User authentication methods with enhanced integrity and security
A user authentication and user technology, which is applied in the field of user authentication with enhanced integrity and security, which can solve the problems of inconvenient management, inconvenience of users being unable to arbitrarily replace OTP devices, and many inconveniences.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0098] In the case of the first embodiment of the present invention, the method of generating the first common authentication key is the same, and the personal password input by the user can be added as a constituent element required for generating the second common authentication key.
[0099] That is, the personal password and the mechanical unique key of the user terminal 100 are combined, and the first transformation using the one-way function 110 is performed to generate the second mutual authentication key S112.
[0100] The one-way function 110 may use the same function as the one-way function for generating the first common authentication key, and can be applied in the same manner.
[0101] The second mutual authentication key can be generated in the same manner as the first mutual authentication key, and by using the personal password and the mechanical inherent key of the user terminal 100 as constituent elements, it can be The calculation key generated by the reference is ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com