TWI428002B - Key exchange systems and methods for remote mutual identification - Google Patents

Key exchange systems and methods for remote mutual identification Download PDF

Info

Publication number
TWI428002B
TWI428002B TW99121216A TW99121216A TWI428002B TW I428002 B TWI428002 B TW I428002B TW 99121216 A TW99121216 A TW 99121216A TW 99121216 A TW99121216 A TW 99121216A TW I428002 B TWI428002 B TW I428002B
Authority
TW
Taiwan
Prior art keywords
public key
user device
system center
key
public
Prior art date
Application number
TW99121216A
Other languages
Chinese (zh)
Other versions
TW201201558A (en
Original Assignee
Univ Vanung
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Vanung filed Critical Univ Vanung
Priority to TW99121216A priority Critical patent/TWI428002B/en
Publication of TW201201558A publication Critical patent/TW201201558A/en
Application granted granted Critical
Publication of TWI428002B publication Critical patent/TWI428002B/en

Links

Description

用於遠端相互辨識之密鑰交換系統及方法Key exchange system and method for remote mutual identification

本發明是有關於一種密鑰交換系統及方法,特別是指一種用於遠端相互辨識之密鑰交換系統及方法。The present invention relates to a key exchange system and method, and more particularly to a key exchange system and method for remote mutual identification.

在現今網路技術蓬勃發展的網路時代,無論是企業組織(內部單位)、供應鏈集團間,亦或是網路個別用戶,皆需要與遠端之資訊設備(如伺服器)作聯絡,而其第一道關卡即為遠端之辨識問題。In today's Internet age where Internet technology is booming, both enterprise organizations (internal units), supply chain groups, and individual network users need to communicate with remote information devices (such as servers). The first level is the remote identification problem.

考量(無線)網路詐欺、釣魚(Phishing)等事件層出不窮,為讓(無線)網路之使用者彼此能確認通訊雙方之身分,以利其爾後之互動,故相關人士已提出許多解決方法。例如,以中華民國公告專利第I288554號「網路交易用一次性密碼產生及應用方法,及執行該方法之系統」為例,其方法之精神在於系統產生亂數功能,經運算產生某交易代碼,確實具有諸多優點。然而,若系統亂數之產生規則被推理出,或是系統管理者萬一抵擋不住人性弱點之誘惑,竟將系統參數外流,則此系統之安全性可能有不同之觀點。因此,有必要尋求解決之道。Considering (wireless) Internet scams, Phishing and other events emerge one after another, in order to allow users of (wireless) networks to confirm the identity of both parties to each other, in order to facilitate the interaction, so the relevant people have proposed many solutions. For example, in the case of the Republic of China Announcement Patent No. I288554 "One-time password generation and application method for online transactions, and a system for executing the method", the spirit of the method is that the system generates a random number function, and a transaction code is generated through operation. It does have many advantages. However, if the rule of the system random number is inferred, or if the system administrator can resist the temptation of human weakness, and the system parameters are outflowed, the security of the system may have different views. Therefore, it is necessary to seek a solution.

因此,本發明之目的,即在提供一種用於遠端相互辨識之密碼交換方法。Accordingly, it is an object of the present invention to provide a method of password exchange for remote mutual identification.

於是,本發明用於遠端相互辨識之密碼交換方法,包含下列步驟:(A)一系統中心公開一組公開金鑰;(B)一使用 者裝置以從其一秘密金鑰以及該系統中心所公開之該組公開金鑰所計算出之一使用者公開金鑰,向該系統中心註冊;以及(C)該使用者裝置藉由將一臨時識別號以及兩對數位簽章對傳送至該系統中心,以進行登入程序。Thus, the method for remotely recognizing a password exchange method of the present invention comprises the following steps: (A) a system center discloses a set of public keys; (B) a use The device registers with the system center with a user public key calculated from a secret key thereof and the set of public keys disclosed by the system center; and (C) the user device by The temporary identification number and the two-digit signature pair are transmitted to the system center for the login process.

本發明之另一目的,即在提供一種用於遠端相互辨識之密碼交換系統。Another object of the present invention is to provide a cryptographic exchange system for remote mutual identification.

於是,本發明用於遠端相互辨識之密碼交換系統,包含一系統中心及一使用者裝置。該系統中心用以公開一組公開金鑰。該使用者裝置利用從其一秘密金鑰以及該系統中心所公開之該組公開金鑰所計算出之一使用者公開金鑰,向該系統中心註冊,及用以藉由將一臨時識別號以及兩對數位簽章對傳送至該系統中心,以進行登入程序。Thus, the present invention is used for remotely mutual identification of a password exchange system comprising a system center and a user device. The system center is used to expose a set of public keys. The user device registers with the system center using a user public key calculated from a secret key thereof and the set of public keys disclosed by the system center, and by using a temporary identification number And two pairs of signatures are sent to the system center for the login process.

本發明之功效在於,由於使用者裝置將臨時識別號與藉兩對數位簽章對一起傳送至系統中心以進行登入程序,因而提高本發明用於遠端相互辨識之密碼交換系統及方法技術之複雜度以及安全防護效果。The invention has the effect that the user device transmits the temporary identification number and the two pairs of signature pairs to the system center to perform the login procedure, thereby improving the password exchange system and method technology for remote mutual identification of the present invention. Complexity and security protection.

有關本發明之前述及其他技術內容、特點與功效,在以下配合參考圖式之一個較佳實施例的詳細說明中,將可清楚的呈現。The above and other technical contents, features and advantages of the present invention will be apparent from the following detailed description of the preferred embodiments.

在本發明被詳細描述之前,要注意的是,在以下的說明內容中,類似的元件是以相同的編號來表示。Before the present invention is described in detail, it is noted that in the following description, similar elements are denoted by the same reference numerals.

參閱圖1,本發明用於遠端相互辨識之密碼交換系統1之較佳實施例包含一系統中心11,以及一透過網路2與該 系統中心連接之使用者裝置12。Referring to FIG. 1, a preferred embodiment of the remote code exchange system 1 for remote mutual identification includes a system center 11, and a network 2 The user device 12 connected to the system center.

除系統中心11需事先建置系統中心參數以外,本發明之技術大致可分為註冊、登入及驗證等階段。該等系統中心參數主要包含一組公開金鑰以及一組系統中心秘密金鑰。該組公開金鑰包括一第一公開金鑰P、一第二公開金鑰n及一第三公開金鑰g,其中該第一公開金鑰P約為1024位元,P=4P1 P2 +1,P1 及P2 均為質數。該第二公開金鑰n=P1 P2 ,且該第三公開金鑰g為模P其序為n之原根。而上述P1 及P2 即為該組系統中心秘密金鑰。In addition to the system center 11 having to establish system center parameters in advance, the technology of the present invention can be roughly divided into registration, login, and verification stages. These system center parameters mainly contain a set of public keys and a set of system center secret keys. The group public key includes a first public key P, a second public key n and a third public key g, wherein the first public key P is about 1024 bits, P=4P 1 P 2 +1, P 1 and P 2 are all prime numbers. The second public key n=P 1 P 2 , and the third public key g is the original root of the modulo P whose order is n. The above P 1 and P 2 are the system center secret keys of the group.

該使用者裝置12利用從其秘密金鑰x以及該系統中心11所公開之該組公開金鑰P、n及g所計算出之一使用者公開金鑰y,向該系統中心11註冊,及用以藉由將一臨時識別號m以及兩對數位簽章對(a,w1 )、(a,w2 )傳送至該系統中心11,以進行登入程序。其中,該臨時識別號m指某使用者裝置12意圖遠端登入該系統中心11之簽章文件或時戳(Time Stamp)。The user device 12 registers with the system center 11 using a user public key y calculated from the secret key x and the set of public keys P, n, and g disclosed by the system center 11, and The login procedure is performed by transmitting a temporary identification number m and two pairs of signature pairs (a, w 1 ), (a, w 2 ) to the system center 11. The temporary identification number m refers to a signature file or a time stamp that the user device 12 intends to remotely log in to the system center 11 .

以下將同時參閱圖1、2說明本發明用於遠端相互辨識之密碼交換方法之較佳實施例之步驟細節。首先,如圖2步驟31所示,系統中心產生該組公開金鑰P、n、g,以及該組系統中心秘密金鑰P1 、P2 ,並將該組公開金鑰P、n、g公開。The details of the steps of the preferred embodiment of the method for remotely identifying the password exchange method of the present invention will be described below with reference to Figs. First, as shown in step 31 of FIG. 2, the system center generates the set of public keys P, n, g, and the set of system center secret keys P 1 , P 2 , and the set of public keys P, n, g public.

