首页>
外国专利>
METHOD OF MUTUAL AUTHENTICATION AND METHOD OF ENCRYPTION THROUGH MULTI-KEY BASED REAL TIME BINARY CLUSTER BASED AUTHENTICATION VALUE CALCULATION
METHOD OF MUTUAL AUTHENTICATION AND METHOD OF ENCRYPTION THROUGH MULTI-KEY BASED REAL TIME BINARY CLUSTER BASED AUTHENTICATION VALUE CALCULATION
展开▼
机译:相互认证的方法和通过基于多密钥的实时二进制聚类的认证值计算的加密方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
When a financial trade is made between a bank and an individual, assume two authentication keys, A, and B, are owned by the bank and the individual. To authenticate a specific individual, at first the bank encrypts a dummy password (hereinafter, DP) value in a binary data format generated in real time into a DP value based on authentication key A and then transmits the value to the individual, where the individual interprets the encryption data received based on the authentication key A′s value, and after interpreting a DP value in a binary data format generated in real time and transmitted by the bank, makes a change of a dummy password value in accordance with rules preliminarily promised by the bank and the individual on the DP value and encrypts the modified dummy password (hereinafter, MDP) into an MDP value based on an authentication key B and then transmits it to the bank. The bank interprets the MDP value of the value received from the individual based on authentication key B, and then confirms whether an appropriate MDP values was received in response to the DP value transmitted by the bank, thereby executing a personal authentication. At this time, to perform an initial check of the personal authentication mutual private keys A, B between the bank and the individual should be exactly matched, and a part which is made by interpreting DP into an MDP should exactly match as desired. Additionally, in a transmission to a network, authentication key values of A and B are not actually transferred, and only the values generated by encrypting authentication values of A, B into DP or MDP will be mutually transmitted, thus even if communication data is exposed in a network, authentication keys A and B will not be exposed, thereby securing a high security level.;COPYRIGHT KIPO 2016
展开▼