KR970066914A - System authentication method using smart card and derived key list - Google Patents
System authentication method using smart card and derived key list Download PDFInfo
- Publication number
- KR970066914A KR970066914A KR1019960009280A KR19960009280A KR970066914A KR 970066914 A KR970066914 A KR 970066914A KR 1019960009280 A KR1019960009280 A KR 1019960009280A KR 19960009280 A KR19960009280 A KR 19960009280A KR 970066914 A KR970066914 A KR 970066914A
- Authority
- KR
- South Korea
- Prior art keywords
- authentication information
- key
- generated
- smart card
- received
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
본 발명은 스마트 카드와 파생키 목록을 이용한 시스템 인증 방법에 관한 것으로서, 스마트 카드(2)를 구비한 인증 시스템에 적용되는 시스템 인증 방법에 있어서, 고유키를 생성하여 분배하고, 생성된 고유키를 일방향 해쉬 함수를 적용하여 파생키를 생성하여 파생키 목록을 형성한 후, 파생키 목록을 분배하는 제1단계(10 내지14); 사용자로부터 지정된 수신 시스템에 대한 파생키를 파생키 목록으로부터 읽어 수신 인증 정보를 생성하고, 송신 인증 정보는 스마트 카드에서 생성된 후, 생성된 수신 인증 정보와 송신 인증 정보로 구성된 헤더와 메시지를 수신 인증 정보를 키로하여 암호화한 후 전송하는 제2단계(20 내지 27); 및 자체 생성한 수신 인증 정보를 키로하여 수신된 헤더를 복호화한 후, 복호된 헤더의 수신 인증 정보와 자체 생성한 수신 인증 정보가 일치하면 복호된 헤더의 송신 인증 정보를 이용하여 파생키 목록에서 검색하여 매치된 시스템이 존재하면 생성된 수신 인증 정보를 키로하여 수신된 메시지를 복호하는 제3단계(30 내지 38)를 포함하여 인증 과정에서 사용자가 불법 개입할 수 없도록 하여 안심하고 통신할 수 있으며, 시스템과 시스템간의 메시지 전송시 메시지 처리에 사용되는 키 정보를 파생키 목록 형태로 각 시스템에 분배하는 방식을 사용함으로써 키 관리가 용이하고, 인증절차도 간소화될 수 있는 효과가 있다.The present invention relates to a system authentication method using a smart card and a derivative key list, and in a system authentication method applied to an authentication system having a smart card (2), a method for generating and distributing a unique key, A first step (10-14) of generating a derived key by applying a one-way hash function to form a derived key list, and then distributing a derived key list; The authentication information is generated by the smart card, and then the header and the message composed of the generated authentication information and the authentication information are received and authenticated A second step (20 to 27) of encrypting and transmitting information with the key as a key; And decrypts the received header by using the received authentication information as a key, and if the received authentication information of the decrypted header matches the generated authentication information of the decrypted header, the authentication information of the decrypted header is used to retrieve from the derived key list And a third step (30 to 38) of decrypting the received message using the generated received authentication information as a key if there is a matched system, so that the user can not communicate illegally, The key information used for message processing when transmitting a message between the system and the system is distributed to each system in the form of a derived key list, thereby facilitating key management and simplifying the authentication procedure.
Description
본 내용은 요부공개 건이므로 전문내용을 수록하지 않았음Since this is a trivial issue, I did not include the contents of the text.
제2도는 본 발명이 적용되는 시스템의 구성도, 제3도는 본 발명에 따른 시스템 인증 방법에 대한 설명도, 제4도는 본 발명에 따른 초기 단계의 일실시예 처리 흐름도.FIG. 2 is a configuration diagram of a system to which the present invention is applied, FIG. 3 is an explanatory diagram of a system authentication method according to the present invention, and FIG. 4 is a flowchart of an embodiment of an initial stage according to the present invention.
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1019960009280A KR970066914A (en) | 1996-03-29 | 1996-03-29 | System authentication method using smart card and derived key list |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1019960009280A KR970066914A (en) | 1996-03-29 | 1996-03-29 | System authentication method using smart card and derived key list |
Publications (1)
Publication Number | Publication Date |
---|---|
KR970066914A true KR970066914A (en) | 1997-10-13 |
Family
ID=66223113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1019960009280A KR970066914A (en) | 1996-03-29 | 1996-03-29 | System authentication method using smart card and derived key list |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR970066914A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100680272B1 (en) * | 2005-08-11 | 2007-02-07 | 고려대학교 산학협력단 | Rfid authentication system and its method |
KR20200039190A (en) * | 2018-10-05 | 2020-04-16 | (주)티엔젠 | Method for Authenticating Multiple Sender Transmitting Image Data |
-
1996
- 1996-03-29 KR KR1019960009280A patent/KR970066914A/en not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100680272B1 (en) * | 2005-08-11 | 2007-02-07 | 고려대학교 산학협력단 | Rfid authentication system and its method |
KR20200039190A (en) * | 2018-10-05 | 2020-04-16 | (주)티엔젠 | Method for Authenticating Multiple Sender Transmitting Image Data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110650010B (en) | Method, device and equipment for generating and using private key in asymmetric key | |
US7200230B2 (en) | System and method for controlling and enforcing access rights to encrypted media | |
KR100436377B1 (en) | Method and system for securely handling information between two information processing devices | |
KR101874721B1 (en) | Identity authentication system, apparatus, and method, and identity authentication request apparatus | |
KR960701410A (en) | METHOD FOR PROVIDING MUTUAL AUTHENTICATION OF A USER AND A SERVER ON A NETWORK | |
RU2005129254A (en) | METHOD FOR FORMING AND DISTRIBUTING CRYPTOGRAPHIC KEYS IN A MOBILE COMMUNICATION SYSTEM AND AN APPROPRIATE MOBILE COMMUNICATION SYSTEM | |
KR20000070624A (en) | Encryption and decryption method and apparatus | |
JP2001251287A (en) | Confidential transmitting method using hardware protection inside secret key and variable pass code | |
CN111262852B (en) | Business card signing and issuing method and system based on block chain | |
WO2001037478A3 (en) | Encryption key management system using multiple smart cards | |
JP2000347566A (en) | Contents administration device, contents user terminal, and computer-readable recording medium recording program thereon | |
JPS63278438A (en) | Cryptographic system by secret cryptograph procedure | |
US10764260B2 (en) | Distributed processing of a product on the basis of centrally encrypted stored data | |
JPH0969831A (en) | Cipher communication system | |
CN115567200B (en) | Http interface anti-brushing method, system and related equipment | |
JP2001111539A (en) | Cryptographic key generator and cryptographic key transmitting method | |
KR970066914A (en) | System authentication method using smart card and derived key list | |
CN112398818B (en) | Software activation method and related device thereof | |
CN110830252B (en) | Data encryption method, device, equipment and storage medium | |
CN107682147B (en) | Security management method and system for smart card chip operating system file | |
CN112862488A (en) | Data signature method and device, electronic equipment and computer readable storage medium | |
JP4034946B2 (en) | COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND RECORDING MEDIUM | |
Rekleitis et al. | A holistic approach to RFID security and privacy | |
KR100458955B1 (en) | Security method for the Wireless LAN | |
JPH0373633A (en) | Cryptographic communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |