18502210. AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM simplified abstract (CANON KABUSHIKI KAISHA)

From WikiPatents
Jump to navigation Jump to search

AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM

Organization Name

CANON KABUSHIKI KAISHA

Inventor(s)

KENJIRO Hori of Saitama (JP)

AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18502210 titled 'AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM

Simplified Explanation

The abstract describes an authentication target apparatus that stores preimage values and verification values for verification purposes. The apparatus reads verification values from memory, transmits them to an authentication system, receives a challenge index, reads a preimage value corresponding to the challenge index, derives an intermediate image value, and transmits it back to the authentication system.

  • The authentication target apparatus stores N value pairs with preimage values and verification values.
  • Verification values are mapped values derived from applying preimage values to functions.
  • The apparatus reads verification values, transmits them to an authentication system, and responds to challenges by deriving intermediate image values based on preimage values.

Potential Applications

This technology can be applied in various industries such as cybersecurity, access control systems, and secure authentication processes.

Problems Solved

This technology helps in enhancing security measures by providing a reliable authentication process that can prevent unauthorized access to systems or data.

Benefits

The authentication target apparatus offers a secure and efficient way to verify users' identities, ensuring only authorized individuals can access sensitive information or systems.

Potential Commercial Applications

  • Secure authentication systems for businesses
  • Access control solutions for high-security facilities

Possible Prior Art

One possible prior art could be traditional authentication methods using passwords or PIN codes for verification purposes.

What is the impact of this technology on cybersecurity measures?

This technology significantly enhances cybersecurity measures by providing a more secure and reliable authentication process, reducing the risk of unauthorized access to sensitive information or systems.

How does this innovation improve user experience in accessing secure systems?

This innovation improves user experience by offering a seamless and efficient authentication process, ensuring quick and secure access to systems without compromising security measures.


Original Abstract Submitted

An authentication target apparatus includes a memory that stores N value pairs each of which includes a preimage value and a verification value used for verification on an intermediate image value derived based on the preimage value. Each verification value is a mapped value that is derived by applying a corresponding preimage value to a function to derive an intermediate image value and then applying the intermediate image value to another function. The apparatus reads the N verification values from the memory, transmits the read N verification values to an authentication system, receives a challenge index from the authentication system, reads a first preimage value corresponding to the challenge index from the memory, derives a first intermediate image value based on the read first preimage value, and transmits the derived first intermediate image value to the authentication system.