Humancrypt- Based User Authentication Protocol for Mobile Communication

碩士 === 亞洲大學 === 資訊工程學系碩士班 === 98 === With the rapid development of the information technology, people’s demand for the mobile services increases dramatically. Here goes along with the opportunity and interest. For this reason, amounts of mobile service providers and scholars start to research on thi...

Full description

Bibliographic Details
Main Authors: Chin-Hwei Chung, 鍾慶輝
Other Authors: Kuan-Chieh Liao
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/77947457183330257340
Description
Summary:碩士 === 亞洲大學 === 資訊工程學系碩士班 === 98 === With the rapid development of the information technology, people’s demand for the mobile services increases dramatically. Here goes along with the opportunity and interest. For this reason, amounts of mobile service providers and scholars start to research on this topic in order to provide a more complete and secure user platform. Because of the progress of technology, users utilize the mobile service to surf on the internet instead of merely voice transmission. However, there might be risk to transmit the radio wave in open environments, so the issues about information security and privacy protection have received much concern. However, the results of the mobile network authentication protocols nowadays are just a simple message response, Yes or No. Thus, instead of taking part in the authentication procedures, users only receive the hardware’s judgment passively. This is inspired by the concept of the Humancrypt proposed by Japanese scholars, Imai. It says that the applications of cryptographic techniques must take account of the relation between human and computer; otherwise it is difficult to promote security applications for human use. In the final analysis “Technology is connecting to people”. Therefore, this thesis attempts to introduce the concept of the Humancrypt into the mobile network authentication technology, and it allows users can directly interpret the related information of the service base station with QR code. In this way, users are actually participated in the verification process. It greatly increases users’ confidence in the man-machine interactions. In addition, the rest storage of QR code in our method can be used further and well. We can transmit the identified results combined with any kinds of marketing information about the mobile service, service range and related preferences. It not only enriches the application of the whole mobile service but also increases the opportunity and interest.