首页>
外国专利>
CHALLENGE RESPONSE AUTHENTICATION METHOD USING PUBLIC KEY INFRASTRUCTURE
CHALLENGE RESPONSE AUTHENTICATION METHOD USING PUBLIC KEY INFRASTRUCTURE
展开▼
机译:使用公钥基础结构的挑战响应授权方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
PROBLEM TO BE SOLVED: To provide a challenge response authentication method using a secure and highly convenient PKI (Public Key Infrastructure) by securely managing a secret key of the public key infrastructure (PKI).;SOLUTION: After an encryption secret key and a public key certificate are uploaded to a user terminal, the user terminal requests an access request to an authentication server, the authentication server generates a challenge code, the generated challenge code is sent to the user terminal, the user terminal uses a user's fingerprint image to decrypt the encryption secret key, and the user terminal generates a response code by using the decrypted secret key and encrypting the challenge code, and sends the generated response code and a public key certificate to the authentication server. When the normality of the public key certificate is successfully verified, the authentication server decrypts the response code with the public key, and the authentication server authenticates the user by determining whether the challenge code coincides with information obtained by decrypting the response code.;COPYRIGHT: (C)2008,JPO&INPIT
展开▼