WO2007065348A1 - A key digital authentication method using one-time variable - Google Patents

A key digital authentication method using one-time variable Download PDF

Info

Publication number
WO2007065348A1
WO2007065348A1 PCT/CN2006/003276 CN2006003276W WO2007065348A1 WO 2007065348 A1 WO2007065348 A1 WO 2007065348A1 CN 2006003276 W CN2006003276 W CN 2006003276W WO 2007065348 A1 WO2007065348 A1 WO 2007065348A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
transaction
sexual intercourse
customer
time variable
Prior art date
Application number
PCT/CN2006/003276
Other languages
French (fr)
Chinese (zh)
Inventor
Ren Liu
Original Assignee
Liu, Jinhong
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liu, Jinhong filed Critical Liu, Jinhong
Publication of WO2007065348A1 publication Critical patent/WO2007065348A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Definitions

  • Identity methods usually have identities, or signatures. Methods are usually manual and can be easily counterfeited to distinguish between non-inconvenient and inconvenient exchanges of information. Usually, digital and digital information exchanges are not required.
  • Digital information usually uses the message AC or Lin as the message and the message is combined to generate a fixed degree.
  • AC represents the message of the algorithm.
  • Communication can use shared messages to generate messages AC to compare the messages and messages AC receive and receive with the AC received by the AC if they are the same
  • the recipient may not modify the message.
  • the receiver can believe that the message sequence is ""
  • the integrity of the message can also be achieved using digital signatures.
  • the message is a fixed-degree or Lin-made message sum using arbitrary input of the message. references
  • the main problem to be solved is the security of information, including security identity, integrity of information, newness and uniqueness of information.
  • the digital information methods commonly used in the field of information security are mainly messages AC or AC or digital signatures.
  • the method can not understand the integrity of the message but
  • the freshness of the message and the identity of the informant usually need to combine or prevent the message.
  • the need for the same synchronization and not the only unique role can not only the freshness of the message but also the specific homogeneity of the message, and only by the rest can each effect only the freshness of the messages that they produce.
  • the same sum value method can make the message fresh but needs to increase communication in it or it needs to consume more and make the message not easy only.
  • the amount of sexual intercourse is a natural number greater than 100
  • the amount of sexual intercourse in the garden is all available, so just save 101.
  • the amount of payment itself can not be secret, that is, the amount of payment can be obtained by a third party.
  • the party can have a different amount of sexual intercourse used in a certain medium, one party only uses to generate messages, the other party uses only unused
  • the amount of traffic in the other park is just the opposite.
  • the same sexual intercourse can also be used together as long as the sexual intercourse is used.
  • the message used in the sexual intercourse is used as the message.
  • the received traffic must be used.
  • the received message includes the sexual intercourse and the message AC. Whether the message AC is the same also must be sexual intercourse and its use
  • the transaction volume is the available transaction volume that has not been used before by the message and must be used when the transaction volume is used. Sexual intercourse You can use it or you can not use it according to your needs.
  • the message freshness rule of BA or VO is that the axiomatic volume is fresh, so the message from the amount of sexual intercourse is also fresh, so as long as the AC and the amount of sexual intercourse and its usage are the same, the integrity and freshness of the message and the unique information of the message can be Exchange the same message as long as you use a different amount of sexual intercourse can get different messages AC can be fresh and unique. Different messages use the same transaction volume. As long as the transaction message is valid, the integrity, freshness, and uniqueness of the message can be used.
  • Yu identity usually requires multiple information exchanges to ensure the simultaneous use of a sex. Synchronization is required for identity because there may be an interruption in Xia and other reasons, so that the output or the message is not available, but it may intercept the misappropriation.
  • multiple information exchanges, information exchange message directions, and mode messages all use a different amount of sexual intercourse.
  • the amount of intercourse can be used synchronously. Because the amount of sexual intercourse is relative to the use of the function, you can also use the same
  • the amount of intercourse information exchange uses different gods. The amount of intercourse is different from that of different ones. Functions are different, no matter how much function can be divided into functions and input and output functions, it can be regarded as a black box of processing. It is indefinite.
  • AAC uses the value of the message method
  • AC uses the method of sexual intercourse
  • the same must have the same amount of phase.
  • the system must have phase synchronization. If you need a specific one, you usually need a trusted third. To receive the received message, you must use the same comparison in the difference garden, but the comparison is not unique and the requirements are stronger.
  • the sexual intercourse volume does not use the system, but the requirement is to update the phase before use to save the intercourse volume and its use. The message must be compared with the intercourse volume. The use of intercourse volume must be no longer compatible with the intercourse volume. Identity sexual intercourse must also be used in reverse synchronization. Multiple interchanges or multiple shared interchanges can be used.
  • the party that holds the amount of sexual intercourse is a predictable amount of intercourse. The party must use the amount of sexual intercourse and the message and any third party who does not know the message that cannot be generated.
  • the amount of sexual intercourse that has been used is unlikely to be effective, so aspects can effectively prevent and news.
  • each communication can have a set of sequences. It can only be used in communication. Even if it is born in communication, it can only be used in an orderly manner. No, but it is still possible to use it again. If the message and function are not communicated, it may be the same. The message cannot be fresh. That is, the message is not fresh but the message grouping sequence in the communication. The role of freshness in message packet communication must use different sequences, some communications use different, some use the same
  • the sexual intercourse volume can be used or not used, even if it is used, it may require some traffic volume, such as the current traffic volume.
  • Generating message AAC's algorithm function is usually a column function message. This must be sufficient and AC is directed. It can generate the same AC. It is impossible to AAC and the message line inverse. This can be obtained even if you consider the various types of functions.
  • Represents the message Represents F represents the nematic function of the message AC algorithm function F has the following
  • the AC obtained by the k-function F algorithm has that the distribution of and AAC is uniform
  • AC algorithm function may exist, some people may not need to know, only analyze the past news, history teaching, new news and news.
  • the enhanced resistance analysis can be used together with the message placed at the beginning and end of the message or the generated message can also be used as the message or transaction volume. Because the amount of sexual intercourse has a fresh resistance analysis method also has a very big effect. Only the amount of sexual intercourse used can be new news.
  • the function of the sheep column is the function of F and F2.
