20240056296. IDENTITY AUTHENTICATION METHOD, AUTHENTICATION ACCESS CONTROLLER, REQUESTING DEVICE, STORAGE MEDIUM, PROGRAM, AND PROGRAM PRODUCT simplified abstract (CHINA IWNCOMM CO., LTD.)
IDENTITY AUTHENTICATION METHOD, AUTHENTICATION ACCESS CONTROLLER, REQUESTING DEVICE, STORAGE MEDIUM, PROGRAM, AND PROGRAM PRODUCT
Organization Name
Inventor(s)
IDENTITY AUTHENTICATION METHOD, AUTHENTICATION ACCESS CONTROLLER, REQUESTING DEVICE, STORAGE MEDIUM, PROGRAM, AND PROGRAM PRODUCT - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240056296 titled 'IDENTITY AUTHENTICATION METHOD, AUTHENTICATION ACCESS CONTROLLER, REQUESTING DEVICE, STORAGE MEDIUM, PROGRAM, AND PROGRAM PRODUCT
Simplified Explanation
The abstract of the patent application describes an identity authentication method that utilizes a pre-shared key for bidirectional or unidirectional authentication between an authentication access controller and a requesting device. This method ensures legitimate user access to a network and secret communication between the requesting device and the authentication access controller.
- Implementation of bidirectional or unidirectional identity authentication using a pre-shared key
- Calculation of an identity authentication key and code for verified parties
- Enhanced resistance to dictionary brute-force and quantum computing attacks in the authentication process
- Potential Applications:**
- Network security
- Access control systems
- Secure communication protocols
- Problems Solved:**
- Unauthorized access to networks
- Lack of secure authentication methods
- Vulnerability to brute-force and quantum computing attacks
- Benefits:**
- Enhanced security for network access
- Legitimate user verification
- Secure communication between devices
Original Abstract Submitted
disclosed in embodiments of the present application are an identity authentication method. bidirectional or unidirectional identity authentication between an authentication access controller and a requesting device is implemented by using a pre-shared key, thereby laying a foundation for ensuring that a user accessing a network is legitimate and/or a network accessed by a user is legitimate, so as to implement secret communication between the requesting device and the authentication access controller. in addition, in an identity authentication process, a verified party performs calculation on information comprising the pre-shared key of two parties and random numbers respectively generated by the two parties to obtain an identity authentication key, and performs calculation on specified content by using the identity authentication key to obtain an identity authentication code of the verified party. according to the method for calculating an identity authentication code provided by the present application, key exchange calculation is combined, and the capability of resistance to dictionary brute-force attack or to quantum computing attack in the authentication process is enhanced by means of an ingenious detail design. also disclosed in the embodiments of the present application are an authentication access controller, a requesting device, a storage medium, a program, and a program product.