Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key devices for supporting anonymous authentication, generation method and unlocking method thereof

An anonymous authentication and key technology, applied in the field of information security, can solve problems such as endangering user privacy and security, heavy burden on small and medium-sized enterprises, affecting user services, etc., achieving great application value, lowering application thresholds, and protecting information security.

Active Publication Date: 2011-01-26
北京联合智华微电子科技有限公司
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, self-construction and management of certification centers is a heavy burden for small and medium-sized enterprises, and it is even more unattainable for individual users. However, using services provided by third parties requires a series of complicated rules and corresponding costs. It is difficult for many small and medium-sized enterprises and individual users to afford
[0005] 3. Although many countries have established commercial certification centers and provide services to enterprises and the public, it is difficult for these centers to provide mutual certification, which causes a lot of inconvenience to enterprises and individual users who purchase services
In addition, since the authentication center holds all the user's private keys (for the purpose of key recovery) and the user's personal registration information, once there is a problem with the center, it will directly affect the service to the user, and even endanger the user's privacy and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key devices for supporting anonymous authentication, generation method and unlocking method thereof
  • Secret key devices for supporting anonymous authentication, generation method and unlocking method thereof
  • Secret key devices for supporting anonymous authentication, generation method and unlocking method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Combined Public Key Algorithm (Combined Pubic Key, CPK) is an identity-based public key algorithm, and its key management center generates corresponding private key calculation parameters (private key calculation base) and public key calculation parameters (public key calculation base); According to the identification provided by the first user, use the private key calculation parameters to calculate the private key of the first user, and provide the generated private key to the first user; and publish the public key calculation parameters so that the second user After the identification of the first user is obtained, the public key of the first user may be calculated by using the public key calculation parameters according to the identification of the first user.

[0030] On the basis of proposing the CPK algorithm, a CPK chip is also provided. The CPK chip has a CPK algorithm functional unit and a verification protocol unit, which are specifically implemented in the ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides identification authentication-based technology, and relates to secret key devices for supporting anonymous authentication. Identification secret keys generated by anonymous identifiers are stored in the secret key devices. The generation method of the secret key devices for supporting the anonymous authentication comprises the following steps of: defining and generating at least one anonymous identifier; defining a seed secret key pair, wherein the seed secret key pair consists of a seed public key and a seed private key; allowing the anonymous identifiers to generate identification private keys corresponding to the anonymous identifiers respectively through the seed private key; and writing the generated identification private keys into each secret key device. The invention also provides a back-up unlocking method of the dual secret key devices. The devices and the method can support requirements of social and publics on anonymous safety service, and reduce theapplication threshold of the authentication technology greatly.

Description

technical field [0001] The invention relates to identification-based authentication technology, in particular to a key device based on a combined public key system and supporting anonymous authentication, a generation method and an unlocking method thereof, and belongs to the technical field of information security. Background technique [0002] At present, network and information technology have penetrated into all aspects of people's production and life. How to protect the authenticity, security, and responsibility (non-repudiation) of information has become a common concern of the government and society. In order to meet the requirements of social development, technology manufacturers have developed authentication systems, such as public key infrastructure (PKI) based on public key digital certificates and authentication systems based on combined public key (CPK) technology identification, as well as authentication systems based on the above systems A series of applicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 赵建国陈谦
Owner 北京联合智华微电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products