20240056296. IDENTITY AUTHENTICATION METHOD, AUTHENTICATION ACCESS CONTROLLER, REQUESTING DEVICE, STORAGE MEDIUM, PROGRAM, AND PROGRAM PRODUCT simplified abstract (CHINA IWNCOMM CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

IDENTITY AUTHENTICATION METHOD, AUTHENTICATION ACCESS CONTROLLER, REQUESTING DEVICE, STORAGE MEDIUM, PROGRAM, AND PROGRAM PRODUCT

Organization Name

CHINA IWNCOMM CO., LTD.

Inventor(s)

Manxia Tie of Xi'an (CN)

Jun Cao of Xi'an (CN)

Xiaorong Zhao of Xi'an (CN)

Xiaolong Lai of Xi'an (CN)

Qin Li of Xi'an (CN)

Bianling Zhang of Xi'an (CN)

Xiang Yan of Xi'an (CN)

Dandan Ma of Xi'an (CN)

IDENTITY AUTHENTICATION METHOD, AUTHENTICATION ACCESS CONTROLLER, REQUESTING DEVICE, STORAGE MEDIUM, PROGRAM, AND PROGRAM PRODUCT - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240056296 titled 'IDENTITY AUTHENTICATION METHOD, AUTHENTICATION ACCESS CONTROLLER, REQUESTING DEVICE, STORAGE MEDIUM, PROGRAM, AND PROGRAM PRODUCT

Simplified Explanation

The abstract of the patent application describes an identity authentication method that utilizes a pre-shared key for bidirectional or unidirectional authentication between an authentication access controller and a requesting device. This method ensures legitimate user access to a network and secret communication between the requesting device and the authentication access controller.

  • Implementation of bidirectional or unidirectional identity authentication using a pre-shared key
  • Calculation of an identity authentication key and code for verified parties
  • Enhanced resistance to dictionary brute-force and quantum computing attacks in the authentication process
    • Potential Applications:**
  • Network security
  • Access control systems
  • Secure communication protocols
    • Problems Solved:**
  • Unauthorized access to networks
  • Lack of secure authentication methods
  • Vulnerability to brute-force and quantum computing attacks
    • Benefits:**
  • Enhanced security for network access
  • Legitimate user verification
  • Secure communication between devices


Original Abstract Submitted

disclosed in embodiments of the present application are an identity authentication method. bidirectional or unidirectional identity authentication between an authentication access controller and a requesting device is implemented by using a pre-shared key, thereby laying a foundation for ensuring that a user accessing a network is legitimate and/or a network accessed by a user is legitimate, so as to implement secret communication between the requesting device and the authentication access controller. in addition, in an identity authentication process, a verified party performs calculation on information comprising the pre-shared key of two parties and random numbers respectively generated by the two parties to obtain an identity authentication key, and performs calculation on specified content by using the identity authentication key to obtain an identity authentication code of the verified party. according to the method for calculating an identity authentication code provided by the present application, key exchange calculation is combined, and the capability of resistance to dictionary brute-force attack or to quantum computing attack in the authentication process is enhanced by means of an ingenious detail design. also disclosed in the embodiments of the present application are an authentication access controller, a requesting device, a storage medium, a program, and a program product.