CN114338213A - Temperature-assisted authentication system and authentication method thereof - Google Patents
Temperature-assisted authentication system and authentication method thereof Download PDFInfo
- Publication number
- CN114338213A CN114338213A CN202111677328.3A CN202111677328A CN114338213A CN 114338213 A CN114338213 A CN 114338213A CN 202111677328 A CN202111677328 A CN 202111677328A CN 114338213 A CN114338213 A CN 114338213A
- Authority
- CN
- China
- Prior art keywords
- authentication
- temperature
- client
- server
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses an authentication system for temperature-assisted authentication.A controllable voltage temperature regulating module is added in the authentication system to realize secondary authentication, the voltage temperature regulating module is additionally arranged, and both sides respond to temperature change according to challenges, so that further encryption and decryption mapping is realized, and the effect of assisted authentication is finally realized by relying on the inherent authentication mechanisms of both sides. Meanwhile, the authentication method of temperature-assisted authentication is provided, compared with the authentication method that the environmental temperature is difficult to control, the temperature of the chip can be effectively adjusted through factors such as voltage and frequency. The client and the server both adopt custom chips, carry out data transmission and temperature adjustment according to the authentication requirements of both parties, and further carry out coding and decoding, so that data can be transmitted under specific conditions and can be used as a part of security authentication, and auxiliary physical encryption is realized. Therefore, the relay attack resistance of the authentication system is enhanced, and the system robustness is strong.
Description
Technical Field
The invention relates to the field of authentication protocols, in particular to an authentication auxiliary system for temperature auxiliary authentication and an authentication method thereof.
Background
The traditional challenge-response authentication system adopts an encryption algorithm such as AES (advanced encryption standard)And encrypting and decrypting to protect the secret key from being stolen and pretended, so that the server side and the client side can perform mutual security authentication. However, the system is not encrypted with assistance, and the key is easily leaked due to relay attack, so that the security of the system is greatly reduced, and documents[1]The environmental physical quantities of the two authentication parties are measured and compared by utilizing the environmental detection sensor, so that the environmental physical quantities are used as a part of the authentication system to play a role in assisting security authentication, the risk of crash of the system after the system is subjected to relay attack can be reduced, and the robustness of the system is improved. However, the auxiliary means has poor controllability and very low fluctuation, and completely depends on objective factors, so that the reliability is gradually reduced and the probability of being attacked and cracked is greatly increased in the past.
Disclosure of Invention
In view of the above-mentioned deficiencies in the prior art, the present invention provides an authentication system for temperature-assisted authentication and an authentication method thereof.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that:
an authentication method of temperature-assisted authentication comprises the following steps:
s1, the client sends out an authentication request to the authentication server to request identity authentication;
s2, the authentication server side judges whether the identity of the client side is legal, if so, a random number is generated and encrypted to serve as a challenge to be sent to the client side;
s3, the client decodes the received challenge, and combines the decoded data with the self temperature information to generate a response to be sent to the authentication server;
s4, verifying the response and judging whether the client temperature meets the condition, if so, performing temperature calibration and informing the client of a first authentication result;
and S5, carrying out random temperature regulation on the client and the server, decoding the random number in the S2, judging whether the password is valid, and if so, returning a final authentication result to the client.
Further, the random number in S2 is a 16-bit random number, where the upper four bits are the valid interval of the cipher transmission, the second upper eight bits are the temperature threshold, and the lower four bits are the S-box mapping selected by the current transmission.
Further, in S2, the generated random number is encrypted by using the first public key, and the challenge after encryption is represented as: fP_C(r _ a, ID _ a), where P _ C represents a public key of the client for encrypting the random number r _ a generated by the authenticator and the authenticator identity information ID _ a.
Further, in S3, the response is encrypted by using the second public key, and the encrypted response is represented as: gP_A(r _ A, T _ C), wherein P _ A represents the public key of the authentication end, and is used for encrypting the random number r _ A and the temperature information T _ C decrypted by the client.
