Novel authentication mechanism for encrypting vector
A vector and key technology, applied in the field of new vector encryption authentication mechanism, can solve problems such as difficulty in resisting third-party attacks, separation of encryption and authentication, and low implementation efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0159] Embodiment 1. Mixed software and hardware embodiment
[0160] figure 2 with image 3 It is a preferred hardware and software hybrid embodiment of the present invention, figure 2 The key generation / regenerator of the company uses a digital chip or a smart card to form a hardware system, image 3 The software program is used to realize the formation of an encryption authentication software system, and the hardware system and the software system realize information interaction through the USB interface or the sensing interface. Each digital chip or smart card has a globally unique hardware serial number-space code, which determines the range of vector key space that the hardware can generate and regenerate. In practical applications, the serial number must be used by an authoritative third party The identity information of the user is bound to the serial number and publicized, so that other users can verify their identity and directly communicate with them.
[0161] figure...
Example Embodiment
[0169] Embodiment 2. Identity-based Trusted Computing Module PTM
[0170] Such as Figure 4 Shown is the trusted computing platform core module-PTM encryption authentication module implemented by hardware using the method and system of the present invention. In this implementation method, the key generation / regenerator and encryption authentication algorithm of the present invention are made in On the same digital chip, it is connected to a terminal such as a computer through a parallel interface to form a trusted terminal. Figure 4 In the local space code unit, the key generation / regeneration unit, the random number generator unit and the tamper detection electrical damage unit are constituted as figure 2 As shown in the key generation / regeneration part of the present invention, the local space code is a globally unique production serial number assigned by each PTM module, which determines the encryption key space range used by each PTM module, and the local space code It can be ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap