Personal authentication method

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Other Related Categories

380 49, 380 30, H04L 900

Type

Patent

Status

active

Patent number

057906670

Description

ABSTRACT:
A user i calculates authentication application information involving a random-number parameter and transmits it to a sales company A. At the sales company A, the received authentication application information is one-way transformed using a random-number parameter and is transmitted to the user i as authentication challenged information. At the user i, an identification number for credit membership of the user and a password are inputted and the received authentication challenge information is transformed using the password to create authentication response information. Then the identification number of the user i and the authentication response information are transmitted to the sales company A. At the sales company A, the received authentication response information is one-way transformed so that the random-number parameter is cancelled so as to produce authentication reference information. Then the received identification number and the authentication reference information are transmitted to the credit company b. At the credit company b, transformed secret information which is stored in advance is retrieved using the received identification number as a key and it is determined whether the transformed secret information and the authentication reference information are equal. If they are equal, the credit company b transmits to the sales company A authentication information indicating correctness of the user i, and if they are not equal, it transmits authentication information indicating that the user i can not be authenticated as a correct user. At the sales company A, the authentication information transmitted from the credit company b is transmitted to the user i.

REFERENCES:
Ikeno et al., "Discrete Logarithm Problem", Current Cryptography Theory (Genzai Ango Riron): Information Communication Society, 1986, p. 203.
Ikeno et al., Current Cryptography Theory (Genzai Ango Riron): Information Communication Society, 1986, p. 204.
Ikeno et al., "Fermat's Theorem", Current Cryptography Theory (Genzai Ango Riron): Information Communication Soceity, 1986, p. 242.
Ikeno et al., Current Cryptography Theory (Genzai Ango Riron): Information Communication Society, 1986, pp. 17-18.
Okamoto, "One-way Hash Function", Introduction to Theory of Cryptography (Ango Riron Nyumon): Kyoritsu Shuppan, 1993, p. 138.
International Standard ISO/IEC 9788-4: 1995, Information technology--Security techniques--Entity authentication--Part 4: Mechanisms using a cryptographic check function.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Personal authentication method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Personal authentication method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Personal authentication method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1186923

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.