Further, the S4 specifically includes:
s41, the authentication server decrypts the received response and compares the decrypted response with the calculation result of the authentication server to judge G { G }P_AWhether r _ a, T _ C) -T _ C is true or not, and if not, authentication fails; if true, proceed to step S42;
and S42, the authentication server carries out temperature calibration according to the temperature of the client and informs the client of the first authentication result.
Further, the S5 specifically includes:
s51, carrying out random temperature regulation on the client and the server;
s52, decoding the random number in S2, calculating the effective transmission time of the password and the selection of the mapping mode, and transmitting the password according to the calculation result;
and S53, the authentication server judges whether the received password is in the effective transmission time range, if so, the password is subjected to reverse mapping and verification, and the client returns the authentication result after the verification is passed.
Further, the S52 specifically includes:
recording the high four bits of the random number as a, recording the next high eight bits as b, and recording the lowest four bits as c;
when the random temperature change is in a time section of the temperature threshold range [ b, b +1] for the first time, the effective transmission time of the password is obtained;
the password from the client to the authentication end is subjected to nonlinear mapping through a plurality of sets of s-boxes before transmission, and the c-th s-box is selected as a mapping mode in the secondary authentication process.
Further, when the password is judged to be received, whether the temperature of the authentication client side is reaching the threshold value [ b, b +1] at the a-th time is judged]I.e. verifying TTransmission of=Tf[a,b]Whether or not this is true.
Also provides an authentication system of temperature auxiliary authentication, which comprises a server authentication system and a client authentication system, wherein the server authentication system and the client authentication system both comprise a voltage temperature regulating system, the voltage temperature regulating system comprises a voltage temperature regulating chip, a voltage temperature regulating module and a sensor module,
the voltage temperature adjusting chip is used for sending a voltage temperature adjusting signal according to the first authentication notification;
the voltage temperature adjusting module is connected with the voltage temperature adjusting chip and used for executing adjusting signals sent by the voltage temperature adjusting chip;
the sensor module is used for monitoring the temperature of the client authentication system or the server authentication system and feeding back the monitoring result.
The invention has the following beneficial effects:
according to the authentication system, the voltage temperature adjusting module is additionally arranged at the client side and the authentication end, so that the physical variable of temperature is controllable and is used as a part of authentication, the combination of physics and algorithm encryption is realized, the resistance of the system to relay attack can be effectively enhanced, and the authentication system is easy to use.
The temperature of the two authentication parties is changed within a certain range by regulating the temperature through voltage, and the authentication verification of the two authentication parties can be realized when the temperature meets a specific requirement, so that physical encryption is realized, and the system safety is enhanced.
Drawings
Fig. 1 is a schematic flow chart of an authentication method of temperature-assisted authentication according to the present invention.
Fig. 2 is a schematic structural diagram of an authentication system for temperature-assisted authentication according to the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
An authentication method of temperature assisted authentication, as shown in fig. 1, includes the following steps:
s1, the client sends out an authentication request to the authentication server to request identity authentication;
s2, the authentication server side judges whether the identity of the client side is legal, if so, a random number is generated and encrypted to serve as a challenge to be sent to the client side;
after receiving the authentication request, the authentication end distinguishes the identity information, generates a 16-bit random number after verification, and transmits the random number back to the client as a challenge after encryption by a public key.
S3, the client decodes the received challenge, and combines and encrypts the decoded data and the self temperature information to generate a response and sends the response to the authentication server;
the client decrypts and records the challenge using the private key as a reference requirement for subsequent cryptographic transmission. The client side combines the decrypted data and the temperature information, and encrypts the data through another set of public key to serve as a response to be sent to the authentication side.
S4, verifying the response and judging whether the client temperature meets the condition, if so, performing temperature calibration and informing the client of a first authentication result;
after receiving the response, the authentication end decrypts the response through a matched private key, checks the decoded data, verifies whether the temperature of the client is reasonable or not, and self-calibrates the client according to the temperature if the verification is passed, so that the temperatures of the client and the client are consistent, and informs the client that the first authentication is passed. And after the two parties complete the first authentication, immediately controlling the temperature adjusting module to change the temperature.
And S5, carrying out random temperature regulation on the client and the server, decoding the random number in the S2, judging whether the password is valid, and if so, returning a final authentication result to the client.
The upper four bits of the 16-bit random number are denoted as a, the next upper eight bits as b, and the lowest four bits as c. Meaning that the cipher transmission is valid for the time segment of the temperature threshold range b, b +1 the a time. The password from the client to the authentication end needs to be subjected to nonlinear mapping through s boxes before transmission, a plurality of sets of s boxes are designed for improving the security, and c determines which set of s box mapping is used in the transmission. When the authentication end receives the mapped password, whether the time for receiving the data is valid is judged, the password is subjected to inverse mapping through the inverse s-box after the data is valid, verification is carried out, the final authentication is completed, and an authentication result is returned.
In this embodiment, an implementation process of the authentication system for temperature-assisted authentication is described in detail by taking an FPGA-based interconnection security authentication prototype as an example.
As shown in fig. 2, the circuit structure of the client authentication system and the circuit structure of the authentication server authentication system in this embodiment are the same, and include a control module, an authentication module, and an intra-board interconnection module, where the control module is connected to the authentication module and the intra-board interconnection module, respectively, and the client system and the authentication server system communicate with each other through the intra-class interconnection module.
The inter-board interconnection module includes a storage module, a decryption module, an encryption module, and an inter-board communication module, where the storage module is used to store various keys and public keys and initially generated passwords, the encryption and decryption module is used to implement encryption and decryption processes during inter-board information transmission, and the inter-board communication module is used to implement the inter-board communication module.
The client authentication system and the authentication server authentication system also comprise a voltage temperature regulating system, the voltage temperature regulating system comprises a voltage temperature regulating chip, a voltage temperature regulating module and a sensor module, the voltage module and the sensor module are respectively linked with the corresponding control module and the in-board interconnection module,
the voltage temperature adjusting chip is used for sending a voltage temperature adjusting instruction according to the first authentication notification; it is composed of
The voltage temperature adjusting module is connected with the voltage temperature adjusting chip and used for executing an adjusting instruction sent by the voltage temperature adjusting chip;
the sensor module is used for monitoring the temperature of the client authentication system or the server authentication system and feeding back the monitoring result.
The specific authentication process is as follows:
1) the client sends an authentication request to the server to request identity authentication;
2) the authentication server judges whether the user is a legal user or not, and if not, no further processing is carried out;
3) the authentication server generates a random number, and sends the random number to the client as a challenge after encryption;
4) the client decrypts the challenge, combines the decrypted number with the self temperature information, encrypts to generate a new character string as a response, and transmits the data to the authentication server;
5) the authentication server compares the response string with the self-calculated result, judges whether the temperature of the client is reasonable or not, if the response meets the condition, the authentication server side calibrates the temperature according to the temperature of the client so as to realize subsequent authentication, and after the calibration is finished, the authentication server side informs the client of the first authentication result;
6) after the first authentication result is transmitted, the client and the authentication server carry out temperature change according to hardware design;
7) the client and the authentication server decode the random number to obtain the effective transmission time of the password and the selection of the mapping mode of the password, and the password is transmitted according to the effective transmission time;
8) the authentication server side judges whether the transmitted password is in a reasonable transmission time range or not, if the condition is met, the password is subjected to reverse mapping and verification;
9) and the authentication server side returns a final authentication result to the client side.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
It will be appreciated by those of ordinary skill in the art that the embodiments described herein are intended to assist the reader in understanding the principles of the invention and are to be construed as being without limitation to such specifically recited embodiments and examples. Those skilled in the art can make various other specific changes and combinations based on the teachings of the present invention without departing from the spirit of the invention, and these changes and combinations are within the scope of the invention.
