AUTHENTICATION METHOD
    1.
    发明申请
    AUTHENTICATION METHOD 审中-公开
    程序进行身份验证

    公开(公告)号:WO02073374A2

    公开(公告)日:2002-09-19

    申请号:PCT/DE0200616

    申请日:2002-02-20

    Abstract: The invention relates to an authentication and identification method that, on the one hand, uses different codes (7, 8) for the prover (1) and the verifier (2) and, on the other hand, forgoes the use of long-number modulo arithmetic by using simple basic components such as arithmetic operations in finite bodies GF(2 ). A private code (7) is stored in the prover (1) so that the prover can be receive, in an encrypted manner, data elements (9), which are generated as random elements, and can itself be used once again as a code for an authentication method of a data set (10) to be transmitted. The verifier (2) receives the authenticator (11) formed in such a manner and verifies it. If the data set is generated by the verifier (2) and sent to the prover (1), the inventive method can serve to identify the prover (1). This method is particularly advantageous in the area of chip cards due to the fact that the space required thereon can be considerably reduced for the implementation of hardware.

    Abstract translation: 一方面不同密钥用于认证和识别的方法(7,8),用于证明者(1)和验证(2)分配在另一方面上使用长数模运算的通过使用简单的基本组件,如在算术运算 有限域GF(2n)后。 私钥(7)沉积与证明者(1),从而使作为随机元件产生这些数据项(9)接收加密和再次设置10本身作为密钥使用要发送的数据的鉴权过程。 验证程序(2)接收这样形成(11)所述认证和检查它。 我们从验证器(2)和发送的证明方(1)生成的数据,因此这种方法可用于鉴定证明者(1)。 特别有利的是此方法在智能卡领域中,因为有所需的空间,可以在硬件实现中显著降低。

    2.
    发明专利
    未知

    公开(公告)号:BR0108090A

    公开(公告)日:2002-10-29

    申请号:BR0108090

    申请日:2001-01-26

    Abstract: The invention relates to a method and device for mutual authentication of two data processing units. The mutual authentication of two data processing units is normally carried out in two separate successive authentications. A challenge-response method is normally used. A first challenge is transmitted from a first data processing unit (1) to a second data processing unit (2) which sends back a first response. According to the invention, a second response is generated by the first data processing unit (1) and transmitted to the second data processing unit (2).

    5.
    发明专利
    未知

    公开(公告)号:ES2204117T3

    公开(公告)日:2004-04-16

    申请号:ES99914397

    申请日:1999-02-02

    Abstract: In the case of cryptographic processing with the aid of an elliptic curve, parameters of the elliptic curve are stored in a memory of a computer. These parameters are each of substantial length. The elliptic curve is transformed in order to shorten at least one parameter significantly in length and to ensure that the high security level is unchanged in the process. One parameter is preferably shortened to 1, -1, 2 or -2 with the aid of an algorithm, whereas the other parameters have a length of several 100 bits. The shortening of even one parameter is clearly reflected in the case of devices which have little memory space.

    6.
    发明专利
    未知

    公开(公告)号:DE59914864D1

    公开(公告)日:2008-10-16

    申请号:DE59914864

    申请日:1999-09-14

    Abstract: A circuit configuration includes at least one nonvolatile, electrically erasable and writable memory area. Each memory area is assigned a nonvolatile, electrically writable and erasable flag memory, which is connected through an address line, a programming line and an authentication line to the assigned memory area, a programming voltage source and a data verification circuit. In the event of an alteration in the content of a memory area, the state of the associated flag memory is changed and, after verification of the programmed memory area content, the flag memory is returned to its basic state.

    8.
    发明专利
    未知

    公开(公告)号:AT245875T

    公开(公告)日:2003-08-15

    申请号:AT99914397

    申请日:1999-02-02

    Abstract: In the case of cryptographic processing with the aid of an elliptic curve, parameters of the elliptic curve are stored in a memory of a computer. These parameters are each of substantial length. The elliptic curve is transformed in order to shorten at least one parameter significantly in length and to ensure that the high security level is unchanged in the process. One parameter is preferably shortened to 1, -1, 2 or -2 with the aid of an algorithm, whereas the other parameters have a length of several 100 bits. The shortening of even one parameter is clearly reflected in the case of devices which have little memory space.

    9.
    发明专利
    未知

    公开(公告)号:BR9914136A

    公开(公告)日:2001-06-19

    申请号:BR9914136

    申请日:1999-09-14

    Abstract: A circuit configuration includes at least one nonvolatile, electrically erasable and writable memory area. Each memory area is assigned a nonvolatile, electrically writable and erasable flag memory, which is connected through an address line, a programming line and an authentication line to the assigned memory area, a programming voltage source and a data verification circuit. In the event of an alteration in the content of a memory area, the state of the associated flag memory is changed and, after verification of the programmed memory area content, the flag memory is returned to its basic state.

    10.
    发明专利
    未知

    公开(公告)号:DE59906358D1

    公开(公告)日:2003-08-28

    申请号:DE59906358

    申请日:1999-02-02

    Abstract: In the case of cryptographic processing with the aid of an elliptic curve, parameters of the elliptic curve are stored in a memory of a computer. These parameters are each of substantial length. The elliptic curve is transformed in order to shorten at least one parameter significantly in length and to ensure that the high security level is unchanged in the process. One parameter is preferably shortened to 1, -1, 2 or -2 with the aid of an algorithm, whereas the other parameters have a length of several 100 bits. The shortening of even one parameter is clearly reflected in the case of devices which have little memory space.

Patent Agency Ranking