Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Device and method certificate generation

A device and certificate technology, applied in the field of device authentication, can solve the problems of exposing passwords and difficult to trust certificates, etc.

Inactive Publication Date: 2015-08-05
THOMSON LICENSING SA
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This leads to a situation where the user talks to a MITM, thereby exposing his password,
[0012] 2. TLS session establishment is generally separated from user authentication
Then, since any device can generate a certificate, it is difficult to trust such a certificate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method certificate generation
  • Device and method certificate generation
  • Device and method certificate generation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] figure 1 An exemplary system 100 implementing the present disclosure is shown. The system 100 includes a first computing device ("first device") 110 and a second computing device ("second device") 120 . The first and second devices 110, 120 may be any kind of suitable computer or device capable of performing computations, such as standard personal computers (PCs), workstations, smartphones and tablets. Each of the first and second devices 110, 120 preferably comprises at least one processor 111, 121, internal or external memory 112, 122, a user interface 113, 123 for interacting with a user, and a second device for interacting with other devices via a connection 130. Interface 114,124. The first and second devices 110, 120 each also preferably comprise an interface (not shown) for reading a software program from a digital data carrier 140 storing instructions which, when executed by a processor, perform any of the methods described hereinafter . Those skilled in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A device (110, 120) receives (S202) a password from a user, obtains (S204) a public key for a cryptographic algorithm for the device, obtains (S206) a password verifier by applying a one-way function to a combination of a unique identifier, the password and the public key, generates (S208) the certificate comprising the unique identifier, the public key and the password verifier, signs (S21 0) the certificate using a private key corresponding to the public key thereby obtaining a self-signed certificate, and outputs the self-signed certificate. Also provided is the device.

Description

technical field [0001] The present disclosure relates generally to computer network security, and more particularly to authentication of devices in such networks. Background technique [0002] This section is intended to introduce the reader to various aspects of art, which may be related to various aspects of the present disclosure that are described and / or claimed below. This discussion is considered helpful in providing the reader with background information to facilitate a better understanding of various aspects of the present disclosure. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art. [0003] There are many situations where two devices need to interact to exchange data. A common situation occurs when a single user controls devices such as a laptop and a wireless access point. In this case, the communication is passed over a wireless communication channel that is relatively easy to eavesdrop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0823H04L9/3263G06F21/445G06F21/33H04L63/083H04L9/3247G06F21/31H04L9/3226H04L9/0825
Inventor M.卡鲁米O.考泰
Owner THOMSON LICENSING SA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products