A Method of Multiple Combination Keys
A combination key and key technology, which is applied in the field of network information security, can solve problems such as unfavorable applications, and achieve the effect of reporting loss and avoiding collusion attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0020] 1. Choose a 12-digit decimal number as the user ID, which can be divided into 4 groups with 3 numbers in each group. The condition is that the 3 numbers cannot be exactly the same. There are 990 ways to choose them. The value space of all IDs is 990^4, which is approximately equal to 1 trillion types.
[0021] 2. Correspondingly, each group takes a 32*32 public and private key matrix, and its rank is 32*31=992, which is greater than 990, which meets the condition of being undecipherable. The values in the same position of the public and private key matrices correspond to a set of discrete logarithms on a given elliptic curve (ECC), that is, a public-private key pair. There is no correlation between the key matrices generated by each group, and there are 4 groups in total, and the sequence numbers I, II, III, and IV are respectively given. Among them, the public key matrix sequence is announced to the public, and the private key matrix sequence can be divided accordin...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com