Claims (9)
1. An authentication method for temperature-assisted authentication is characterized by comprising the following steps:
s1, the client sends out an authentication request to the authentication server to request identity authentication;
s2, the authentication server side judges whether the identity of the client side is legal, if so, a random number is generated and encrypted to serve as a challenge to be sent to the client side;
s3, the client decodes the received challenge, and combines and encrypts the decoded data and the self temperature information to generate a response and sends the response to the authentication server;
s4, verifying the response and judging whether the client temperature meets the condition, if so, performing temperature calibration and informing the client of a first authentication result;
and S5, carrying out random temperature regulation on the client and the server, decoding the random number in the S2, judging whether the password is valid, and if so, returning a final authentication result to the client.
2. The method of claim 1, wherein the random number in S2 is a 16-bit random number, and wherein the upper four bits are a valid interval of a cipher transmission, the second upper eight bits are a temperature threshold, and the lower four bits are an S-box mapping selected by the current transmission.
3. The method according to claim 2, wherein the generated random number is encrypted by the first public key in S2, and the encrypted challenge table is used as a challenge tableShown as follows: fP_C(r _ a, ID _ a), where P _ C represents a public key of the client for encrypting the random number r _ a generated by the authenticator and the authenticator identity information ID _ a.
4. The method according to claim 1, wherein the response is encrypted by the second public key in S3, and the encrypted response is represented as: gP_A(r _ A, T _ C), wherein P _ A represents the public key of the authentication end, and is used for encrypting the random number r _ A and the temperature information T _ C decrypted by the client.
5. The temperature-assisted authentication method according to claim 1, wherein the S4 specifically includes:
s41, the authentication server decrypts the received response and compares the decrypted response with the calculation result of the authentication server to judge G { G }P_AWhether r _ a, T _ C) -T _ C is true or not, and if not, authentication fails; if so, go to step S42;
and S42, the authentication server carries out temperature calibration according to the temperature of the client and informs the client of the first authentication result.
6. The temperature-assisted authentication method according to claim 1, wherein the S5 specifically includes:
s51, carrying out random temperature regulation on the client and the server;
s52, decoding the random number in S2, calculating the effective transmission time of the password and the selection of the mapping mode, and transmitting the password according to the calculation result;
and S53, the authentication server judges whether the received password is in the effective transmission time range, if so, the password is subjected to reverse mapping and verification, and the client returns a final authentication result after the verification is passed.
7. The temperature-assisted authentication method according to claim 6, wherein the S52 specifically comprises:
recording the high four bits of the random number as a, recording the next high eight bits as b, and recording the lowest four bits as c;
when the random temperature change is in a time section of the temperature threshold range [ b, b +1] for the first time, the effective transmission time of the password is obtained;
the password from the client to the authentication end is subjected to nonlinear mapping through a plurality of sets of s-boxes before transmission, and the c-th s-box is selected as a mapping mode in the secondary authentication process.
8. The method of claim 7, wherein the determining the password received determines whether the temperature of the authenticated client is reaching the threshold [ b, b +1] the a-th time]I.e. verifying TTransmission of=Tf[a,b]And if the authentication result is not successful, the authentication is successful and the final authentication result is returned.
9. An authentication system of temperature auxiliary authentication comprises a server authentication system and a client authentication system, and is characterized in that the server authentication system and the client authentication system both comprise a voltage temperature regulating system, the voltage temperature regulating system comprises a voltage temperature regulating chip, a voltage temperature regulating module and a sensor module,
the voltage temperature adjusting chip is used for sending a voltage temperature adjusting signal according to the first authentication notification;
the voltage temperature adjusting module is connected with the voltage temperature adjusting chip and used for executing adjusting signals sent by the voltage temperature adjusting chip;
the sensor module is used for monitoring the temperature of the client authentication system or the server authentication system and feeding back the monitoring result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111677328.3A CN114338213B (en) | 2021-12-31 | 2021-12-31 | Temperature-assisted authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111677328.3A CN114338213B (en) | 2021-12-31 | 2021-12-31 | Temperature-assisted authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114338213A true CN114338213A (en) | 2022-04-12 |
CN114338213B CN114338213B (en) | 2022-09-13 |
Family
ID=81023109
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111677328.3A Active CN114338213B (en) | 2021-12-31 | 2021-12-31 | Temperature-assisted authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114338213B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115361174A (en) * | 2022-07-26 | 2022-11-18 | 电子科技大学 | Auxiliary authentication method based on thermal imaging |
CN115378657A (en) * | 2022-07-26 | 2022-11-22 | 电子科技大学 | Authentication synchronization method based on internal temperature sensing of integrated circuit |
CN115379065A (en) * | 2022-07-26 | 2022-11-22 | 电子科技大学 | Circuit framework for realizing self-excitation heating of information hiding |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102273176A (en) * | 2009-01-14 | 2011-12-07 | 熵敏通讯股份有限公司 | System and method for retransmission and fragmentation in a communication network |
US20180232971A1 (en) * | 2017-02-10 | 2018-08-16 | Microchip Technology Incorporated | Systems And Methods For Managing Access To A Vehicle Or Other Object Using Environmental Data |
CN108572003A (en) * | 2017-03-13 | 2018-09-25 | 欧姆龙株式会社 | The authentication method of environmental sensor and its user, program |
CN109005144A (en) * | 2018-05-31 | 2018-12-14 | 杭州闪易科技有限公司 | A kind of identity identifying method, equipment, medium and system |
CN109313864A (en) * | 2016-05-31 | 2019-02-05 | 肖特股份有限公司 | Optical key protected quantum authentication and encryption |
US20190268331A1 (en) * | 2018-02-27 | 2019-08-29 | Bank Of America Corporation | Preventing Unauthorized Access to Secure Information Systems Using Multi-Factor, Hardware Based and/or Advanced Biometric Authentication |
JP2020135789A (en) * | 2019-02-26 | 2020-08-31 | 日本電気株式会社 | Authentication device, authentication method, program, information processing terminal, and authentication system |
CN112185529A (en) * | 2020-09-27 | 2021-01-05 | 姜智广 | Cold chain transportation effectiveness monitoring system and method |
US20210367753A1 (en) * | 2018-11-02 | 2021-11-25 | Shenyang Institute Of Automation, Chinese Academy Of Sciences | Trusted measurement and control network authentication method based on double cryptographic values and chaotic encryption |
CN113726763A (en) * | 2021-08-27 | 2021-11-30 | 国网电力科学研究院有限公司 | Challenge response identity authentication technology based on mobile phone number |
-
2021
- 2021-12-31 CN CN202111677328.3A patent/CN114338213B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102273176A (en) * | 2009-01-14 | 2011-12-07 | 熵敏通讯股份有限公司 | System and method for retransmission and fragmentation in a communication network |
CN109313864A (en) * | 2016-05-31 | 2019-02-05 | 肖特股份有限公司 | Optical key protected quantum authentication and encryption |
US20190109719A1 (en) * | 2016-05-31 | 2019-04-11 | Schott Ag | Optical key protected authentication and encryption |
US20180232971A1 (en) * | 2017-02-10 | 2018-08-16 | Microchip Technology Incorporated | Systems And Methods For Managing Access To A Vehicle Or Other Object Using Environmental Data |
CN110024005A (en) * | 2017-02-10 | 2019-07-16 | 密克罗奇普技术公司 | For use environment data management to the system and method for the access of vehicle or other objects |
CN108572003A (en) * | 2017-03-13 | 2018-09-25 | 欧姆龙株式会社 | The authentication method of environmental sensor and its user, program |
