Mobile phone off-line authentication method
An offline authentication and mobile phone technology, applied in wireless communication, electrical components, transmission systems, etc., can solve the problems of reducing the operating efficiency of CA certification centers, high construction costs of CA certification centers, and increasing equipment investment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0113] The following describes the implementation steps of identity authentication and file encryption transmission between users in an offline environment with the accompanying drawings:
[0114] figure 1 : Explain the process of identity authentication between user A1 and user A2 in an offline environment. Suppose: User A1 is the first user in the "Circle of Friends" of user A2. First, the encryption system of user A1's mobile phone is in user A1. In the mobile phone SD card chip, a set of random numbers S is generated, and the digest algorithm is used to summarize the mobile phone card number B1 and random number S of user A1 to generate "summary" information, namely: verification code L1, which is composed of matrix G and matrix G The elements of the "key seed" three-dimensional matrix T1 are mapped, the elements mapped to the matrix T1 are taken out and the signature key LK1 is synthesized, and the verification code L1 is encrypted with the signature key LK1 to obtain the ci...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com