Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication equipment and working method thereof

A technology for authenticating equipment and authentication requests, which is applied in the field of communication, can solve the problem of large memory usage, and achieve the effect of small memory usage

Active Publication Date: 2018-08-07
FEITIAN TECHNOLOGIES
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the authentication device needs to authenticate multiple servers, it must store the private key corresponding to each server, which takes up a lot of memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication equipment and working method thereof
  • Authentication equipment and working method thereof
  • Authentication equipment and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] This embodiment provides a working method for authenticating equipment, such as figure 1 shown, including:

[0047] Step S1, the authentication device waits for the command issued by the host computer, and executes step S2 when receiving the authentication request command;

[0048] Step S2, the authentication device obtains the challenge parameter, the first application parameter and the key handle from the authentication request command, obtains the ciphertext key handle and the check value from the key handle, and uses the pre-stored check value key to pair the ciphertext The key handle is encrypted to obtain the comparison value;

[0049] Step S3, the authentication device judges whether the verification value matches the comparison value, if yes, execute step S4, otherwise, return an authentication failure response to the host computer, and end;

[0050] Step S4, the authentication device uses the pre-stored encryption key to decrypt the ciphertext key handle to o...

Embodiment 2

[0064] This embodiment provides a working method for authenticating equipment, such as figure 2 shown, including:

[0065] Step 101, power on the authentication device;

[0066] Step 102, the authentication device judges whether it is powered on for the first time, if yes, execute step 103, otherwise execute step 104;

[0067] Preferably, the authentication device judges whether it is the first power-on according to the power-on flag, if the power-on flag is not set, it is the first power-on, the power-on flag is set, and step 103 is executed, otherwise step 104 is executed;

[0068] Step 103, the authentication device generates and saves the private key factor, the encryption key and the check value key, and executes step 104.

[0069] Step 104, the authentication device waits for the command issued by the host computer; when receiving the command, execute step 105;

[0070] Step 105, the authentication device judges the type of the command, if it is a registration reques...

Embodiment 3

[0125] This embodiment provides a working method for authenticating equipment, such as image 3 shown, including:

[0126] Step R1, the authentication device waits to receive the command issued by the host computer, and when receiving the authentication request command, execute step R2;

[0127] Step R2, the authentication device obtains the challenge parameter, application parameter and key handle from the authentication request command, obtains the random parameter and check value from the key handle, and uses the pre-stored device private key to encrypt the application parameter and random parameter to generate The user application private key; use the device private key to encrypt the user application private key and application parameters to obtain the comparison value;

[0128] Step R3, the authentication device judges whether the comparison value is consistent with the verification value, if yes, execute step R4, otherwise, return an authentication failure response to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the communication field, in particular to authentication equipment and a working method thereof. The method comprises the steps that when the authentication equipment receivesan authentication request command, the authentication equipment acquires a challenge parameter, a first application parameter and a key handle from the authentication request command, acquires a ciphertext key handle and a verification value from the key handle and encrypts the ciphertext key handle by using a pre-stored verification value key to obtain a comparison value; whether or not the verification value and the comparison value are matched is judged; if the verification value and the comparison value are matched, the ciphertext key handle is decrypted by using a pre-stored encryption key to obtain a second application parameter and a random parameter, and whether or not the second application parameter is consistent with the first application parameter is judged; when the second application parameter is consistent with the first application parameter, a user application private key is generated by using the random parameter and a pre-stored private key factor, to-be-signatureddata is generated according to the first application parameter and the challenge parameter and signatured by using the user application private key to obtain a signature value, and the signature valueis returned to an upper computer. The method is small in occupied memory, more safe and more reliable.

Description

technical field [0001] The invention relates to the communication field, in particular to an authentication device and a working method thereof. Background technique [0002] With the rapid development of the Internet and e-commerce, network information security issues have become increasingly prominent. The FIDO protocol uses standard asymmetric public-private key pairs to provide security. When a user logs in to the server to register information, the user's encryption device generates a pair of asymmetric key pairs. The private key is reserved in the encryption device, which cannot be read by hackers, and the public key is passed to the server. Associated. When the user logs in to the server to verify information, the user uses the private key in the device to sign the server's challenge data, and the server uses the corresponding public key for verification. [0003] In the prior art, a key pair generated by an authentication device is associated with a server, and a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3234H04L9/3249H04L63/0853
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products