Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1996-01-22
1998-08-04
Tarcza, Thomas H.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 49, 380 30, H04L 900
Patent
active
057906670
ABSTRACT:
A user i calculates authentication application information involving a random-number parameter and transmits it to a sales company A. At the sales company A, the received authentication application information is one-way transformed using a random-number parameter and is transmitted to the user i as authentication challenged information. At the user i, an identification number for credit membership of the user and a password are inputted and the received authentication challenge information is transformed using the password to create authentication response information. Then the identification number of the user i and the authentication response information are transmitted to the sales company A. At the sales company A, the received authentication response information is one-way transformed so that the random-number parameter is cancelled so as to produce authentication reference information. Then the received identification number and the authentication reference information are transmitted to the credit company b. At the credit company b, transformed secret information which is stored in advance is retrieved using the received identification number as a key and it is determined whether the transformed secret information and the authentication reference information are equal. If they are equal, the credit company b transmits to the sales company A authentication information indicating correctness of the user i, and if they are not equal, it transmits authentication information indicating that the user i can not be authenticated as a correct user. At the sales company A, the authentication information transmitted from the credit company b is transmitted to the user i.
REFERENCES:
Ikeno et al., "Discrete Logarithm Problem", Current Cryptography Theory (Genzai Ango Riron): Information Communication Society, 1986, p. 203.
Ikeno et al., Current Cryptography Theory (Genzai Ango Riron): Information Communication Society, 1986, p. 204.
Ikeno et al., "Fermat's Theorem", Current Cryptography Theory (Genzai Ango Riron): Information Communication Soceity, 1986, p. 242.
Ikeno et al., Current Cryptography Theory (Genzai Ango Riron): Information Communication Society, 1986, pp. 17-18.
Okamoto, "One-way Hash Function", Introduction to Theory of Cryptography (Ango Riron Nyumon): Kyoritsu Shuppan, 1993, p. 138.
International Standard ISO/IEC 9788-4: 1995, Information technology--Security techniques--Entity authentication--Part 4: Mechanisms using a cryptographic check function.
Matsuzaki Natsume
Omori Motoji
Tatebayashi Makoto
Laufer Pinchus M.
Matsushita Electric - Industrial Co., Ltd.
Tarcza Thomas H.
LandOfFree
Personal authentication method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Personal authentication method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Personal authentication method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1186923