Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certifying method and system

An authentication method and key technology, which is applied in the field of authentication systems, can solve problems such as reducing security, and achieve the effect of ensuring security and reducing hardware costs

Active Publication Date: 2007-11-21
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF0 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the key stored in the USB-KEY device is the same as the key stored on the server, once the key on the server is leaked, others can use the key to pretend to be a real user for network operations, greatly reducing security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certifying method and system
  • Certifying method and system
  • Certifying method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solution and advantages of the present invention clearer, the following examples are given to further describe the present invention in detail.

[0046] In the embodiment of the present invention, for the key p0, a general transformation function y=F(x) is used to transform p0 to obtain p1=F(x), and then a single-phase hash function y=H(x) is used Transforming p1 yields p2=H(p1).

[0047] Among them, the general transformation function y=F(x) only needs to ensure that there is one and only one y corresponding to one x, such as y=x, y=x 3 Wait.

[0048] The characteristic of the one-way hash function y=H(x) is that y can be obtained through x, but x cannot be restored through y. For example, currently general message digest algorithm (MD5), secure hash algorithm (SHA1), etc. For a single-phase hash function, the situation in which two different xs generate the same y is called "collision". Since the probability of collision in p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method comprises: server initiates a challenger to the client side; the client side uses the hash function to transform its own first key to get a second key and challenger, and uses the second key to encrypt the first key and the cipher text, and sends the cipher text to the server; the server uses its own second key to decrypt the cipher text to get the first key and c challenger, and uses the hash function to transform the first key and second key, and compares the decryption challenger with the sending challenger, and compares the challenger obtained through transformation with its own challenger to decide if they are the same. The invention also reveals an authentication system comprising server and client side.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an authentication method and an authentication system for identity authentication of a client. Background technique [0002] With the development of Internet technology, people can use the Internet to engage in various operations, many of which require user authentication. For example, when a user uses a bank website on the Internet to operate a bank account, the bank website needs to authenticate the user requesting the operation, so as to ensure the security of the online operation. [0003] In order to solve the identity authentication problem on the Internet, some client devices in the form of USB keys (USB-KEY) have appeared. This USB-KEY device is connected to the computer through the USB interface, and interacts with the server through the Internet, thereby completing the authentication process of the user's identity. [0004] According to whether the key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3271H04L9/14H04L9/0822
Inventor 卢山
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products