18373700. TERMINAL AND AUTHENTICATION METHOD simplified abstract (NEC Corporation)

From WikiPatents
Jump to navigation Jump to search

TERMINAL AND AUTHENTICATION METHOD

Organization Name

NEC Corporation

Inventor(s)

Jia Hao of Tokyo (JP)

TERMINAL AND AUTHENTICATION METHOD - A simplified explanation of the abstract

This abstract first appeared for US patent application 18373700 titled 'TERMINAL AND AUTHENTICATION METHOD

Simplified Explanation

The abstract describes a terminal that can provide an electronic signature to data using a secret key, send an authentication request to another terminal, receive an authentication result from an authentication server, and decode the result using the secret key.

  • The terminal includes at least one memory to store instructions and at least one processor to perform the instructions.
  • The processor provides an electronic signature to data using a secret key.
  • The terminal sends an authentication request with the data and electronic signature to another terminal.
  • The terminal receives an authentication result from the authentication server, encoded with a public key, and decodes it using the secret key.

Potential Applications

This technology can be applied in secure communication systems, digital signatures, and authentication processes.

Problems Solved

This technology solves the problem of ensuring the authenticity and integrity of data during communication and authentication processes.

Benefits

The benefits of this technology include enhanced security, protection against data tampering, and reliable authentication mechanisms.

Potential Commercial Applications

Potential commercial applications of this technology include secure messaging platforms, online banking systems, and digital document signing services.

Possible Prior Art

One possible prior art for this technology could be existing digital signature and authentication systems used in various industries.

Unanswered Questions

How does this technology compare to existing authentication methods?

This article does not provide a direct comparison with other authentication methods, leaving the reader to wonder about the advantages and disadvantages of this technology in comparison to existing solutions.

What are the potential limitations or vulnerabilities of this technology?

The article does not address any potential limitations or vulnerabilities of this technology, leaving the reader to speculate on possible weaknesses that could be exploited by malicious actors.


Original Abstract Submitted

A terminal according to one aspect includes: at least one memory configured to store an instruction; and at least one processor configured to perform the instruction, wherein the at least one processor performs the instruction, and thus provides an electronic signature to data by using a secret key of an own terminal, provides, as an authentication request to another terminal, the data provided with the electronic signature, acquires, from the another terminal, an authentication result of an authentication server for the authentication request, the authentication result being encoded by using a public key of the own terminal, and decodes the authentication result by using the secret key of the own terminal.