Anti-quantum computing access control method and system based on disposable asymmetric key pair and movable identity recognition device
An asymmetric key, quantum computing technology, applied in the field of anti-quantum computing access control, can solve the problems of inability to resist quantum computing, disadvantageous identification, ID information leakage, etc., to improve system security, reduce costs, and reduce storage costs. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0040] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0041] This application discloses an anti-quantum computing access control method based on a one-time asymmetric key pair and a movable identification device. The anti-quantum computing access control method includes:
[0042] As the access control terminal of the movable identification device, the first true random number is generated, and the first sub-message is generated, and the first sub-message includes the first true random number and the access control terminal information; The first sub-message signature is calculated to obtain a first signature, and a first key ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap