Random number used communication safety identification method

A technology of communication security and authentication method, which is applied in the field of communication security authentication using random numbers, and can solve problems such as loss of security in information transmission and cracking of encryption algorithms

Inactive Publication Date: 2004-12-22
ZHEJIANG MIAXIS TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the key used in the encryption and decryption process usually does not change for a period of time, when criminals use eavesdropping to intercept the transmitted information, the encryption algorithm may be cracked, resulting in the loss of security for information transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random number used communication safety identification method
  • Random number used communication safety identification method
  • Random number used communication safety identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0033] figure 1 It is an authentication system 10, which includes a front-end device 12 and a back-end device 14, and information can be exchanged between the two through a wired or wireless connection. In practice, front-end and back-end devices can be any pair of devices capable of communicating information. For example, ATMs and bank account systems, two network terminals, electronic keys and access control.

[0034] In the security authentication method of the present invention, a random number table is generated by the management institution. Here, for the above-mentioned paired devices, the management agencies may be banks, network providers, or enterprise management departments. In some cases, the governing body can also be either of the two paired devices. The management agency assigns the generated random number table and the identi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a communication security authentication method having the same random number tables between the front and the rear equiopments, wherein the random number table comprises N random number groups, and each group has three random numbers, including the following steps: Synchronize the current pointer of the random number tables at the front and rear ends, and the current pointer is equal to the larger one at the front and rear ends in the next authentication; Transmit the first random number of the m-th random number group at the front end to the rear end; Compare the first random number of the corresponding number group at the rear end wire the first random number at the front end; if they are equal, update the pointer number of the rear end to m+1 in the next authentication.

Description

(1) Technical field [0001] The invention relates to a communication security authentication method, in particular to a communication security authentication method using random numbers. (2) Background technology [0002] With the development of modern technology, security certification has penetrated into various fields. For example, commercial activities such as e-commerce and automatic deposit and withdrawal, enterprise management such as security access control and management authority, all of which require security authentication. Currently, the most commonly used authentication method is encryption authentication. In this authentication process, both the encryption and decryption parties have a secret key, the so-called encryption algorithm. The information sender encrypts the information with an encryption key according to the encryption algorithm, and then sends the encrypted information to the receiver. The receiver uses the decryption key to decrypt the received ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 黄旭涛沈王磊
Owner ZHEJIANG MIAXIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products