期刊文献+

基于智能IC卡的SHA-1使用者交易模型

Exchange Model of SHA-1 User Based on Smart Card
下载PDF
导出
摘要 提出一个对使用者的身份做认证的方法 ,这个方法是基于智能 IC卡作媒介 ,当使用者登入系统时 ,将个人的智能 IC卡插入终端机 ,再根据指示键入个人身份识别码及口令 ,此时智能 IC卡针对使用者识别码及口令 ,利用电子签章做适当运算 ,再传回给系统做验算 ,以使模型易于使用又不失安全性。 This paper suggests a method of the user′s ID authentication, which is based on the smart card as its medium. When the cardholder registers in the system, first insert the smart card into the terminal, and then follow the instructions to key in ID and password. At the same time according to the user′s ID and password, the smart card uses its digital signature to dosome caculations, and then transfer the data back to the system for checking. In this way the model is usable and secure as well.
作者 郑晔 陈添丁
出处 《现代电子技术》 2003年第20期57-59,共3页 Modern Electronics Technique
关键词 智能IC卡 认证 口令 模型 smart card authentication password model
  • 相关文献

参考文献5

  • 1Hwang M S. A New Remote User-Authentication Scheme Using Smart Cards.
  • 2Lamport L. Password authentication with insecure communication [J]. Communications of ACM, 24 (1981): 770-772.
  • 3Chang C C, Wu T C. A password authentication scheme without verification tables [J]. Proceedings of the Eighth ISATED International Symposium APPLIEDINFORMATICS, February, 1990,Innsbruck, Austria: 312-328.
  • 4Chang C C, Hwang S J. Using smart cards to authentication remote passwords[J] .Computer Mathematics with Applications.1993, 26 (7): 19-27.
  • 5Wu T C. Remote login authentication scheme based on a geometric approach, Computer Communications, 1995:18 (12), 959-963.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部