US20190268331A1 (en) * | 2018-02-27 | 2019-08-29 | Bank Of America Corporation | Preventing Unauthorized Access to Secure Information Systems Using Multi-Factor, Hardware Based and/or Advanced Biometric Authentication |
CN109005144A (en) * | 2018-05-31 | 2018-12-14 | 杭州闪易科技有限公司 | A kind of identity identifying method, equipment, medium and system |
US20210367753A1 (en) * | 2018-11-02 | 2021-11-25 | Shenyang Institute Of Automation, Chinese Academy Of Sciences | Trusted measurement and control network authentication method based on double cryptographic values and chaotic encryption |
JP2020135789A (en) * | 2019-02-26 | 2020-08-31 | 日本電気株式会社 | Authentication device, authentication method, program, information processing terminal, and authentication system |
CN112185529A (en) * | 2020-09-27 | 2021-01-05 | 姜智广 | Cold chain transportation effectiveness monitoring system and method |
CN113726763A (en) * | 2021-08-27 | 2021-11-30 | 国网电力科学研究院有限公司 | Challenge response identity authentication technology based on mobile phone number |
Non-Patent Citations (4)
Title |
---|
YINAN XU: "Combating Enhanced Thermal Covert Channel in Multi-/Many-Core Systems With Channel-Aware Jamming", 《IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS》 * |
YUN-KYUNG LEE: "User authentication mechanism using authentication server in home network", 《2006 8TH INTERNATIONAL CONFERENCE ADVANCED COMMUNICATION TECHNOLOGY》 * |
潘宇: "终端设备安全防护模块设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
王小妮等: "基于挑战/应答方式的身份认证系统的研究", 《北京机械工业学院学报》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115361174A (en) * | 2022-07-26 | 2022-11-18 | 电子科技大学 | Auxiliary authentication method based on thermal imaging |
CN115378657A (en) * | 2022-07-26 | 2022-11-22 | 电子科技大学 | Authentication synchronization method based on internal temperature sensing of integrated circuit |
CN115379065A (en) * | 2022-07-26 | 2022-11-22 | 电子科技大学 | Circuit framework for realizing self-excitation heating of information hiding |
CN115379065B (en) * | 2022-07-26 | 2023-07-28 | 电子科技大学 | Circuit architecture for realizing self-excitation heating of information hiding |
CN115378657B (en) * | 2022-07-26 | 2024-02-20 | 电子科技大学 | Authentication synchronization method based on integrated circuit internal temperature sensing |
CN115361174B (en) * | 2022-07-26 | 2024-02-23 | 电子科技大学 | Auxiliary authentication method based on thermal imaging |
Also Published As
Publication number | Publication date |
---|---|
CN114338213B (en) | 2022-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114338213B (en) | Temperature-assisted authentication method | |
CN109040067B (en) | Physical unclonable technology PUF-based user authentication device and authentication method | |
EP2456121B1 (en) | Challenge response based enrollment of physical unclonable functions | |
US8516268B2 (en) | Secure field-programmable gate array (FPGA) architecture | |
JP5451785B2 (en) | System and method for providing contactless authentication | |
WO2015192670A1 (en) | User identity authentication method, terminal and service terminal | |
JP5845393B2 (en) | Cryptographic communication apparatus and cryptographic communication system | |
EP1359491A1 (en) | Methods for remotely changing a communications password | |
EP3435592B1 (en) | Fingerprint data processing method and processing apparatus | |
EP3398289B1 (en) | A method, system and apparatus using forward-secure cryptography for passcode verification | |
CN108471352A (en) | Processing method, system, computer equipment based on distributed private key and storage medium | |
CN105187382A (en) | Multi-factor identity authentication method for preventing library collision attacks | |
Juang et al. | Efficient password authenticated key agreement using bilinear pairings | |
CN108551391B (en) | Authentication method based on USB-key | |
JP2021111925A (en) | Electronic signature system | |
EP3185504A1 (en) | Security management system for securing a communication between a remote server and an electronic device | |
JP2008124987A (en) | Cipher communication apparatus and cipher communication system and cipher communication method and program | |
JP6203556B2 (en) | Information processing system | |
Seo et al. | Fuzzy vector signature and its application to privacy-preserving authentication | |
KR101938736B1 (en) | Device for processing biological data and methods thereof | |
CN114900288A (en) | Industrial environment authentication method based on edge service | |
CN118647018A (en) | Ship-shore identity recognition method and system based on domestic password | |
JP2015014839A (en) | Information processing system | |
WO2018043498A1 (en) | Ic card for one-time authentication | |
CN116707818A (en) | Online rapid identity authentication system and method based on trusted computing module |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |