Canon kabushiki kaisha (20240176862). AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM simplified abstract

From WikiPatents
Jump to navigation Jump to search

AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM

Organization Name

canon kabushiki kaisha

Inventor(s)

KENJIRO Hori of Saitama (JP)

AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240176862 titled 'AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM

Simplified Explanation

The abstract describes an authentication target apparatus that stores n value pairs, each consisting of a preimage value and a verification value used for verification on an intermediate image value derived from the preimage value. The apparatus reads the verification values from memory, transmits them to an authentication system, receives a challenge index, reads a corresponding preimage value, derives an intermediate image value, and transmits it back to the authentication system.

  • The apparatus stores n value pairs with preimage and verification values.
  • Verification values are derived from preimage values using functions.
  • The apparatus reads verification values, transmits them, receives a challenge index, and derives intermediate image values for authentication.

Potential Applications

This technology can be applied in various industries such as cybersecurity, access control systems, and secure communication protocols.

Problems Solved

This technology helps in enhancing security measures by providing a reliable authentication process based on preimage and verification values.

Benefits

The benefits of this technology include increased security, improved authentication processes, and enhanced protection against unauthorized access.

Potential Commercial Applications

Potential commercial applications of this technology include secure login systems, biometric authentication devices, and secure payment gateways.

Possible Prior Art

One possible prior art for this technology could be traditional password-based authentication systems that use pre-set passwords for user verification.

Unanswered Questions

How does this technology compare to traditional password-based authentication systems?

This article does not provide a direct comparison between this technology and traditional password-based authentication systems. Further research is needed to understand the differences in security and usability between the two methods.

What are the potential limitations of this authentication target apparatus?

The article does not address any potential limitations or drawbacks of the authentication target apparatus. Future studies could explore any vulnerabilities or challenges associated with this technology.


Original Abstract Submitted

an authentication target apparatus includes a memory that stores n value pairs each of which includes a preimage value and a verification value used for verification on an intermediate image value derived based on the preimage value. each verification value is a mapped value that is derived by applying a corresponding preimage value to a function to derive an intermediate image value and then applying the intermediate image value to another function. the apparatus reads the n verification values from the memory, transmits the read n verification values to an authentication system, receives a challenge index from the authentication system, reads a first preimage value corresponding to the challenge index from the memory, derives a first intermediate image value based on the read first preimage value, and transmits the derived first intermediate image value to the authentication system.