首页>
外国专利>
AUTHENTICATION METHOD OF A CLIENT WHICH HAS A LIMITED RESOURCE WHICH IS TRANSMITTED BY HIDING A PRIVATE KEY THROUGH A METHOD WHICH CALCULATES AND TRANSMITS WITH A BLINDING VECTOR, A STORAGE MEDIUM CAPABLE OF BEING READ BY A MACHINE, AND A CLIENT AND SERVER
AUTHENTICATION METHOD OF A CLIENT WHICH HAS A LIMITED RESOURCE WHICH IS TRANSMITTED BY HIDING A PRIVATE KEY THROUGH A METHOD WHICH CALCULATES AND TRANSMITS WITH A BLINDING VECTOR, A STORAGE MEDIUM CAPABLE OF BEING READ BY A MACHINE, AND A CLIENT AND SERVER
PURPOSE: An authentication method of a client which has a limited resource, a storage medium capable of being read by a machine, a client and server are provided to be safe from a man-in-the-middle attack and prove a safety based on a mathematical conundrum.;CONSTITUTION: A client(100) and a server(200) respectively include first and second memories(110,210), first and second communication units(120,220), and first and second control units(130,230). The first and second memories store data like a private key which is necessary for a preset authentication process. The first communication unit(120) performs a wireless communication with the server. The second communication unit(220) performs a wireless communication with the client. The first control unit(130) performs a preset authentication process about the server by using the first memory or the first communication unit. The second control unit(230) performs a preset authentication process about the client by using the second memory or the second communication unit.;COPYRIGHT KIPO 2013;[Reference numerals] (100) Client; (110,210) Memory; (120,220) Communication unit; (130,230) Control unit; (200) Server
展开▼