Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for generating a data authentication code

A technology of data authentication and authentication code, applied in transmission systems, electrical components, etc., can solve problems such as inability to authenticate data, slow authentication speed, loss, etc., to reduce the risk of data loss, enhance reliability and security, and improve efficiency Effect

Active Publication Date: 2019-11-26
BEIJING ZHONG XING TONG CHUANG TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is that the existing data authentication codes generated by authenticating the current incremental data one by one only reflect the integrity of the current incremental data, and cannot authenticate the integrity of all previous data, resulting in loss and damage Risk. If you want to authenticate all the previous data, you need to reprocess all the data. The amount of data processing is very large, the efficiency of data authentication is low, and the delay is obvious, which affects the user experience, especially when the authentication code is required to be public. The authentication speed is extremely slow , the above defects are more obvious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for generating a data authentication code
  • A method for generating a data authentication code
  • A method for generating a data authentication code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0040] like figure 1 As shown, the present invention provides a method for generating a data authentication code, which is configured on a client end capable of communicating with a depository server, and specifically includes the following steps:

[0041] Step 10. During initialization, for data security, it is necessary to set the message authentication code (Message Authentication Code, MAC for short) function initial vector value MAC for the system 0 , initial vector value MAC 0 is a fixed binary string;

[0042] Step 20, calling the message authentication code function MAC (the message authentication code function MAC is an algorithm that supports the XOR operation of the authentication message and processes the message in groups, such as HMAC, CMAC, etc.), and uses the currently existing last output MAC value MAC i-1 As the initial v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a generation method for a data authentication code. The method comprises the steps of setting a binary character string with a fixed random length as an initial vector value MAC0 of an MAC function; calling the MAC function, using a currently existing last output MAC value MACi-1 as an initial vector, using a character string corresponding to current data Mi of which the data authentication code is not generated as an input, outputting the corresponding MAC value MACi to serve as a non-public verification data authentication code of the current data Mi, and storing andsending the MAC value MACi to a register server; using the MAC value MACi corresponding to the last generated non-public verification data authentication code as the input according to a public verification period strategy, outputting a public verifiable data authentication code of the current data Mi, and storing and sending the code to the register server. According to the generation method provided by the invention, the generated data authentication code of the current data can authenticate all previous data, so that a data loss risk is reduced, reliability and security of data authentication are enhanced, and data authentication efficiency is improved.

Description

technical field [0001] The invention relates to data authentication technology, in particular to a method for generating a data authentication code. Background technique [0002] With the development of network technology and big data concepts, data authentication technology to ensure data integrity has become more critical, whether in any industry such as government, finance, electric power, medical, aerospace, shipping, etc., in the communication process, to ensure Data security and not being damaged are the top priority of realizing data storage and improving system reliability. Once data is destroyed, it will bring irreparable losses. [0003] At present, the data authentication technologies used are mainly message authentication codes, digital signature schemes, etc., which only authenticate the current incremental data one by one, but cannot guarantee the security of all previous data. This kind of authentication only verifies the current incremental data. scheme, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 王晶
Owner BEIJING ZHONG XING TONG CHUANG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products