CPK credibility authorization system
An authentication system and credible technology, applied in the field of information security, to eliminate the possibility, eliminate collusion attacks, and eliminate the possibility of
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.
[0045]CPK is short for Combined Public Key. The CPK key management system is a discrete logarithm-hard problem-based identification (identity) key generation and management system. It constructs the public key and private key matrix based on the mathematical principle of the discrete logarithm problem, uses the hash function and the cryptographic transformation to map the identity of the entity into a sequence of row coordinates and column coordinates of the matrix, and selects and combines the elements of the matrix. Generate a large number of public and private key pairs composed of public keys and private keys, so as to realize ultra-large-scale key production and distribution based on identification.
[0046] The CPK key algorithm uses discrete logarithm and elliptic curve cryptography to construct public and private key pairs, and ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com