Cryptographic authentication and identification method using real-time encryption
An encryption key and encryption key technology, which is applied in the direction of cryptographic processing, usage of multiple keys/algorithms, encryption device with shift register/memory, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0075] The common digital ordering is: 1234567890. Its layout looks like Figure 3a as shown. according to Figure 3b , the sorted digital layout of the PIN code input is 6278015943. Now, for the sequenced entry of the PIN code '7510', the customer presses the key sequence '3765'.
example 2
[0077] Here is also an example of the mode of operation used to demonstrate the method of sorting the PIN codes. The sequenced number layout for PIN code entry is: 0768352419, eg Figure 3c as shown. Now, for a sequenced entry of PIN code '415597', the customer presses '896602'.
[0078] The random digit request rules change with each PIN code entry or other numerical data entry (eg credit card number) rather than per digit.
[0079] The personalization method used to ensure the authenticity of the user and sender of the system proceeds as follows:
[0080] i. Immediately after opening the APP, request the confidential key decryption key St from the central server in order to obtain the customer's own encryption key Sc;
[0081] ii. Then the data processing central server generates a new, arbitrary digital layout, such as '9243605718', such as Figure 3d and encrypt it with the public customer key Pc according to ENC(Pc)(CustData, '9243605718') and send it now to the custo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 