接著,如步驟32所示,使用者裝置12以公式計算使用者公開金鑰y,其中x為使用者裝置12之秘密金鑰。其中,x為質數,1≦x≦n-1,且x之位元 長度介於760~800位元之間。Next, as shown in step 32, the user device 12 takes the formula The user public key y is calculated, where x is the secret key of the user device 12. Where x is a prime number, 1≦x≦n-1, and the bit length of x is between 760 and 800 bits.

然後,如步驟33所示,使用者裝置12將其使用者公開金鑰y透過安全管道傳送至系統中心11,故系統中心11可接受使用者裝置12之註冊。於是,使用者裝置12之公開金鑰y可由系統中心11安排,統一置放於網路2上其他使用者可以瀏覽之場所。Then, as shown in step 33, the user device 12 transmits its user public key y to the system center 11 through the secure conduit, so the system center 11 can accept the registration of the user device 12. Thus, the public key y of the user device 12 can be arranged by the system center 11 and uniformly placed on the network 2 where other users can browse.

接著,如步驟34所示,使用者裝置12以如下公式(1)-(5),根據使用者裝置12之臨時識別號m及一隨機亂數a與另一隨機亂數t1 ,計算兩對數位簽章對(a,w1)、(a,w2):m≡axT1 +t1 w1 (mod n) (1)Next, as shown in step 34, the user device 12 calculates two according to the following formulas (1)-(5) according to the temporary identification number m of the user device 12 and a random random number a and another random random number t 1 . Pair of digital signature pairs (a, w1), (a, w2): m≡axT 1 + t 1 w 1 (mod n) (1)

axm≡(ax)2 T2 +axt1 w2 (mod n) (2)Axm≡(ax) 2 T 2 +axt 1 w 2 (mod n) (2)

α≡gax (mod p) (4)≡g ax (mod p) (4)

繼而,如步驟35所示,該使用者裝置12將臨時識別號m及數位簽章對(a,w1 )、(a,w2 )傳送至系統中心11,以進行登入程序。Then, as shown in step 35, the user device 12 transmits the temporary identification number m and the digital signature pair (a, w 1 ), (a, w 2 ) to the system center 11 to perform the login procedure.

然後,如步驟36所示,系統中心11以如下公式(6)-(7),驗證該臨時識別號m及兩對數位簽章對(a,w1)、(a,w2)是否確實為該使用者裝置12所發出: Then, as shown in step 36, the system center 11 verifies whether the temporary identification number m and the two-digit signature pair (a, w1), (a, w2) are indeed the same by the following formulas (6)-(7). The user device 12 issues:

上述步驟36中,若上述公式(6)-(7)確實成立,則系統中心11接受使用者裝置12之登入請求,否則退回,不予理 會。In the above step 36, if the above formulas (6)-(7) are true, the system center 11 accepts the login request of the user device 12, otherwise it is returned, and is ignored. meeting.

此外,由於系統中心11知道n之因數分解秘密,即系統中心11了解參數P1 及P2 ,故系統中心11可根據式(7)中的a2 解出a之值。於是,在該次遠端認證時,系統中心11及使用者裝置12通信雙方可根據a值而進行溝通,藉以避免使用者裝置12因常使用固定秘密金鑰x,而有容易被駭客所破解之可能。In addition, since the system center 11 knows the factor of n to decompose the secret, that is, the system center 11 knows the parameters P 1 and P 2 , the system center 11 can solve the value of a according to a 2 in the equation (7). Therefore, during the remote authentication, both the system center 11 and the user device 12 can communicate according to the value of a, so as to avoid the user device 12 from using the fixed secret key x, which is easy to be used by the hacker. The possibility of cracking.

綜上所述,在本發明用於遠端相互辨識之密鑰交換系統及方法中,由於使用者裝置利用公式計算使用者公開金鑰y,並將臨時識別號m與藉由隨機亂數a及相關演算法公式所計算出的兩對數位簽章對(a,w1 )、(a,w2 )一起傳送至系統中心11以進行登入程序,因而提高系統之複雜度以及安全防護效果,故確實能達成本發明之目的。In summary, in the key exchange system and method for remote mutual identification of the present invention, since the user device uses the formula Calculating the user public key y, and combining the temporary identification number m with the two pairs of signature pairs (a, w 1 ), (a, w 2 ) calculated by the random random number a and the associated algorithm formula It is transmitted to the system center 11 to perform the login process, thereby improving the complexity of the system and the security protection effect, so that the object of the present invention can be achieved.

惟以上所述者,僅為本發明之較佳實施例而已,當不能以此限定本發明實施之範圍,即大凡依本發明申請專利範圍及發明說明內容所作之簡單的等效變化與修飾,皆仍屬本發明專利涵蓋之範圍內。The above is only the preferred embodiment of the present invention, and the scope of the invention is not limited thereto, that is, the simple equivalent changes and modifications made by the scope of the invention and the description of the invention are All remain within the scope of the invention patent.

1‧‧‧用於遠端相互辨識之密碼交換系統1‧‧‧Crystal exchange system for remote mutual identification

11‧‧‧系統中心11‧‧‧System Center

12‧‧‧使用者裝置12‧‧‧User device

2‧‧‧網路2‧‧‧Network

31~36‧‧‧步驟31~36‧‧‧Steps

圖1是一系統架構圖,說明本發明遠端相互辨識之密鑰交換系統之較佳實施例;以及圖2是一流程圖,說明本發明遠端相互辨識之密鑰交換方法之較佳實施例。1 is a system architecture diagram illustrating a preferred embodiment of a remote mutual identification key exchange system of the present invention; and FIG. 2 is a flow chart illustrating a preferred implementation of the remote mutual identification key exchange method of the present invention. example.

31~36‧‧‧步驟31~36‧‧‧Steps

Claims (10)

