Inter-authentication method and device
An authentication device and mutual authentication technology, which is applied in the fields of authentication systems, servers, clients, and programs, can solve problems such as unpredictable OID, inability to guarantee OID security, and inability for a third party to determine the sender and receiver, etc., to achieve security And the effect of simple mutual authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0107] An example of an embodiment of the present invention will be described in detail below with reference to the drawings. figure 2 It is a block diagram showing a schematic configuration of a client computer and a server computer according to Embodiment 1 of the present invention, and a schematic configuration of a network system to which the present invention is applicable. This embodiment applies the present invention in the case of mutual authentication between a server computer and a client computer in a network.
[0108] exist figure 2 Among them, the network system is configured as follows: one or more client computers 10 including at least a CPU, one or more server computers 40 including at least a CPU and a network (such as the Internet) 32 via a modem, a router, a TA (terminal adapter), etc. connect. These computers are capable of communicating information with each other via the network 32 .
[0109] Additionally, if figure 2 As shown, each of the client c...
Embodiment 2
[0193] Figure 5 It is a schematic configuration diagram showing Embodiment 2 of the authentication system of the present invention. This authentication system is roughly constituted by a server (second device) 10 and a client (first device) 20 connected to each other via a network 40 such as a public network or the Internet. In this embodiment, a plurality of servers A, B, C... that provide various services are connected to a server 10, and this server 10 functions as an authentication server that determines whether or not access to the servers A, B, C... is possible.
[0194] server 10 as Image 6 As shown, it is composed of a CPU 11 , a RAM 12 , a storage device 13 , an input device 14 , a display device 15 , a communication device 16 , etc., and each part is connected by a bus 17 .
[0195] The CPU (Central Processing Unit) 11 stores various processing programs stored in the storage area of the storage device 13, various instructions input from the input device 14 or t...
Embodiment 3
[0235] In the above-mentioned second embodiment, the function value of the hash function using the encryption key (variable common key) generated in the previous session as a parameter is obtained, and the function value is used as the one-time ID of the current session ( SIGNAL), but in Embodiment 3, the function value of the hash function using the common key generated in the previous session and the communication sequence in the session as parameters is obtained, and the function value is used as the hash function of the current session. One-time ID for each communication. The present embodiment 3 is the same as the embodiment 2 except for the characteristic parts. In this third embodiment, the same parts as those in the second embodiment are assigned the same symbols, and descriptions thereof are omitted.
[0236] Figure 9 It is a figure explaining Example 3 of the authentication method of this invention. In Embodiment 3, first, at step P1, the client 20 generates SIGN...
PUM
![No PUM](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/noPUMSmall.5c5f49c7.png)
Abstract
Description
Claims
Application Information
![application no application](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/application.06fe782c.png)
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com