Abstract:
본 발명은 차량용 네트워크의 전자제어장치간 인증 방법 및 시스템에 관한 것으로, 보다 구체적으로는 제1 전자제어장치가 복수 개의 임의의 제1 데이터를 생성하여 제2 전자제어장치로 전송하는 단계; 상기 제2 전자제어장치가 수신한 제1 데이터에 기초하여 복수 개의 응답데이터를 연산하는 단계; 상기 제2 전자제어장치가 상기 응답데이터를 상기 제1 전자제어장치로 전송하는 단계; 및 상기 제1 전자제어장치가 수신한 응답데이터와 상기 제1 데이터간의 해밍웨이트값(Hamming weight)을 연산하고, 연산한 해밍웨이트값을 기설정된 임계값과 비교하여 상기 제2 전자제어장치에 대한 정당여부를 인증하는 단계;를 포함하는 것을 특징으로 한다. 이러한 구성에 의해, 본 발명의 차량용 네트워크의 전자제어장치간 인증 방법은 차량의 내부 네트워크에 접속하는 차량 내 복수 개의 전자제어장치에 대하여 상기 차량의 내부 네트워크로 접근이 허용된 전자제어장치인지 여부를 용이하게 확인할 수 있는 효과가 있다.
Abstract:
The present invention relates to a method of performing authentication between objects performing cryptographic communication, and more particularly, to a scheme of securing security even in a so-called worst case when authentication between objects, which precedes the cryptographic communication performed between the objects, is performed. An authentication method disclosed includes the following steps of: a) inquiring a secret value possessed by an object (certifier) when an object (verifier) performing authentication receives an authentication request from the verifier who will be authenticated; b) transmitting an application result of a learning with error (LWE) problem to the secret value to the verifier by the certifier; and c) finally determining whether the certifier is authenticated by using the result by the verifier.
Abstract:
PURPOSE: An authentication method between a server and a client, a machine-readable storage medium, a client and a server are provided to perform authentication within calculation operation capability of a device having a limited resource. CONSTITUTION: An authentication system includes a client (100), a server (200) and a program provider (300). The client is an authentication target device to receive authentication. The server provides authentication. The program provider provides programs including indications to perform a preestablished authentication process. The program provider includes a program, a third memory (310), a third communication part (320) and a third control part (330). The program includes indications enabling the client or the server to perform the preestablished authentication process. The third memory stores information required in the authentication process. The third communication part performs wired or wireless communication with the client or the server. The third control part transmits a corresponding program to the client or the server automatically or by the request of the client or the server. [Reference numerals] (100) Client; (110,210,310) Memory; (120,220,320) Communication part; (130,230,330) Control part; (200) Server; (300) Program provider
Abstract:
The present invention relates to a method and a system to distribute content under the content access control of a user terminal and, more specifically, to a method and a system to distribute content under the content access control of a user terminal. The method comprises the steps of: allowing a key creating server to create a generator and any element belonging to a bilinear group, and to apply the created generator and element to a bilinear function to create a public parameter; allowing the key creating server to receive a set of access structures accessing content from a user terminal, and create an access rights secret key indicating whether it is possible to access the content, based on the set of access structures; allowing a content providing server to receive the public parameter from the key creating server, to encode the content, based on the received public parameter to create content cyphertext, and to transmit the created content cyphertext to the user terminal; and allowing the user terminal to receive the access rights secret key from the key creating server and decode the content cyphertext received from the content providing server, based on the received access rights secret key to access the content. By the above configuration, the method and the system to distribute content under the content access control of a user terminal can allow the user terminal to receive the content or whether it is possible to access the content more efficiently by encoding the access rights secret key indicating whether it is possible to access the content together with the content.