Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for key exchange based on authentication information

一种密钥交换、认证信息的技术,应用在网络上的安全领域,能够解决难更换、多实时计算量、难迁移参数等问题,达到负担最小化的效果

Active Publication Date: 2016-11-16
SAMSUNG SDS CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In particular, in the case of PAKE (relevant standards: IEEEEP1363.2 and ISO / IEC 11770-4) of the non-public key certificate, it is constructed by directly exponentiating the password and storing the verifier (verifier) , so that it will be difficult to migrate the existing system (migration) and update the parameters (parameter)
In addition, in the case of this method, the password needs to be directly combined with the group parameter (group parameter), so there is a problem that a relatively large amount of real-time calculation is required to respond to offline analysis, and it is difficult to change the message flow flexibly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for key exchange based on authentication information
  • System and method for key exchange based on authentication information
  • System and method for key exchange based on authentication information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] Hereinafter, specific embodiments of the present invention will be described with reference to the drawings. However, this is just an example, and the present invention is not limited thereto.

[0064] In the process of describing the embodiments of the present invention, if it is considered that the specific description of the known technology related to the present invention may cause unnecessary confusion to the gist of the present invention, its detailed description will be omitted. In addition, the terms described later are all defined in consideration of the functions in the present invention, and may vary depending on the user's or operator's intention or custom. Therefore, it needs to be defined based on the contents throughout the specification.

[0065] The technical idea of ​​the present invention is determined by the scope of the claims, and the following examples are only a means to effectively explain the technical idea of ​​the present invention to those...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a system and method for key exchange based on user authentication information. The system for key exchange based on user authentication information includes a terminal configured to generate ciphertext corresponding to authentication information of a user of the terminal using a random number for the client and server identification information, and a server configured to decrypt the ciphertext received from the terminal using a private key for the server corresponding to the server identification information to restore the authentication information, authenticate the terminal using the restored authentication information, and generate a session key for the server corresponding to the authenticated terminal.

Description

technical field [0001] The invention relates to a security technology on the network. Background technique [0002] The key exchange protocol based on authentication information (PAKE: Password Authenticated KeyExchange) refers to a process in which two or more subjects participating in communication share a key for encrypted communication based on a password known to one or more subjects. PAKE can be divided into PAKE based on public key certificates and PAKE based on non-public key certificates according to its implementation. [0003] In the case of PAKE based on public key certificates, it is always necessary to perform the step of authenticating the public key in order to exchange keys. In particular, in the case of PAKE (relevant standards: IEEEEP1363.2 and ISO / IEC 11770-4) of the non-public key certificate, it is constructed by directly exponentiating the password and storing the verifier (verifier) , so that it will be difficult to perform the migration (migration)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0643H04L9/0866H04L9/0869H04L9/0838H04L9/0844H04L9/3226H04L9/3239H04L63/0428H04L63/061H04L63/0823
Inventor 崔珪映赵志勋尹爻珍
Owner SAMSUNG SDS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products