Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentic authentication system based on CPK

An authentication system and credible technology, applied in the field of software label verification technology, can solve problems such as complex design and unresolved key technologies

Active Publication Date: 2008-10-22
BEIJING E HENXEN AUTHENTICATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The design of TCP's Trusted Platform Module (TPM) is very complicated because it does not solve the key technology of "identity authentication", but it wants to solve the generation of identification, the generation of key pairs, and the output of services to system layer software Service (IPSec) and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentic authentication system based on CPK
  • Authentic authentication system based on CPK

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0052] According to the characteristics of CPK algorithm, the software certification and verification system can set different scopes, such as general scope or special scope. Generic scope works in the general scope and private scope works in that private scope. How it works is defined by the respective security policy. Different security policies are only related to the signature machine, not to the verifier, and the verifier is not limited by scope.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A creditable authentication system of CPK is comprised of a program label defined by the enterprise, a label signature module and a label validation module. The label signature module is comprised of a CPK function module, a digital signature protocol packet and a multiple(private key) matrix(rij), and the label validation module is comprised of a CPK function module, a signature validation protocol packet and a time(public key) matrix(Rij). Each computer only needs to be configured with one validation module with respect to the computer user; therefore, the generalization of the label validation module can realize the label foundation of software product and the generalization of validation technique, and can enable the software label validation technique based on the CPK to have a more extensive application.

Description

technical field [0001] The invention relates to signature technology, verification technology, and trusted computing, and in particular to a verification technology of a CPK-based software label. Background technique [0002] The computing environment can be a stand-alone computer or a network of multiple computers. But in the latter case, the simple problem is further complicated by mixing technical topics from two different fields. The Trusted Computing Platform (TCP) currently researched internationally has chosen the latter technical route. [0003] To solve the trusted computing problem, it is necessary to solve the two major issues of key management scale and label-based key distribution, but so far, the key issue of "label authentication" in the software world has not been solved internationally. In authentication systems, verification techniques are more important than proof techniques. Some systems can provide proof of label, but fail to provide the means of veri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/24G06F21/31
CPCG06F21/31
Inventor 南相浩屈延文
Owner BEIJING E HENXEN AUTHENTICATION TECH