Canon kabushiki kaisha (20240176862). AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM simplified abstract
Contents
- 1 AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM
Organization Name
Inventor(s)
AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240176862 titled 'AUTHENTICATION TARGET APPARATUS AND AUTHENTICATION SYSTEM
Simplified Explanation
The abstract describes an authentication target apparatus that stores n value pairs, each consisting of a preimage value and a verification value used for verification on an intermediate image value derived from the preimage value. The apparatus reads the verification values from memory, transmits them to an authentication system, receives a challenge index, reads a corresponding preimage value, derives an intermediate image value, and transmits it back to the authentication system.
- The apparatus stores n value pairs with preimage and verification values.
- Verification values are derived from preimage values using functions.
- The apparatus reads verification values, transmits them, receives a challenge index, and derives intermediate image values for authentication.
Potential Applications
This technology can be applied in various industries such as cybersecurity, access control systems, and secure communication protocols.
Problems Solved
This technology helps in enhancing security measures by providing a reliable authentication process based on preimage and verification values.
Benefits
The benefits of this technology include increased security, improved authentication processes, and enhanced protection against unauthorized access.
Potential Commercial Applications
Potential commercial applications of this technology include secure login systems, biometric authentication devices, and secure payment gateways.
Possible Prior Art
One possible prior art for this technology could be traditional password-based authentication systems that use pre-set passwords for user verification.
Unanswered Questions
How does this technology compare to traditional password-based authentication systems?
This article does not provide a direct comparison between this technology and traditional password-based authentication systems. Further research is needed to understand the differences in security and usability between the two methods.
What are the potential limitations of this authentication target apparatus?
The article does not address any potential limitations or drawbacks of the authentication target apparatus. Future studies could explore any vulnerabilities or challenges associated with this technology.
Original Abstract Submitted
an authentication target apparatus includes a memory that stores n value pairs each of which includes a preimage value and a verification value used for verification on an intermediate image value derived based on the preimage value. each verification value is a mapped value that is derived by applying a corresponding preimage value to a function to derive an intermediate image value and then applying the intermediate image value to another function. the apparatus reads the n verification values from the memory, transmits the read n verification values to an authentication system, receives a challenge index from the authentication system, reads a first preimage value corresponding to the challenge index from the memory, derives a first intermediate image value based on the read first preimage value, and transmits the derived first intermediate image value to the authentication system.