一種用於遠端相互辨識之密碼交換方法,包含下列步驟:(A)一系統中心公開一組公開金鑰;(B)一使用者裝置以從其一秘密金鑰以及該系統中心所公開之該組公開金鑰所計算出之一使用者公開金鑰,向該系統中心註冊;以及(C)該使用者裝置藉由將一臨時識別號以及兩對數位簽章對傳送至該系統中心,以進行登入程序。 A method for password exchange for remote mutual identification, comprising the steps of: (A) a system center discloses a set of public keys; (B) a user device to be disclosed from a secret key thereof and the system center The set of public key calculated by the set of public keys is registered with the system center; and (C) the user device transmits a temporary identification number and two pairs of signature pairs to the system center, To log in. 根據申請專利範圍第1項所述之用於遠端相互辨識之密碼交換方法,其中在該(A)步驟中,該組公開金鑰包括一第一公開金鑰P、一第二公開金鑰n及一第三公開金鑰g,其中該第一公開金鑰P約為1024位元,P=4P1 P2 +1,P1 及P2 均為質數,該第二公開金鑰n=P1 P2 ,且該第三公開金鑰g為模P其序為n之原根。A method for remotely recognizing a password exchange according to claim 1, wherein in the step (A), the set of public keys includes a first public key P and a second public key. And a third public key g, wherein the first public key P is about 1024 bits, P=4P 1 P 2 +1, P 1 and P 2 are all prime numbers, and the second public key n= P 1 P 2 , and the third public key g is the original root of the modulo P whose order is n. 根據申請專利範圍第2項所述之用於遠端相互辨識之密碼交換方法,其中在該(B)步驟中,該使用者裝置係以如下公式,根據其秘密金鑰x以及該系統中心所公開之該組公開金鑰g、P,計算該使用者公開金鑰y: 其中,該使用者裝置之秘密金鑰x為質數,1≦x≦n-1,且x之位元長度介於760~800位元之間。According to claim 2, the method for password exchange for remote mutual identification, wherein in the step (B), the user device is based on the following formula, according to its secret key x and the system center The group public key g, P is disclosed, and the user public key y is calculated: The secret key x of the user device is a prime number, 1≦x≦n-1, and the bit length of x is between 760 and 800 bits. 根據申請專利範圍第3項所述之用於遠端相互辨識之密碼交換方法,其中在該(C)步驟中,該使用者裝置係以如 下公式,根據該使用者裝置之臨時識別號m以及一隨機亂數a與另一隨機亂數t1 ,計算該兩對數位簽章對(a,w1 )、(a,w2 ):m≡axT1 +t1 w1 (mod n);及axm≡(ax)2 T2 +axt1 w2 (mod n),其中, α≡gax (mod p);及 The method for exchanging passwords for remote mutual identification according to claim 3, wherein in the step (C), the user device is based on the following formula, according to the temporary identification number m of the user device and Calculating the two pairs of signature pairs (a, w 1 ), (a, w 2 ): m≡axT 1 + t 1 w 1 (mod n); a random random number a and another random random number t 1 ; And axm≡(ax) 2 T 2 +axt 1 w 2 (mod n), wherein ≡g ax (mod p); and 根據申請專利範圍第4項所述之用於遠端相互辨識之密碼交換方法,在該(C)步驟之後,還包含該系統中心利用如下公式,驗證該臨時識別號m以及該兩對數位簽章對(a,w1 )、(a,w2 )是否確實為該使用者裝置所發出:;及 According to the password exchange method for remote mutual identification described in item 4 of the patent application scope, after the step (C), the system center is further included to verify the temporary identification number m and the two pairs of digits by using the following formula: Whether the pair (a, w 1 ), (a, w 2 ) is indeed issued by the user device: ;and 一種用於遠端相互辨識之密碼交換系統,包含:一系統中心,用以公開一組公開金鑰;一使用者裝置,利用從其一秘密金鑰以及該系統中心所公開之該組公開金鑰所計算出之一使用者公開金鑰,向該系統中心註冊,及用以藉由將一臨時識別號以及兩對數位簽章對傳送至該系統中心,以進行登入程序。 A password exchange system for remote mutual identification, comprising: a system center for disclosing a set of public keys; a user device utilizing a set of public funds disclosed from a secret key thereof and the system center The key calculates a user public key, registers with the system center, and performs a login procedure by transmitting a temporary identification number and a two-digit signature pair to the system center. 根據申請專利範圍第6項所述之用於遠端相互辨識之密碼交換系統,其中該組公開金鑰包括一第一公開金鑰P、一第二公開金鑰n及一第三公開金鑰g,其中該第一 公開金鑰P約為1024位元,P=4P1 P2 +1,P1 及P2 均為質數,該第二公開金鑰n=P1 P2 ,且該第三公開金鑰g為模P其序為n之原根。A remote key exchange system for remote mutual identification according to claim 6, wherein the set of public keys includes a first public key P, a second public key n, and a third public key. g, wherein the first public key P is about 1024 bits, P=4P 1 P 2 +1, P 1 and P 2 are all prime numbers, and the second public key n=P 1 P 2 , and the first The three public key g is the original root of the modulo P whose order is n. 根據申請專利範圍第7項所述之用於遠端相互辨識之密碼交換系統,其中該使用者裝置係以如下公式,根據其秘密金鑰x以及該系統中心所公開之該組公開金鑰g、P,計算該使用者公開金鑰y: 其中,該使用者裝置之秘密金鑰x為質數,1≦x≦n-1,且x之位元長度介於760~800位元之間。A remote code exchange system for remote mutual identification according to claim 7, wherein the user device is based on the secret key x and the set of public keys g disclosed by the system center according to the following formula , P, calculate the user public key y: The secret key x of the user device is a prime number, 1≦x≦n-1, and the bit length of x is between 760 and 800 bits. 根據申請專利範圍第8項所述之用於遠端相互辨識之密碼交換系統,其中該使用者裝置係以如下公式,根據該使用者裝置之臨時識別號m以及一隨機亂數a與另一隨機亂數t1 ,計算該兩對數位簽章對(a,w1 )、(a,w2 ):m≡axT1 +t1 w1 (mod n);及axm≡(ax)2 T2 +axt1 w2 (mod n),其中, α≡gax (mod p);及 The password exchange system for remote mutual identification according to item 8 of the patent application scope, wherein the user device is based on the following formula, according to the temporary identification number m of the user device and a random random number a and another The random number t 1 is calculated, and the two pairs of signature pairs (a, w 1 ), (a, w 2 ) are calculated: m≡axT 1 + t 1 w 1 (mod n); and axm≡(ax) 2 T 2 +axt 1 w 2 (mod n), where ≡g ax (mod p); and 根據申請專利範圍第9項所述之用於遠端相互辨識之密碼交換系統,其中該系統中心利用如下公式,驗證該臨時識別號m以及該兩對數位簽章對(a,w1 )、(a,w2 )是否確實為該使用者裝置所發出:;及 The password exchange system for remote mutual identification according to claim 9 of the patent application scope, wherein the system center verifies the temporary identification number m and the pair of two digit signatures (a, w 1 ) by using the following formula, Whether (a, w 2 ) is actually issued for the user device: ;and
TW99121216A 2010-06-29 2010-06-29 Key exchange systems and methods for remote mutual identification TWI428002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW99121216A TWI428002B (en) 2010-06-29 2010-06-29 Key exchange systems and methods for remote mutual identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW99121216A TWI428002B (en) 2010-06-29 2010-06-29 Key exchange systems and methods for remote mutual identification

Publications (2)

Publication Number Publication Date
TW201201558A TW201201558A (en) 2012-01-01
TWI428002B true TWI428002B (en) 2014-02-21

Family

ID=46755850

Family Applications (1)

Application Number Title Priority Date Filing Date
TW99121216A TWI428002B (en) 2010-06-29 2010-06-29 Key exchange systems and methods for remote mutual identification

Country Status (1)

Country Link
TW (1) TWI428002B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104396184B (en) * 2012-04-12 2017-12-01 丁津泰 Xinmi City's code system based on wrong pairing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US743252A (en) * 1903-11-03 Cleveland Trust Co Apparatus for operating water-tight power doors or hatches.
TW200402224A (en) * 2002-07-03 2004-02-01 Aurora Wireless Technologies Ltd Biometric private key infrastructure
TW200737889A (en) * 2005-11-30 2007-10-01 Univ Chang Gung Asymmetric cryptography with discretionary private key
TW201008210A (en) * 2008-08-12 2010-02-16 Ind Tech Res Inst Weight authentication and secret retrieval

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US743252A (en) * 1903-11-03 Cleveland Trust Co Apparatus for operating water-tight power doors or hatches.
TW200402224A (en) * 2002-07-03 2004-02-01 Aurora Wireless Technologies Ltd Biometric private key infrastructure
TW200737889A (en) * 2005-11-30 2007-10-01 Univ Chang Gung Asymmetric cryptography with discretionary private key
TW201008210A (en) * 2008-08-12 2010-02-16 Ind Tech Res Inst Weight authentication and secret retrieval

Also Published As

Publication number Publication date
TW201201558A (en) 2012-01-01

Similar Documents

Publication Publication Date Title
JP7175269B2 (en) Internet-of-Things Device Record Verification Method and Apparatus, and ID Authentication Method and Apparatus
CN109862041B (en) Digital identity authentication method, equipment, device, system and storage medium
US20210367753A1 (en) Trusted measurement and control network authentication method based on double cryptographic values and chaotic encryption
AU2015308608B2 (en) Methods for secure cryptogram generation
US10819516B2 (en) System and method for generating and depositing keys for multi-point authentication
CN102075522B (en) Secure certification and transaction method with combination of digital certificate and one-time password
CN109687965B (en) Real-name authentication method for protecting user identity information in network
CN104506534A (en) Safety communication secret key negotiation interaction scheme
CA2551113A1 (en) Authentication system for networked computer applications
US11652629B2 (en) Generating keys using controlled corruption in computer networks
TWI522841B (en) Anonymity authentication method in multi-server environments
WO2008031301A1 (en) A method for the point to point online identity authenticaiton
CN109040060B (en) Terminal matching method and system and computer equipment
CN101420298B (en) Method and system for negotiating cipher
CN109716725B (en) Data security system, method of operating the same, and computer-readable storage medium
CN104202163A (en) Password system based on mobile terminal
TWI556618B (en) Network Group Authentication System and Method
CN110866754A (en) Pure software DPVA (distributed data authentication and privacy infrastructure) identity authentication method based on dynamic password
JPWO2019077581A5 (en)
JP2003152716A (en) Qualification authentication method employing variable authentication information
TWI428002B (en) Key exchange systems and methods for remote mutual identification
JP3746919B2 (en) Qualification authentication method using variable authentication information
Wei et al. On the security and improvement of privacy‐preserving 3‐factor authentication scheme for TMIS
WO2023151427A1 (en) Quantum key transmission method, device and system
Barman et al. Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees