CPK credibility authorization system

An authentication system and credible technology, applied in the field of information security, to eliminate the possibility, eliminate collusion attacks, and eliminate the possibility of

Inactive Publication Date: 2006-09-13
BEIJING E HENXEN AUTHENTICATION TECH
View PDF0 Cites 68 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the security of the private key cannot be effectiv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CPK credibility authorization system
  • CPK credibility authorization system
  • CPK credibility authorization system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

[0045]CPK is short for Combined Public Key. The CPK key management system is a discrete logarithm-hard problem-based identification (identity) key generation and management system. It constructs the public key and private key matrix based on the mathematical principle of the discrete logarithm problem, uses the hash function and the cryptographic transformation to map the identity of the entity into a sequence of row coordinates and column coordinates of the matrix, and selects and combines the elements of the matrix. Generate a large number of public and private key pairs composed of public keys and private keys, so as to realize ultra-large-scale key production and distribution based on identification.

[0046] The CPK key algorithm uses discrete logarithm and elliptic curve cryptography to construct public and private key pairs, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a CPK trustable certification system with a chip including special COS, CPK algorithm, ID certificates, signature protocol, a cryptographic key exchange protocol, a ciphering algorithm and HASH function and divided into intelligent card, USB Key, Flash card and cell phone SIM card. One chip can bear the functions of a cipher machine, signature verification, cryptographic key storage and management.

Description

technical field [0001] The invention relates to information security technology, and in particular designs a CPK credible authentication system under the computer and network environment. Background technique [0002] With the development of the Internet, the requirements for computer and network security are getting higher and higher, and corresponding encryption algorithms and technologies are also developing vigorously. The current encryption technology can be divided into two categories, namely symmetric key technology and asymmetric key technology. Among them, the asymmetric key technology has been widely used because it can avoid the need of transmitting the decryption key, that is, the private key through the network. [0003] The most well-known technology of the asymmetric key to those skilled in the art is PKI (Public Key Infrastructure). The operation of PKI relies on two major components: a hierarchical CA organization (CertificationAuthority) and a huge certif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/32H04L9/3234
Inventor 南相浩关志
Owner BEIJING E HENXEN AUTHENTICATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products