英文摘要 |
In this paper, we propose a visual authentication scheme that can be implemented in the mobile systems with the user identity authentication requests. In order to make clear the contributions we did in this paper, following our proposed scheme, an example with a law enforcement case presented to persuade the implementations feasible in wireless carry-on mobile device systems. In our scheme, basically, the shares are separately stored at two sides of user-end and data base of the system side. As long as the two right shared held at the two sides are stacked, the key-important secret is immediately gained. We also give the time stamp and random seed parameters when stacking the shares to succeed the authentication requests for a legitimate user. Compared to the past researches, the cost reduction, more flexible management, secret hierarchy, and easy access control in members and passwords are further offered in this paper study. Besides, the smart card is a key-bridge to make the system operation available whenever the identity authentication is requested, where pre-information is read from the smart card first, the system is then launched the next steps in our scheme. |