A mobile phone offline authentication method
An offline authentication and mobile phone technology, applied in wireless communication, transmission systems, electrical components, etc., can solve the problems of high construction cost, slow operation speed, and vulnerability to hacker attacks of CA authentication center
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0113] The following describes the implementation steps of identity authentication and encrypted file transmission between users in an offline environment with reference to the accompanying drawings:
[0114] figure 1 : Indicates the process of identity authentication between user A1 and user A2 in an offline environment. Suppose: user A1 is the first user in user A2's "friend circle". In the SD card chip of the mobile phone, a set of random numbers S is generated, and the digest algorithm is called to digest the mobile phone card number B1 and the random number S of user A1 to generate "summary" information, namely: verification code L1, matrix G composed of L1, and matrix G The elements of the "key seed" three-dimensional matrix T1 are mapped, the elements mapped to the matrix T1 are taken out and the signature key LK1 is synthesized, and the verification code L1 is encrypted with the signature key LK1 to obtain the ciphertext of the verification code L1 ——Signature code L...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com