  • the message of the force is V.
  • the V is the amount of sexual intercourse.
  • the position of each element represents the order of the arrangement.
  • the algorithm of the message can be as follows
  • the beneficial effect of this is that the use of sexual intercourse can be, convenient, effectively the integrity and freshness of the message and the uniqueness of the message, and can effectively prevent the simultaneous use of secure sexual intercourse in many ways can effectively identify and enhance the identity and Security makes many original ones.
  • the common mode of sexual intercourse uses an integer greater than that only needs to save the available volume, that is, the smallest available integer 1 for mercury preservation.
  • Integer Interchangeable Quantity Take the smallest available integer integer 1 as the usable integer.
  • the sexual intercourse quantity of this scheme is usually integer order using the smallest available using the same one-sum function and it is no longer used when it is valid but more than one can share the same intercourse sexual intercourse quantity.
  • the volume can be used, but the volume cannot be 5 integer.
  • other security measures can be added. For example, only 10 messages can be used to solve other transactions before other transactions can be used.
  • V sexual intercourse volume represents D5 function
  • F represents special A digital function power trading message R power trading result message ACq ACa.
  • Conquest is a transaction system. Its function mainly has aspects
  • Information storage and sharing It saves the customer's information including the customer, the customer, the sharing and the sexual intercourse volume provision and the sexual volume volume customer shared information preservation.
  • Trading Accept customer transactions Submit each transaction system and the transaction results returned by each transaction system to form a message message generation return to the customer.
  • Transaction conquest saves each transaction information to provide customers.
  • Very transactional conquest internal security can be connected to each terminal provided, can also be connected to WEB to provide various uplink services, each can be connected to provide various services can be connected Pick up each to provide each transaction.
  • Conquest can be connected to each harmful power supply and all can use the same transaction.
  • Customer Hugh is the customer. Due to the fact that many customers need and need to exchange messages, it is impossible for customers to do it manually and borrowing the terminal is not convenient for safe use. However, because the algorithm does not require much information to be saved, it can be fully integrated. The customer must store the customer's information, including the customer's information, the transaction amount and the status of the completion of the transaction message, and the external communication can be connected to the information exchange, non-contact information exchange, the LCD and the keypad, and manual information exchange can facilitate the use of various information terminals. However, if you use to complete the customer rest function is also possible.
  • the transaction can be traded and the sum is a transaction information exchange.
  • the transaction can be completed by multi-transaction information exchange.
  • the following is a transaction information exchange mode of transaction summation
  • the transaction information usually includes the amount of the client transaction, transaction, etc.
  • K A OU T means the minimum available transaction volume on V
  • the amount of sexual intercourse Customer in error If the previous sexual intercourse is used to send the transaction message to the transaction system.
  • the trading system receives and returns her trading information. 4. Conquer all transaction results.
  • the transaction R S succeeds, the vigour 1 fails, 0 is still used, but the transaction amount used before the transaction must be used but different.
  • the client receives the transaction result message and generally obtains the transaction message comparison message.
  • the transaction amount of the previous transaction of the monk and its also can be traded, otherwise the message can be confirmed or
  • Jinte client A submits Jinte message Sexual intercourse usage statement 1 Conquer the transaction news.
  • customer A will hand over the transaction to customer B.
  • the transaction can be different.
  • the bank receives the transaction news message and uses the pre-A sexual intercourse volume 3 to exchange the transaction message with her.
  • the bank transaction receives the transaction message.
  • the transaction has been proposed. If necessary, the account of the special customer B will increase the security of the special customer R. The security of the special customer B can be used with the special money of the customer B, such as 24 hours.
  • the transaction is returned to conquest. Conquer the transaction message generated by the customer and receive the transaction message of customer B respectively.
  • the message in customer B can be used by the latest available sexual volume of customer B and the transaction volume update of the previous transaction of customer A and customer B respectively. Save the transaction and then save customer A And customers Messages and related messages return transactions.
  • the transaction message is as follows
  • C DE2 indicates that special transaction Y is a transaction pipeline, which can increase the transaction amount of A O T force and RES ET indicates.
  • the transaction When the transaction receives the transaction, it can send the transaction message and related message of the transaction or both can serve the devices to retrieve the transaction and related message.
  • the transaction conquers the same method, and the most transaction of the transactional volume can be traded.
  • the transaction uses the digital method of sexual intercourse to ensure the integrity and freshness of the transaction information, and even the identity of multiple parties. Make the transaction phased under the premise of ensuring the security of the transaction. Only the way or terminal used by Hugh Husband
  • the security of gold can guarantee the security and effect of each security instead of the security of gold.
  • the connection of B ee needs to use fire prevention to prevent the communication of each customer.
  • Security socket can be used to increase confidentiality and enhance safety.
  • the Golden Security WEB, the external fire protection, and the Golden Security used by the customers are only conquered by the devices and customers. Therefore, customers can also use A-Shang on any A-Shang as long as the customer's safety is safe even if it cannot be trusted.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A key digital authentication method, particularly a key digital authentication method which utilizes one-time variable when a message is authenticated by using a message authentication code. The one-time variable of the invention should be saved for its range and use state; the calculation of the message authentication code must be made by using the one-time variable together with the message; when the message is authenticated, not only the message authentication code but also the one-time variable used together and its use state must be authenticated; after the one-time variable is used, its use state must be marked and saved; for a specific key and an authentication function, the one-time variable is used only once to authenticate the same message effectively. The invention can accurately, simply, conveniently and effectively achieve an integrality and freshness of authenticating message, and exclusiveness of message authenticate by using one-time variable; and it can effectively achieve identity authentication by using one-time variable synchronously; besides simplifying authentication process and authentication protocol, it can increase the safety and make some complicated authentication application to achieve easily.

Description

使用一次性交量的 數字 方法 木領域  Digital method using one-time delivery
本方案 于信息 木安全領域 涉及信息安全 征服各 身份 、 信息完 整性和新鮮 。 背景 木  This solution involves information security in the field of information security to conquer all identities, information integrity and freshness. Background wood
身份 方法通常有身份 、 或 簽名等 方法通 常都是 使用人工 容易被仿造 以分辨 非且不方便信息的交 換 通常不用未 數字信息交換和 。  Identity methods usually have identities, or signatures. Methods are usually manual and can be easily counterfeited to distinguish between non-inconvenient and inconvenient exchanges of information. Usually, digital and digital information exchanges are not required.
前很多 常用到用戶 D和 口令 容易 而被假冒 身份。  Many of the previous users often used user D and their passwords easily to be spoofed.
數字信息的 通常使用消息 AC 或者林作消息 和 是利用 消息揉合 生成一介固定 度的 。 AC表示 于 算法的消息 。通信 都可以使用共享 消息 生成消息 AC 把消息和消息 AC 接收 接收 同 得到 AC 收到的 AC 比較 如果相同就可以  Digital information usually uses the message AC or Lin as the message and the message is combined to generate a fixed degree. AC represents the message of the algorithm. Communication can use shared messages to generate messages AC to compare the messages and messages AC receive and receive with the AC received by the AC if they are the same
消息完整性 接收方可 消息沒有被修改 。 Message Integrity The recipient may not modify the message.
2 肯定 生成 此消息 任何沒有 的第三 不可能生成 的 A 2 Definitely generate this message Anything that doesn't have the third impossible to generate A
3 如果消息中含有序列 接收方可以相信消息順序是 的" 使用數字簽名也可以 消息的完整性。  3 If the message contains a sequence, the receiver can believe that the message sequence is "" The integrity of the message can also be achieved using digital signatures.
了防止消息 可以使用 同 或者使用 交量 附在消息中一起 接收 同 或 交量就可以 消息的新 鮮 同 也可 相信消息 自 的 即 保身份 。  In order to prevent the message can use the same or use the transaction attached to the message together to receive the same or the transaction can be the new message of the message, you can also believe the self-protected identity of the message.
使用 同 一般要求各 休的 同步 但 同 不和 休直接 任何一介 休 生的 同 都能 其他主休用來 消息的新鮮 。 不具有唯 它通常有 介有效的 只要它 于 有效 園內 休 都接受它的新鮮 。  The use of the same generally requires the synchronization of the rest, but not directly with any rest can be used by other masters to refresh the news. It is not only that it is usually effective, as long as it is effective in the garden, it will accept its freshness.
本 則是 休 生的 數值 使用 和消息一起生成消息 一介 休只能 它自己所 生的 消息的新鮮 。 本方案接近或相夫的 木 This It is the use of the value of the rest of the time and the message together to generate a message-Jiexiu can only be the freshness of the message that it produces. This program is close to or related to the wood
消息 AAC 消息 和 。  News AAC news and.
消息 是利用 把任意 度的消息輸入揉合而 固定 度的 或者林作消息 和。 參考文獻  The message is a fixed-degree or Lin-made message sum using arbitrary input of the message. references
1、 《 工程 指南》  1. "Engineering Guide"
作者 SeveB e Sephe Pa e  Author SeveB e Sephe Pa e
者 固 永彬 張振 李德全 等  Zhe Gu Yongbin Zhang Zhen Li Dequan et al
出版 大學出版  Publishing University Publishing
2、 《 羊 、 算法 C 》  2. "Sheep, Algorithm C"
作者 B ceSc ee  Author B ceSc ee
者 世忠 等  By Shi Zhong etc.
出版 械工並出版  Publishing and publishing
3、 《安全 》  3. "Safety"
作者 著  Author
出版 大學出版  Publishing University Publishing
4、 《阿 安全一 技木 》  4. "A safe one skill wood"
作者 王育民 銅著  Author Wang Yumin Tong Zhu
出版 大學出版社 內容  Publishing University Press Content
本 要解決的 木 主要是信息的安全 各 包括安全身份 、 信息 的完整性、 新 以及信息 的唯一 。  The main problem to be solved is the security of information, including security identity, integrity of information, newness and uniqueness of information.
前在信息安全領域中通常使用的數字信息 方法主要有 消息 AC或 AC 或數字簽名。 方法都能莫 消息的完整性 但 消息的新鮮 和 消息者的身份 通常都 需要 合 或 防止 者 消息 。但 同 需要 同同步 而且不 各唯一 然 同 的作用不但可以 消息的新鮮 而且可 消息的特定 同性 而 只能由 休 才能 各 作用 休只能 自己所 生的 消息的新鮮 。 同 和 值方 法都可 消息的新鮮 但需要在 中增加通信 或者需要耗費 更多的 且 以 唯一 使消息 不容易 。 The digital information methods commonly used in the field of information security are mainly messages AC or AC or digital signatures. The method can not understand the integrity of the message but The freshness of the message and the identity of the informant usually need to combine or prevent the message. But the need for the same synchronization and not the only unique role can not only the freshness of the message but also the specific homogeneity of the message, and only by the rest can each effect only the freshness of the messages that they produce. The same sum value method can make the message fresh but needs to increase communication in it or it needs to consume more and make the message not easy only.
本 的 木方案是在 的 使用 通常使用共享 也可 以使用公 方法 和檢驗消息 消息逆行 同 使用 性交量。 性交量 是指交量 于某一 的 和 的 函數 只用來有效 同 的信息 此 不再使用 消息 。在 和 函數 性交量在使用前需要保存可使用的交量及其使用狀 。 方同 共享 性交量 但共享 性交量 共享 不同 共享 胡必須 方同 秘密保存共享 性交量 性交量需要 使用狀 一起保存 其 可 使用 形式 只要保存交量就是可用的。所以 性交量的保存方 式可以是一一保存 也可以只保存可用交量的 可以是 的交量 也可以 是一定 園內的序數 端的情況是 不 行保存 其 是所有可能的交 量。例如一 性交量 是大于 100的自然數 園內的交量都是可用的 那 就保存 101就可以了。交量本身可以不 秘密她 也就是 交量 可以是第三者 得到的。 的 方可以有各自不同使用的一 性交量 某一介 內的交量 一方只用 生成消息 另一方只使用未  This wooden scheme is usually used in the use of sharing, you can also use the public method and check the message message retrograde with the use of sexual intercourse. Sexual intercourse means that the function of intercourse with a certain sum is only used for the same information, so the message is no longer used. Before using the and function sexual intercourse, it is necessary to save the available intercourse and its usage status. Fang Tong shares sexual intercourse but shared sexual intercourse sharing different sharing must share Fang Tong secretly save shared sexual intercourse sexual intercourse volume needs to be used together to save its useable form as long as the preservation of sexual intercourse is available. Therefore, the way to save sexual intercourse can be one by one, or only the available intercourse can be saved, or can be the ordinal end of a certain garden. It is not possible to save it. It is all possible intercourse. For example, if the amount of sexual intercourse is a natural number greater than 100, the amount of sexual intercourse in the garden is all available, so just save 101. The amount of payment itself can not be secret, that is, the amount of payment can be obtained by a third party. The party can have a different amount of sexual intercourse used in a certain medium, one party only uses to generate messages, the other party uses only unused
而另一 園內的交量則剛好相反。 的 也可以共同使用相同的一 性交量 只要 性交量 有被 使用即可。  The amount of traffic in the other park is just the opposite. The same sexual intercourse can also be used together as long as the sexual intercourse is used.
在 必需使用 性交量 需要 的消息一起使用 函數 消息 AC 消息 在使用 性交量用作消息 需要將 交量 已使用 接收 接收到消息 包括 性交量 和 消息 AC 在 消息 AC是否 的同 也必須 性交量及其使用狀 交量是 消息 以前 沒有用 的可用交量 且在 必須把 交量的使用狀 使用。 性交量可 可 以 使用 也可以不按 使用 可以 休 用的需要 。 BA 或 VO 的消息新鮮性規則公理 性交量是新鮮的 所以 性 交量 起 的消息也是新鮮的 故只要同 消息 AC和 性交 量及其使用狀 的 就可以 消息的完整性和新鮮 以及消息 的唯 一 即使信息交換 相同的消息 只要使用不同的一 性交量 就可以得到 不同的消息 AC 可以 消息的 具有新鮮 和唯一 。 不 同的消息使用同一交量 只要交量 消息是有效 都可以 消息 的完整性、 新鮮 和 的唯一 。 Use the message required to use the sexual intercourse together with the function message AC. The message used in the sexual intercourse is used as the message. The received traffic must be used. The received message includes the sexual intercourse and the message AC. Whether the message AC is the same also must be sexual intercourse and its use The transaction volume is the available transaction volume that has not been used before by the message and must be used when the transaction volume is used. Sexual intercourse You can use it or you can not use it according to your needs. The message freshness rule of BA or VO is that the axiomatic volume is fresh, so the message from the amount of sexual intercourse is also fresh, so as long as the AC and the amount of sexual intercourse and its usage are the same, the integrity and freshness of the message and the unique information of the message can be Exchange the same message as long as you use a different amount of sexual intercourse can get different messages AC can be fresh and unique. Different messages use the same transaction volume. As long as the transaction message is valid, the integrity, freshness, and uniqueness of the message can be used.
如果 同步使用 性交量 即 和接收 都能 定是最近使 用的一 性交量 那 也就可以 的身份 。  If you can use sexual intercourse synchronously and both can be regarded as the most recently used sexual intercourse, then you can be the identity.
于身份 通常需要多 信息交換 以 保一 性交量同步使用。 需要 同步才能 身份 是因 在 中可能由于 哉 等原因存在 中斷 使得 出的 或 消息沒有 但即可能 截取盜用的情況。在一 介信息事各中 多 信息交換 信息交換 消息 向、 方式 消息的 都使用一介不同的一 性交量 可以 交量的同步使用 由于 性交量是相 于相 的 和 函數的使用 也可以使用多 共 同使用同一介 性交量 信息交換使用不同的 神情況下 性 交量有多 相 于不同的 有不同的使用狀 。 函數是相 不 的 不管 函數可以分力多少 于函數 于輸入和輸出 函數 休上都可以 看作是一介 加工的黑盒子 休上是相 定不 的。 在 教不 的情況下 只要 和 性交量是唯一的組合 不管 的消息是 否相同 其消息 都 不相同 可以 消息的完整性和新鮮 以及消息 的唯一 。 多 信息交換 性交量同步 也就可 通信 的身份 由于消息 不 各信息保密功能 所以在消息 中攻 者 可 消息的內容 甚至可 阻隔消息的 但 者不可能修改消息、替 換消息、仿造消息或 消息。如果需要通信 程保密 必須這 其他加 方 法。  Yu identity usually requires multiple information exchanges to ensure the simultaneous use of a sex. Synchronization is required for identity because there may be an interruption in Xia and other reasons, so that the output or the message is not available, but it may intercept the misappropriation. In an information event, multiple information exchanges, information exchange message directions, and mode messages all use a different amount of sexual intercourse. The amount of intercourse can be used synchronously. Because the amount of sexual intercourse is relative to the use of the function, you can also use the same The amount of intercourse information exchange uses different gods. The amount of intercourse is different from that of different ones. Functions are different, no matter how much function can be divided into functions and input and output functions, it can be regarded as a black box of processing. It is indefinite. In the case of not being taught, as long as and the amount of sexual intercourse is the only combination, regardless of whether the message is the same, the message is not the same. The integrity and freshness of the message and the uniqueness of the message. Multi-information exchange, inter-synchronization, and communication identity. Because the message does not have the function of confidentiality of information, the attacker can use the content of the message or even block the message, but it is impossible to modify the message, replace the message, fake the message or the message. If the confidentiality of the communication process is required, this other addition method is necessary.
假定 共享 AC 消息 輸入消息 函數 V 性交量 V T 同 那 消息 可以表示如下 般的消息 方法Assume that the shared AC message input message function V sexual intercourse volume VT with that message can be expressed as follows Common message method
AAC 使用 值的消息 方法 AAC uses the value of the message method
AC V 使用 的消息 方法 Message method used by AC V
AC 使用 性交量的消息 方法 AC uses the method of sexual intercourse
AC V 如果這 函數 是 算法函數h使用 性交量的消息 方 法力 AC V if this function is an algorithm function h uses the message method of sexual intercourse
AC K W  AC K W
以上 方法來看 使用 性交量 使用 同 和 十分相似 但 方法在它們的 程其 有很大的差別。  The above methods show that the use of sexual intercourse is very similar to and, but the methods are very different in their processes.
使用 性交量 同 的因  Use the same amount of sexual intercourse
同 必須 同交量相 所 的 必須有相 的 系統 同步 如果需要 特定的 通常 需要可信的第三 。接 收 收到 的消息 必須使用 同 比較 在差別 園內 可 其比較沒有唯一 而且要求 的 較強。 性交量不使用 系統 但要求在使用前 是更新相 保存好交量及其 使用 消息須 交量唯一 比較 交量的 使用 必須 和 交量的 力不再可 。 身份 性交量也必須逆行同步使 用 可以 使用多 交量 或者多 共享使用交量 。  The same must have the same amount of phase. The system must have phase synchronization. If you need a specific one, you usually need a trusted third. To receive the received message, you must use the same comparison in the difference garden, but the comparison is not unique and the requirements are stronger. The sexual intercourse volume does not use the system, but the requirement is to update the phase before use to save the intercourse volume and its use. The message must be compared with the intercourse volume. The use of intercourse volume must be no longer compatible with the intercourse volume. Identity sexual intercourse must also be used in reverse synchronization. Multiple interchanges or multiple shared interchanges can be used.
使用 性交量 值的  Use sexual intercourse
是 生的 使用 和消息 起生成消息 只能 自己 生的 消息的新 所以 的 如果 相互 就必須各自 的 。 方先  It is the use of the raw and the message from which the message can only be generated by the new one, so if the messages are mutual, they must be separate. Fang Xian
更有利于 施主 特別是中同人 者只要 的消 息 就可 得到 返回的 征數 而且由于沒有 行使用保存 可能 惡意 使用 存在 的可能。 性交量在 的 行保存 是可預知的交量 的一方必須使用 性交量和消息同 生成消息 不知道 的任何第三者不可能生成 的消息 也就 以 It is more conducive to the donor, especially the Chinese fans, to get the returned levy as long as the message, and because there is no use to save Possibility of malicious use. The party that holds the amount of sexual intercourse is a predictable amount of intercourse. The party must use the amount of sexual intercourse and the message and any third party who does not know the message that cannot be generated.
已使用 的 性交量又不可能得到有效的 所以 方面可以有效防止 和消息 。  The amount of sexual intercourse that has been used is unlikely to be effective, so aspects can effectively prevent and news.
使用 性交量 通信 使用的消息 的  Use of sexual communication
前在很多的通信中都使用消息分組通信 每一介 都使用消息 消息 且 消息的分 一起 在通信的 也必須保存已 收到的消息分組 以 消息 。但消息 銅 性交量有很大的不同 是 于 通信 每一介通信 可以有一套 序列 在通信 中只能 使用 即使在通信 中 生了 仍只能 通信 有序 行使用 不可 也不可作廢 而 于不同的通信 即使 沒有 但 使用仍然可能重新 如 果 、消息和 函數都沒有 通信 有可能相同 就不能 消息的新鮮 也就是 不是 了 消息的新鮮 而 而是 了 通信 中的消息分組 順序而 在有些通信 由于 通信 的改 也同 到了新鮮性的作用 消息 在消息分組通信 必須使用不同的 序列 有些通信 使用不相同 有些使用相同  In the past, in many communications, message group communication was used, and each agent used a message message, and the message was divided together. In the communication, the received message group must also be saved as a message. But the amount of message copper sexual intercourse is very different. In communication, each communication can have a set of sequences. It can only be used in communication. Even if it is born in communication, it can only be used in an orderly manner. No, but it is still possible to use it again. If the message and function are not communicated, it may be the same. The message cannot be fresh. That is, the message is not fresh but the message grouping sequence in the communication. The role of freshness in message packet communication must use different sequences, some communications use different, some use the same
相同共用 不同序列的 有可能交叉相同 則相 于 汞 就是 了 之 通信中消息 只能 通信 裡的 使用 它是 于通信 的。 性交量是 于 使用的 和 函數 函數通常固定不 如 有 可以看作是于函數 性交量就可以重新  The same common and different sequences may cross the same, so the message is only the same as mercury. It can only be used in communication. It is for communication. The amount of sexual intercourse is for use and the function is usually fixed as well as can be seen as the function
及狀 性交量可 使用 也可以不按 使用 即使是按 使用 也可以 需要 某些交量 比如 現有 交量的 在受到  And the sexual intercourse volume can be used or not used, even if it is used, it may require some traffic volume, such as the current traffic volume.
可 把 交量 以 保安全性 在 消息 不但要 消息 必須 性交量及其使用狀 你可以使用不同的一 同一消息 多 性交量也可以有多 使用狀 多 同 共 用同一介 性交量 性交量就存在多 使用狀 的 方可 使用不同的一 性交量序列 也可以使用相同的一 性交量序列 使用相同的 交量序列 也可以不規定一 性交量 由那一方先使用 只要沒有 使用就 可以了。 You can put the amount of traffic to ensure the safety. In the message, not only the message must have the amount of sexual intercourse and its usage status. You can use different one. The same message. You can use different sexual intercourse sequences or you can use the same sexual intercourse sequence to use the same The traffic sequence may not specify which sex is used first, as long as it is not used.
使用 性交量的 方法安全性分析。  Safety analysis using the method of sexual intercourse.
1、 算法  1. Algorithm
生成消息 AAC的算法函數通常是 向 列函數 消息這 要有足 的 和 AC是 向的多 一夫 即多 可以生成相同的 AC 不可能 AAC和消息 行逆這 得 到 休 即使 考慮 函數各 型的 。 表示消 息 表示 F表示 于 的 向 列函數 消息 AC 的算法函數F 具有下  Generating message AAC's algorithm function is usually a column function message. This must be sufficient and AC is directed. It can generate the same AC. It is impossible to AAC and the message line inverse. This can be obtained even if you consider the various types of functions. Represents the message Represents F represents the nematic function of the message AC algorithm function F has the following
消息 很容易 AC F Message Easy AC F
2 哈定消息 、 消息 AC和算法F 不可能  2 Harding message, message AC and algorithm F are impossible
因 AC是多 一夫 函數是羊向的 不存在 這 。 3 已知消息 和Fk F F 在 上是不可行的 那 函數F是 碰撞自由的。 Because AC is more than one-of-a-kind, the function is directional, and it does not exist. 3 It is known that Fk and F F are not feasible on. That function F is collision free.
4 于 的函數F和 的 找到 不同的消息 使得 F F 在 上是不可行的 則函數F是 碰撞自由的。 5 函數具有足 的 和 使得 或消息每一位微小的改 都 在 AC中形成巨大的 化 得到完全不同的 。  4 The functions F and of find different messages so that F F is not feasible on, then function F is collision free. 5 The function has a sufficient sum, so that every small change in or message will form a huge change in AC to be completely different.
即使 保安全性 最好使用 安全或 安全的函數 算法 如 D5算法等等。  Even if it is safe, it is better to use safe or safe function algorithms such as D5 algorithm and so on.
2、 拳法  2. Boxing
上 由于 度的有限 只要收集有足 的 征數 通 拳法 可 得到使用的 。  Due to the limited degree, as long as there are enough signs to collect the fist, it can be used.
己知 F、 消息 和 AC 假定 AC的  Known F, News and AC Assumed AC
的 k 函數F算法得到的 AC具有 也就是 和 AAC的分布是均勻的 那 The AC obtained by the k-function F algorithm has that the distribution of and AAC is uniform
A F  A F
所有2 就可以得到大 k" 使得以上等式成立。 得到的可能 同 方法 2 AC2 可得到 2" 同 到 < 在 就可 以得到唯一的 All 2 can get big k " Makes the above equation true. It is possible to get the same as the method 2 AC2 can get 2 "same to <<you can get the only
抵抗 的最好方法就是增大 的 的  The best way to resist is to increase
度的 呈現出指數級 使得在 下使用 法不可能 完成 。  Degrees show an exponential level, making it impossible to use the next method.
如果每秒 的 10 假定 者可能使用大型 或者使用分布 方法 那 的 128 大 2 0 3 1028  If 10 presupposes per second may use large size or use distribution method, then 128 large 2 0 3 1028
在 中是不可能 生的。 但考慮到 定律 大 5 能力就可能 10倍 所以 比較保守 的方法未 的 比如 如果使用 128 在 前是安全的 那 使用 1024 的 甚至更 在可 的將 是 定期更新 可 使得 者 以收集足 也可以使 者只能使用有限的 同 可以在一定程度上防止 。  It is impossible to live in. But considering that the law is 5 times larger, the ability may be 10 times, so the more conservative method is not used. For example, if 128 is safe in the past, then 1024 or even more is possible. It will be updated regularly. The ability to use limited ones can be prevented to a certain extent.
、 分析法 , Analysis
由于 AC的算法函數可能存在某些 者有可能不用知道 只分析以往的消息 史教 就可能 新的消息及消息 。 增強抵抗分析 可使用 同 放在消息的首尾一起 消息 或者 生成的消息 再 合 消息 也 可以 消息或交量 使用。 由于 性交量具有新鮮 抵抗分析法 也具有非常大的作用 只有使用 的一 性交量才能 新的消息。  Because AC algorithm function may exist, some people may not need to know, only analyze the past news, history teaching, new news and news. The enhanced resistance analysis can be used together with the message placed at the beginning and end of the message or the generated message can also be used as the message or transaction volume. Because the amount of sexual intercourse has a fresh resistance analysis method also has a very big effect. Only the amount of sexual intercourse used can be new news.
表示羊向 列函數 表示 F 、 F2力密 函數 力交 的 表示消息 V 表示 性交量 各 要素的位 置代表這 的排列順序 則消息 的 算法可以如下所示 The function of the sheep column is the function of F and F2. The message of the force is V. The V is the amount of sexual intercourse. The position of each element represents the order of the arrangement. The algorithm of the message can be as follows
F V K2 F2 V 或 F V K2 F2 V or
F V ) K2 F2 V ) 消息 方法如下FV) K2 F2 V) The message method is as follows
AC V 或 AC V or
AAC V 或 AAC V or
AC V 2 或 AC V 2 or
AC V 或 AC V or
AC ( V 或 AC (V or
AC 2 H V  AC 2 H V
以上 消息 方法都有助增強安全性。  The above message methods all help to enhance security.
4、 消息  4. News
由于消息 使用 性交量 消息一起 生成 而 性交量 于相同的 和 函數只用 有效 相同消息 故 者不 可能成功宴 。  Since the messages are generated together with the intercourse messages and the intercourse messages are the same and the function only uses the same valid messages, it is not possible to succeed.
本 的有益效果在于 使用 性交量 可以 、 、 方便、有效地 消息的完整性和新鮮 以及消息 的唯一 而且可 以在多方面有效地防止安全性 性交量的同步使用 可以有效 現 身份 可以 化 和 增強 和 的安全性 使得很多 原來 的 得 。 The beneficial effect of this is that the use of sexual intercourse can be, convenient, effectively the integrity and freshness of the message and the uniqueness of the message, and can effectively prevent the simultaneous use of secure sexual intercourse in many ways can effectively identify and enhance the identity and Security makes many original ones.
休 方式 Hugh way
交易安全 方案  Transaction Security Solution
在 方案中 我們 又 是 是可信 的 方。 並各往 的 並或 人作力客戶 。客戶在 相 帳戶 客戶的身份 及信息 提供相 各 的客戶之同可以 相互 身份及行力。  We are a credible party in the plan. And always go to and work hard for customers. The customer's identity and information in the customer account provide the same identity and performance for each customer.
首先 又 模式。 使用 1024 由  First and again mode. Use 1024 by
于 生成 具有 況是 通 客戶身份 共享 秘密保存。 其 又一 性交量模式。 性交量 共用的模式 使用大于 的 整數 只需保存可用交量 即 汞保存最小可用整數1 使用 取出 可用整數交量 將 最小可用整數 取出的整數 1 以 可用整數 使用 汞 前 性交量的使用狀 。本方案的一 性交量通常 整數順 序使用 最小可用 使用 相 同一 和 函數 在 了一 有 效 就不再 使用 但多 可共用同一介 性交量 性 交量有多 使用狀 性交量可以 一介 性交量受到 In the case of generating a condition, it is shared and kept secret by the customer's identity. Its another sexual intercourse model. The common mode of sexual intercourse uses an integer greater than that only needs to save the available volume, that is, the smallest available integer 1 for mercury preservation. Integer Interchangeable Quantity Take the smallest available integer integer 1 as the usable integer. The sexual intercourse quantity of this scheme is usually integer order using the smallest available using the same one-sum function and it is no longer used when it is valid but more than one can share the same intercourse sexual intercourse quantity.
即如果核交量用來 了 相 的消息 都不正 則 交量 性交量也可 使用 但 同 不能 5 整數。 此外 可 增加其他安全措施 比如在受到 10吹 只有使用 生 交量 的消息 行解 才能 行使用其他交易 且  That is to say, if the core volume is not correct, then the volume can be used, but the volume cannot be 5 integer. In addition, other security measures can be added. For example, only 10 messages can be used to solve other transactions before other transactions can be used.
行一 操作。 Line one operation.
生成消息 函數及這 模式。首先使用 性交量將  Generate message function and this pattern. First use the amount of sexual intercourse will
不同的 得到 和 2 方法可以是使用不同的交量 、 Vb和 性交 量V 使用 D5函數 混淆 8 合井 可得到新的1024 然 、 使用 D5函數 性交量及交易消息生成128 的消息 方便使用 再將消息各 8 一字 除以 10 余 得到 16 阿拉伯 字弓 可以作力 的消息 消息 的字符 是阿拉伯數字。 同 以 、 消息 似的這 得到的 16 阿拉伯數字弓 作力 果的 消息 。 如果需要多 、 Different ways to get and 2 can be to use different delivery volume, Vb and sexual intercourse volume V Use the D5 function to confuse 8 Hejing to get a new 1024. Divide each 8 word by more than 10 to get 16 Arabic word bow. The characters of the message message are Arabic numerals. Similar to the news, the 16 Arabic numerals obtained the effect of the bow. If you need more,
可以 似地通 得到多 方便 于有 上信息交換 的交易 消息 8 阿拉伯數字 可同 交易安全。 休算法表示如下You can get the transaction information that is more convenient for information exchange. 8 Arabic numerals can be used for transaction security. The Hugh algorithm is expressed as follows
024 、 力交 的 1024 和K2 到 8 中同 、 Vb力密 交量 128 V 性交量 表 示 D5函數 F表示特 阿 數字函數 力交易消息 R力交易結果 消息 ACq ACa 。 024, the strength of 1024 and K2 to 8 of the same, Vb force close exchange volume 128 V sexual intercourse volume represents D5 function F represents special A digital function power trading message R power trading result message ACq ACa.
(KV Va (KV Va
2 (KV ) 18 KV1 17 + 2+ 1 + 14+ 5+ 16+ 17+ 18 "+"表示串接合井 同 2 (KV) 18 KV1 17 + 2+ 1 + 14+ 5+ 16+ 17+ 18 "+" means that the series connection is the same
K2 KV Vb K2 KV Vb
22 KV K2 28 V 7 22 KV K2 28 V 7
1 2+ + 4+ 5+ 26 7+ 28 +"表示串接合井 AC V ACq F AC 1 2+ + 4+ 5+ 26 7+ 28 + "means series well AC V ACq F AC
AC2 KV R 2 AC2 KV R 2
ACa F AC2  ACa F AC2
行及客戶 休 Line and customer
休是 交易 征服 是 介交易 系統。 其功能主要有 方面  Hugh is a transaction. Conquest is a transaction system. Its function mainly has aspects
1、 信息存儲和共享。 它保存客戶的信息 包括客戶 、 客戶 、 共 享 以及 的一 性交量 提供 和 性交量 客戶 共享 信息 保存。 2、 交易 。 接受客戶交易 提交 行各交易系統她 各交易系統返回的她理結果形成 消息 消息生成 返回 客戶。  1. Information storage and sharing. It saves the customer's information including the customer, the customer, the sharing and the sexual intercourse volume provision and the sexual volume volume customer shared information preservation. 2. Trading. Accept customer transactions Submit each transaction system and the transaction results returned by each transaction system to form a message message generation return to the customer.
3、 保存交易信息以 。 交易 征服各 保存各 交易信息以提供 客戶 。 很 交易 征服 可 內部安全阿 接到各 提供各 終端 也可以 自 接到WEB 各 以提供各 阿上 行 服各 可 接到 接 提供各 行服各 可 連接到 接 各 以提供各 交易 各。 征服 可以連接到各神通 接 提供相 的 且所有的 各可以使用相同的交易 。 3. Save transaction information. Transaction conquest saves each transaction information to provide customers. Very transactional conquest, internal security can be connected to each terminal provided, can also be connected to WEB to provide various uplink services, each can be connected to provide various services can be connected Pick up each to provide each transaction. Conquest can be connected to each supernatural power supply and all can use the same transaction.
客戶 休是客戶 。 由于 很 客戶 以 而且需要 交 易消息 消息 客戶不可能 人工完成 而借用 終端一方面不移 安全 使用 也十分不便。 但因 算法 所需保存信息 不大 故完全可 以集成到 上。客戶 必須存儲客戶的信息 包括客戶 、 、 性 交量及狀 完成交易消息的消息 的 及 外界通信可以 方式 接 信息交換 非接 信息交換 有通 液晶 和小鍵盤 行人工信息交換 可以方便使用各 信息終端。 然 如果你 使用 來完成客戶 休功能也是可以的。  Customer Hugh is the customer. Due to the fact that many customers need and need to exchange messages, it is impossible for customers to do it manually and borrowing the terminal is not convenient for safe use. However, because the algorithm does not require much information to be saved, it can be fully integrated. The customer must store the customer's information, including the customer's information, the transaction amount and the status of the completion of the transaction message, and the external communication can be connected to the information exchange, non-contact information exchange, the LCD and the keypad, and manual information exchange can facilitate the use of various information terminals. However, if you use to complete the customer rest function is also possible.
交易  Transaction
的交易 可以 交易 求和 是一 交易信息交換 。 的交易可以 多 交易信息交換 來完成。 以下是一 交易 求和 的交易信息交換 模式  The transaction can be traded and the sum is a transaction information exchange. The transaction can be completed by multi-transaction information exchange. The following is a transaction information exchange mode of transaction summation
1、 客戶 交易 。 交易信息通常包括 客戶 交易 交易 、 等等 金額。  1. Customer transactions. The transaction information usually includes the amount of the client transaction, transaction, etc.
