Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Private key identity authentication taking equation as tool

A private key and identity verification technology, which is applied in user identity/authority verification, countermeasures against encryption mechanisms, digital transmission systems, etc., can solve problems such as self-stealing and self-theft

Inactive Publication Date: 2017-11-17
刘旭 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, since the verifier keeps the username and password at the same time, there is also a risk of self-stealing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key identity authentication taking equation as tool
  • Private key identity authentication taking equation as tool
  • Private key identity authentication taking equation as tool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] 1 Introduction

[0009] In daily life, identity verification is not uncommon. For example, the identity of the other party can be confirmed by checking the other party's certificate or scanning the other party's fingerprint. Although this common identity verification method also belongs to identity verification in a broad sense, the high-end identity verification technology that this article focuses on is more used in communications, friend-or-foe identification, artificial intelligence, secondary nuclear strikes, high-performance computing, and theater missiles. Defense, access control to computer systems and non-computer systems, access control mechanisms, etc.

[0010] The PRISM program that has been exposed in recent years has gradually made identity verification technology a research hotspot. Under the threat of password attacks, governments of various countries and multinational technology companies are forced to develop more advanced authentication technologies,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In order to prevent criminals from destroying the new international political and economic order after World War II by using network and system attack technologies such as monitoring and injection attacks, to keep state secrets, to safeguard national security and interests, and to ensure the smooth progress of reform, opening up, and socialist construction, the present invention Trying to improve the existing means of identity verification, by constructing various forms of equations and equations such as differential equation well-posed problems, a class of identity verification methods based on private keys using equations as tools is proposed, which effectively reduces the need for password cracking techniques. and the risk of leaking secrets caused by the verification party's self-stealing and stealing of the verified party's information. Its name is private key authentication using equations as a tool. It belongs to the technical field of identity verification. The application field of the present invention includes not only communication, artificial intelligence, The second nuclear strike also includes access control to computer systems and non-computer systems, access control mechanisms, and identification of friend and foe.

Description

technical field [0001] The technical field belongs to authentication. Background technique [0002] Identity verification is based on cryptographic theory, combined with other means to identify the user's identity, it is a prerequisite for the realization of a complete system. Only with an efficient and reliable identity verification method can information security be guaranteed. One of the functions of designing this mode is to identify the real identity of users in the network and prevent criminals from maliciously forging their identities to carry out information theft and illegal activities. The more common identity verification is the authentication mode of user name and password, that is, identity comparison is performed by entering the user name and password, which is also the authentication method adopted by most systems. With the improvement of the security requirements of the system, various authentication methods such as gesture authentication, fingerprint authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00
CPCH04L9/3226H04L9/002
Inventor 不公告发明人
Owner 刘旭
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products