Authentic authentication system based on CPK
An authentication system and credible technology, applied in the field of software label verification technology, can solve problems such as complex design and unresolved key technologies
Active Publication Date: 2008-10-22
BEIJING E HENXEN AUTHENTICATION TECH
View PDF3 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
The design of TCP's Trusted Platform Module (TPM) is very complicated because it does not solve the key technology of "identity authentication", but it wants to solve the generation of identification, the generation of key pairs, and the output of services to system layer software Service (IPSec) and other issues
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment approach
[0052] According to the characteristics of CPK algorithm, the software certification and verification system can set different scopes, such as general scope or special scope. Generic scope works in the general scope and private scope works in that private scope. How it works is defined by the respective security policy. Different security policies are only related to the signature machine, not to the verifier, and the verifier is not limited by scope.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
A creditable authentication system of CPK is comprised of a program label defined by the enterprise, a label signature module and a label validation module. The label signature module is comprised of a CPK function module, a digital signature protocol packet and a multiple(private key) matrix(rij), and the label validation module is comprised of a CPK function module, a signature validation protocol packet and a time(public key) matrix(Rij). Each computer only needs to be configured with one validation module with respect to the computer user; therefore, the generalization of the label validation module can realize the label foundation of software product and the generalization of validation technique, and can enable the software label validation technique based on the CPK to have a more extensive application.
Description
technical field [0001] The invention relates to signature technology, verification technology, and trusted computing, and in particular to a verification technology of a CPK-based software label. Background technique [0002] The computing environment can be a stand-alone computer or a network of multiple computers. But in the latter case, the simple problem is further complicated by mixing technical topics from two different fields. The Trusted Computing Platform (TCP) currently researched internationally has chosen the latter technical route. [0003] To solve the trusted computing problem, it is necessary to solve the two major issues of key management scale and label-based key distribution, but so far, the key issue of "label authentication" in the software world has not been solved internationally. In authentication systems, verification techniques are more important than proof techniques. Some systems can provide proof of label, but fail to provide the means of veri...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/24G06F21/31
CPCG06F21/31
Inventor 南相浩屈延文
Owner BEIJING E HENXEN AUTHENTICATION TECH
