A multi-user authentication method and system
An authentication method and authentication system technology, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as security risks, share and authentication key leakage, and achieve the effect of improving security and avoiding share leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.
[0047] figure 1 A multi-user authentication method provided by Embodiment 1 of the present invention is applied to multiple network terminals. In this embodiment, the architecture of the multi-user authentication system is as follows figure 2 As shown, the system includes four entities: a network terminal group (including M keyers), a storage group (including N storages), a key management center, and authentication and verification nodes, and there is a network connection between each entity.
[0048] Such as figure 2 As shown, each entity is equipped with a unified symmetric encryption algorithm and Hash algorithm, and the symmetric encryption algorithm and Hash algorithm are used to encrypt or reverse the key. ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com