18502210. AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM simplified abstract (CANON KABUSHIKI KAISHA)
Contents
- 1 AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM
Organization Name
Inventor(s)
AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM - A simplified explanation of the abstract
This abstract first appeared for US patent application 18502210 titled 'AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM
Simplified Explanation
The abstract describes an authentication target apparatus that stores preimage values and verification values for verification purposes. The apparatus reads verification values from memory, transmits them to an authentication system, receives a challenge index, reads a preimage value corresponding to the challenge index, derives an intermediate image value, and transmits it back to the authentication system.
- The authentication target apparatus stores N value pairs with preimage values and verification values.
- Verification values are mapped values derived from applying preimage values to functions.
- The apparatus reads verification values, transmits them to an authentication system, and responds to challenges by deriving intermediate image values based on preimage values.
Potential Applications
This technology can be applied in various industries such as cybersecurity, access control systems, and secure authentication processes.
Problems Solved
This technology helps in enhancing security measures by providing a reliable authentication process that can prevent unauthorized access to systems or data.
Benefits
The authentication target apparatus offers a secure and efficient way to verify users' identities, ensuring only authorized individuals can access sensitive information or systems.
Potential Commercial Applications
- Secure authentication systems for businesses
- Access control solutions for high-security facilities
Possible Prior Art
One possible prior art could be traditional authentication methods using passwords or PIN codes for verification purposes.
What is the impact of this technology on cybersecurity measures?
This technology significantly enhances cybersecurity measures by providing a more secure and reliable authentication process, reducing the risk of unauthorized access to sensitive information or systems.
How does this innovation improve user experience in accessing secure systems?
This innovation improves user experience by offering a seamless and efficient authentication process, ensuring quick and secure access to systems without compromising security measures.
Original Abstract Submitted
An authentication target apparatus includes a memory that stores N value pairs each of which includes a preimage value and a verification value used for verification on an intermediate image value derived based on the preimage value. Each verification value is a mapped value that is derived by applying a corresponding preimage value to a function to derive an intermediate image value and then applying the intermediate image value to another function. The apparatus reads the N verification values from the memory, transmits the read N verification values to an authentication system, receives a challenge index from the authentication system, reads a first preimage value corresponding to the challenge index from the memory, derives a first intermediate image value based on the read first preimage value, and transmits the derived first intermediate image value to the authentication system.