Unlock instant, AI-driven research and patent intelligence for your innovation.

Random encryption and identity authentication

An identity authentication and random encryption technology, applied in the usage of multiple keys/algorithms, etc., can solve the problems of illegal removal of the authenticator's device, loss of anti-theft function, high risk of theft, etc., to improve security, reliability and safety. The effect of improving sexuality and difficulty

Inactive Publication Date: 2006-03-15
HUNAN HONGDA TECH
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, in the identity authentication between the electronic authenticator and the electronic authenticated party, information transmission generally adopts a random rolling encryption method, which is commonly referred to as a rolling code encryption method , the encryption algorithm of this encryption method is fixed, although it cannot be cracked by a simple scanning method, due to the improvement of the operation speed, it is still possible to use a high-speed scanning method to output a large number of signals to attack the authenticator device, which is still easy to cause the authenticator The device is illegally disarmed and loses the anti-theft function
Therefore, the car anti-theft system that adopts this technical solution still has a high risk of being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random encryption and identity authentication
  • Random encryption and identity authentication
  • Random encryption and identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Embodiment 1: Direct random password encryption and decryption system.

[0052]The random code generated by the authenticator uses the algorithm to directly operate the working method of identity authentication. This method can use a characteristic code or not. Feature codes for enhanced security. This method uses a large number of two-party consensus algorithms to convert the generated random code itself with the predetermined algorithm and then send it out or send it out directly. The other party restores the received data or encrypts the received data with another algorithm or directly uses another Encrypt with an algorithm or encrypt the data again with the same algorithm or send it back, the authenticator judges whether the data sent back is correct: directly compare the received data with the random code generated above, or restore the data with the inverse algorithm Compare the sent data, or compare the data after calculating the data like a key with the receive...

Embodiment 2

[0054] Embodiment 2: Single random encryption and decryption system

[0055] After the authenticated party sends its own characteristic code, the authenticating party receives the characteristic code sent by the authenticated party, searches for the corresponding record, confirms, extracts the corresponding information, and generates a random code or a pseudo-random code at the same time, using the initialization or last negotiation The fixed or non-fixed algorithm X encrypts a random code or pseudo-random code and its own internal code, or encrypts its own random internal code corresponding to the corresponding record, and sends the calculated value together with its own characteristic code, and the authenticated party accepts After receiving the information sent by the authenticator, decrypt the information according to the record, and obtain the data after removing the internal code of the authenticator or the corresponding random internal code, random code or pseudo-random ...

Embodiment 3

[0075] Embodiment 3: Multi-random encryption and decryption system

[0076] After the authenticated party sends out its own characteristic code, the authenticating party sends out its own characteristic code after receiving the characteristic code sent by the authenticated party, and the authenticated party searches and checks the records after receiving the characteristic code sent by the authenticating party, and generates a random code or Pseudo-random code, encrypted with a fixed or non-fixed algorithm that was initialized or last negotiated: random code or pseudo-random code, and its own internal code or its own random internal code corresponding to the corresponding record, and the calculated value and its own characteristic code After receiving the information sent by the authenticated party, the authenticating party searches for the corresponding record according to the characteristic code and extracts the information, decrypts the encrypted information sent by the auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Authenticator side and peer side make authentication each other. Authenticator makes authentication for signal by using encrypting algorithm, and sends signal to peer side to decode. After decoding, the peer side encrypts the signal again, and sends it to authenticator to decode and check. The encrypting algorithm adopts random encrypting algorithm or pseudo random algorithm.

Description

【Technical field】 [0001] The invention relates to an encryption method and an identity authentication method. 【Background technique】 [0002] At present, in the identity authentication between the electronic authenticator and the electronic authenticated party, information transmission generally adopts a random rolling encryption method, which is commonly referred to as a rolling code encryption method. The encryption algorithm of this encryption method is fixed, although it cannot be used. A simple scanning method is used to crack it, but due to the increase in computing speed, it is still possible to use a high-speed scanning method to output a large number of signals to attack the authenticator device, and it is still easy to cause the authenticator device to be illegally released and lose the anti-theft function. Therefore, the automobile anti-theft system that adopts this technical solution still has a high risk of being stolen. 【Content of invention】 [0003] The pu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14
Inventor 徐文祥
Owner HUNAN HONGDA TECH