data that device and user send registration center.It is as follows:
1. users of Step want login service device, it is necessary to which smart card is inserted into card reader, then input password PWi *, intelligence Card is by judging equation Pi=h(h(PWi *)) whether into Rob Roy examine user password it is whether correct.It is only correct in password After input, smart card prompting user's typing fingerprint, and extract its characteristic value Fi *.Smart card reduces registered fingerprint feature by calculating ValueAnd examine Fi *With FiMatching degree, if the matching degree of the two be not above setting threshold value (threshold value can be set according to the requirement of security), then terminate login, if more than threshold value, is regarded as user's login. Smart card continues to generate random number ruAnd bnew, and reduce user identifierIt calculatesWithReductionAnd calculate first verification dataFinally, smart card willIt is sent to server.
2. servers of Step receive the landing request information of userAfterwards, its time will be verified Stab TiValidity, if timestamp terminates communication, otherwise continues below step not in service time scope.
3. servers of Step generate random numberFor the multiplication of integers group of mould q, q is Big prime, and is calculated Second verification dataWherein TjIt is the timestamp of server end current time.Then service The landing request information that device sends smart cardRegistration center is transmitted to, and simultaneously into registration The heart sends the verification information of server
4. registration centers of Step receiveWithAfterwards, T will be first verified thati And TjWhether effectively, it is all legal in server and user if effectively, then verifying server and whether the identity of user is legal Under the premise of, registration center will send identity authentication message to server, and server and user can complete according to this certification message Authentication.Refer to following sub-step.
Step 4-1. registration centers calculate RS'j=h (SIDj| | y) andThen examine Test equation M'2=M2It is whether true, if so, then prove the message information that include key y that server is sent, it was demonstrated that service The legitimacy of device.If equation is invalid, registration center terminates this session.
Step 4-2. registration centers calculateWithAnd reduce User IdentityCalculate RU 'i=h (UIDi| | x) andJudge M '1With M1Whether Equal, if equal, the identity of provable user is legal.If unequal, registration center notice server the user does not conform to Method.
After the identity of Step 4-3. servers and user are all by verification, registration center calculates secret valueWithAnd the 3rd verification data of authentication are completed for user and serverWith the 4th verification dataAnd by { Qj,M3, M4Issue server.
5. servers of Step receive { Qj,M3,M4After, it calculatesAnd verify M '3 Whether the M of registration center transmission is equal to3.If equal, it is really this login process registration center hair to prove the message, And sent out after the authenticated user information of registration center, that is to say, that server completes the authentication to user at this time. Server calculates the session key of this time serviceIt and willIt is sent to user.
6. users of Step receive the feedback information that server is beamed backAfterwards, identity authentication message is calculatedVerify M'4The M sent with server4It is whether equal, if equal, prove M4It is What registration center was calculated, and registration center only have first authentication server identity it is legal after can just calculate this value, so with Family also completes the authentication to server.Then, smart card calculatesAnd with { Znew,BnewReplace { the Z stored beforei,Bi}.Last smart card calculates the session key identical with serverSo far, log in It is completed with verification process.
In conclusion the present invention by encrypted smart card be locally stored data, smart cards for storage password twice cryptographic Hash, with The methods of machine number is encrypted and updates smart cards for storage, solves Chen et al. and proposes easily to be hidden present in identity identifying method The problems such as name sexual assault, eavesdropping attack, smart card are stolen attack and can not verify password correctness.Meanwhile the present invention has Local verification, password can be changed, without advantageous effects such as proof list, preceding backward securities.
The foregoing is merely presently preferred embodiments of the present invention, is not used for limiting the practical range of the present invention;If it does not take off It from the spirit and scope of the present invention, modifies or equivalently replaces the present invention, should all cover in the claims in the present invention Among protection domain.

Claims (3)

1. a kind of three factor remote identity authentication methods based on smart card, which is characterized in that the described method includes:
By legal server of the server in registration center is registered as multi-server system, registration center is encrypted using key y Server identity identifies SIDj, generation cryptographic Hash RSj=h (SIDj| | y), and by { RSj, g, h () } and it is taken by safe lane deposit Business device, wherein g are systematic parameter;
User submits application for registration to registration center, and after succeeding in registration, user obtains the smart card for having specific information, the spy Information is determined for { Pi,Di,Ci,Gi,Vi,Zi,Bi, h () }, wherein, Pi、Di、Ci、Gi、Vi、ZiAnd BiIt is encryption information, h () is Kazakhstan Uncommon function, PiPassword PW is provided by useriCryptographic Hash P twicei=h (h (PWi)), DiFor User Identity UIDiPlus Close valueCiFor the secret value of userRUi=h (UIDi| | x), GiFor system The secret value of parameter gViFor fingerprint feature point FiSecret valueZiAnd BiTo be described The encryption information of registration center's generationB be the smart card generation random number, z with X, y are the key of registration center;
User uses the smart card login service device, and the user inputs the password PW of oneself by smart cardi *, smart card sentences Disconnected equation Pi=h (h (PWi *)) whether true, if so, smart card prompts user's typing fingerprint, and extracts its characteristic value Fi *, it is no Then terminate session;
The smart card reduces registered fingerprint characteristic value by calculatingAnd examine Fi *With FiMatching journey Degree if the matching degree of the two is not above the secure threshold of setting, terminates logins, if more than the threshold value, login into Work(;
The smart card generation random number ruAnd bnew, and reduce user identifierIt calculatesWithReductionAnd calculate first verification dataWherein TiBe smart card end represent current time timestamp, SIDjFor in registration center The identity of the server of lawful registration;Smart card will aid in verifying dataAnd first verification data M1It is sent to server;
After the server receives the verification data of smart card transmission, its time stamp T is verifiediValidity, if timestamp does not exist Service time scope then terminates communication, otherwise, server generation random numberWherein,For integer mould q multiplicative groups, q For Big prime, data are verified in then server calculating secondWherein TjIt is server end table Show the timestamp of current time;First verification data and the second verification data and related auxiliary are verified data by the server Registration center all is issued, includingWith
The registration center first verifies that time stamp TiAnd TjWhether effectively, if invalid, session is terminated, otherwise carried out as follows Step, the registration center calculate RS'j=h (SIDj| | y) andThen equation M' is examined2 =M2Whether true, if set up, server has legitimacy, otherwise terminates session;The registration center calculatesWithAnd reduce User IdentityCalculate RU 'i=h (UIDi|| X) andJudge M '1With M1Whether equal, if equal, the identity of user is legal;
The registration center calculates and generatesWithAnd the 3rd verification dataWith the 4th verification dataBy { Qj,M3,M4Hair To server;
The server authentication the 3rd verifies whether data are sent out by registration center, if by verification, server turns to smart card Send out the 4th verification data and auxiliary verification messageServer end key is generated simultaneously, otherwise terminates session;Institute It states smart card authentication the 4th and verifies whether data are sent out by registration center, if by verifying, indirect verification server identity Legitimacy, while generate smart card end key, otherwise terminate session.
2. according to the method described in claim 1, it is characterized in that, user further wraps the step of registration center is registered It includes:
User submits User Identity UID to registration centeriWith password PWi, and typing fingerprint;
The registration center extracts digitized fingerprint feature point Fi, generate the cryptographic Hash P twice of passwordi=h (h (PWi)), body Part mark secret valueThe secret value of userWherein RUi=h (UIDi| | x), The secret value of systematic parameterAnd the secret value of fingerprint feature point
The smart card generates a random number b, and the registration center calculatesAnd then it generatesZ and x, y are the keys of registration center;
The registration center is by encryption information { Pi,Di,Ci,Gi,Vi,Zi,Bi, h () } and it is stored in smart card.
3. it according to the method described in claim 1, it is characterized in that, is further included after smart card authentication server identity is legal as follows Step:
Smart card calculatesAnd with { Znew,BnewReplace it the preceding { Z storedi,Bi}。
CN201510477113.5A 2015-08-06 2015-08-06 A kind of three factor remote identity authentication methods based on smart card Active CN105119721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510477113.5A CN105119721B (en) 2015-08-06 2015-08-06 A kind of three factor remote identity authentication methods based on smart card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510477113.5A CN105119721B (en) 2015-08-06 2015-08-06 A kind of three factor remote identity authentication methods based on smart card

Publications (2)

Publication Number Publication Date
CN105119721A CN105119721A (en) 2015-12-02
CN105119721B true CN105119721B (en) 2018-05-29

Family

ID=54667621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510477113.5A Active CN105119721B (en) 2015-08-06 2015-08-06 A kind of three factor remote identity authentication methods based on smart card

Country Status (1)

Country Link
CN (1) CN105119721B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294725A (en) * 2016-04-05 2017-10-24 电子科技大学 A kind of three factor authentication methods under environment of multi-server
CN106230840B (en) * 2016-08-04 2019-09-10 南京邮电大学 A kind of command identifying method of high security
CN108400962B (en) * 2017-02-08 2022-03-29 格尔软件股份有限公司 Authentication and key agreement method under multi-server architecture
CN107425964A (en) * 2017-05-09 2017-12-01 哈尔滨工业大学深圳研究生院 Three-side password authentication and key agreement protocol based on the fault-tolerant smart card of information leakage
CN109088888B (en) * 2018-10-15 2021-02-05 山东科技大学 Secure communication method and system based on smart card
CN110708337B (en) * 2019-10-30 2022-06-28 浪潮软件科技有限公司 Big data security framework system based on identity authentication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045170A (en) * 2010-12-28 2011-05-04 北京深思洛克软件技术股份有限公司 Method and system for protecting safety of password
CN103338201A (en) * 2013-07-02 2013-10-02 山东科技大学 Remote identity authentication method participated in by registration center under multi-sever environment
CN103368954A (en) * 2013-07-02 2013-10-23 山东科技大学 Smart card registration entry method based on password and biological characteristics

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045170A (en) * 2010-12-28 2011-05-04 北京深思洛克软件技术股份有限公司 Method and system for protecting safety of password
CN103338201A (en) * 2013-07-02 2013-10-02 山东科技大学 Remote identity authentication method participated in by registration center under multi-sever environment
CN103368954A (en) * 2013-07-02 2013-10-23 山东科技大学 Smart card registration entry method based on password and biological characteristics

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Towards secure and efficient user authentication scheme using smart card for multi-server environments;Te-Yu Chen等;《The Journal of Supercomputing》;20130607;全文 *
Weaknesses of a dynamic based remote user authentication protocol for multi-server environmentID;R. Madhusudhan等;《Journal of Computer and Communications》;20141231;全文 *

Also Published As

Publication number Publication date
CN105119721A (en) 2015-12-02

Similar Documents

Publication Publication Date Title
CN105119721B (en) A kind of three factor remote identity authentication methods based on smart card
Li et al. A robust biometrics based three-factor authentication scheme for global mobility networks in smart city
CN106657124B (en) Anonymous authentication and key agreement optimization authentication method and optimization authentication analysis method based on pseudonym for Internet of things
US8689306B2 (en) Method for the unique authentication of a user by service providers
CN109327313A (en) A kind of Bidirectional identity authentication method with secret protection characteristic, server
CN111818039A (en) Three-factor anonymous user authentication protocol method based on PUF in Internet of things
CN101902476B (en) Method for authenticating identity of mobile peer-to-peer user
CN103338201B (en) The remote identity authentication method that under a kind of environment of multi-server, registration center participates in
CN103905437B (en) Remote protocol authentication method based on passwords
CN105871553A (en) Identity-free three-factor remote user authentication method
Nagaraju et al. SecAuthn: Provably secure multi-factor authentication for the cloud computing systems
CN113727296B (en) Anonymous privacy protection authentication protocol method based on wireless sensor system in intelligent medical treatment
CN109347626B (en) Safety identity authentication method with anti-tracking characteristic
CN103347018A (en) Long-distance identity authentication method based on intelligent card and under multiple-service environment
CN104767624A (en) Remote protocol authentication method based on biological features
CN106789032A (en) The single password tripartite authentication method of privacy sharing between server and mobile device
CN105187405A (en) Reputation-based cloud computing identity management method
CN113360943A (en) Block chain private data protection method and device
CN112329519A (en) Safe online fingerprint matching method
CN109379176A (en) A kind of certifiede-mail protocol method of anti-password leakage
CN106059764A (en) Password and fingerprint third-party authentication method based on halting key derivation function
Kumar et al. A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication
Kim et al. Further improved remote user authentication scheme
CN110784305A (en) Single sign-on authentication method based on careless pseudorandom function and signcryption
CN116388995A (en) Lightweight smart grid authentication method based on PUF

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20151202

Assignee: Qingdao Huaheng Shengtai Electronic Technology Co.,Ltd.

Assignor: SHANDONG University OF SCIENCE AND TECHNOLOGY

Contract record no.: X2023370010006

Denomination of invention: A three-factor remote identity authentication method based on smart card

Granted publication date: 20180529

License type: Common License

Record date: 20230106