分別 K A OU T表示上 V 最小可用 性交量 交易消息 力交 消息 函數 則 K A OU T means the minimum available transaction volume on V
C DE+KEY+A 』T C DE + KEY + A 』T
AC V 1)  AC V 1)
在完成交易消息 前 性交量的使用狀 將客 戶 、 V M 和 A 征服各 。  Before the completion of the transaction message, the use of sexual intercourse conquers customers, V M and A.
2、 銀行 征服各 交易消息。 征服各 在接收到交易消息 先 性交量是否可用 如不可用 則返回客戶最新可用的一 性交量 以 同步 交量正常可用 再 同 得到交易消息  2. Banks conquer all transaction news. Conquer each transaction before receiving the transaction message. If the transaction volume is available, if it is not available, return the customer's latest available transaction volume to the synchronous transaction volume is normally available.
客戶 的 比較 如果不相同 則 尚前 性交量的元 出錯 客戶。 如果 則 前 性交量力 使用 將交易消息送到 交易系統她 。 If the customer's comparison is not the same, the amount of sexual intercourse Customer in error. If the previous sexual intercourse is used to send the transaction message to the transaction system.
3、 交易系統接收和她 交易信息 返回 。 4、 征服各 交易結果 。 交易 R S 成功 志力 1 失敗 0 仍使用 前交易的一 性交量 使用 必須 但使 用的 不同。 3. The trading system receives and returns her trading information. 4. Conquer all transaction results. The transaction R S succeeds, the vigour 1 fails, 0 is still used, but the transaction amount used before the transaction must be used but different.
2 C DE+ Y+A T+R S T 2 C DE + Y + A T + R S T
AC2 V 2 2  AC2 V 2 2
征服各 將交易 R S T 及結果消息 AC2 返 回 客戶 其他信息相同可以不必 。 5、 客戶 交易結果。  Conquer each and return the transaction R S T and the result message AC2 to the customer. Other information is not necessary. 5. Customer transaction results.
客戶 接收到交易結果消息 通 同 得到交易 消息 比較 消息 和尚前交易的一 性交量及其 也 則可 交易 否則可以肯定 消息 更改或  The client receives the transaction result message and generally obtains the transaction message comparison message. The transaction amount of the previous transaction of the monk and its also can be traded, otherwise the message can be confirmed or
需要重新取回結果。 完成 性交量相 使用狀 。 上 是 介通用的交易 客戶A 客戶B的特 。 客戶 A特 100 到客戶B 。 保交易 性交量的新鮮 和同 步使用 又特 分力 交易信息交換 似 可得到4 新 K、 、  The results need to be retrieved again. Complete the sexual intercourse phase. The above is the special feature of the general trading client A and client B. Customer A special 100 to customer B. Guarantee the freshness and synchronization of the amount of sexual intercourse, and use the special force to exchange the transaction information. 4 new K 、、、
1、 金特出 客戶 A 提交 金特 消息 性交量使 用狀 1 將交易消息 征服各 。交易提出消息  1. Jinte client A submits Jinte message Sexual intercourse usage statement 1 Conquer the transaction news. Transaction offer message
如下 as follows
AC V  AC V
2、 征服 同 消息 客戶 A的特 消息 客 戶 A 前 性交量使用狀 1 然 特 特 交易 各 。  2. Conquer the same message Special Message of Client A Before Client A Sexual Intercourse Usage Status 1 Special transaction.
3、 特 交易 相夫 及 金 完成 金特出 將 返 回 征服 。 此 金 沒有特 客戶 B的 只是 到 科目。 3. The special transaction will be returned to the conquest. There is no special customer B for this gold Subjects.
、 很 征服各 接收到 金特出 金特出 消息 , Very conquered each received Jinte out Jinte out news
前 性交量使用狀 2 將 金特出 消息返回 客戶A。 提出 消息 如下 Former Sexual Intercourse Usage Statement 2 Return Jin Te out the message to customer A. The message is as follows
AAC2 V 2 2  AAC2 V 2 2
、 客戶 A使用相同 以 提交 金特 的 如成功 則 交易 似 再 交易 消息 前 性交量使 用狀 3。 交易 消息 如下3. Customer A uses the same to submit Gint's. If it succeeds, the transaction seems to be before the transaction message. The transaction message is as follows
AC3 V 3)  AC3 V 3)
、 交易 可 多 方式 。 防止特 出現人力 如果 客戶A在交易 同 提交客戶B的戶名 例如阿上交易、 交易或人工服各中心等等 那 客戶可 直接將特 消息和 客戶名林一起 中心 交易 各 在 交 易貸金特 特 戶名 或者交易 是通 非接 方 式 自劫輸入 使用自劫或半自劫方式 消息 , There are many ways to trade. Prevent special manpower. If customer A is in the transaction and submits customer B's account name, such as A Shang transaction, transaction or manual service center, etc., then the customer can directly trade the special message with the customer's name center for each transaction. The name or transaction is self-robbing in a non-connected way, using self-robbing or semi-robbing message
神情況不合出現人力汞 也可以直接 送到  If the situation is different, human mercury can be sent directly
否則 客戶A 將交易 的消息 交給客戶B 必須由客戶  Otherwise, customer A will hand over the transaction to customer B.
交易 可以 不合特錯 。  The transaction can be different.
、 銀行 收到交易 消息 消息 同 A 前 性交量使用狀 3 將交易 消息 交易 各 她 。 、 銀行交易 接收交易 消息 筆交易已提出 如果需要則 特 客戶B的 戶名 然 將 金特 客戶R的 增加安 全性 可以同 客戶 B 的相 特 金 比如在 24小 才可 使用。 交易完成 將交易 返回 征服 。 、 征服 接收到交易 生成交易 消息 分別 客戶 客戶B的交易 消息 在 客戶B的消息 可以 客 戶B最新可用的 性交量使用 且分別 客戶A和客戶B 前交易 的一 性交量 更新 將交易 保存 然 將客戶 A 及客戶 的 消息 及相 的消息 返回 交易 。 交易 消息 如下 2. The bank receives the transaction news message and uses the pre-A sexual intercourse volume 3 to exchange the transaction message with her. The bank transaction receives the transaction message. The transaction has been proposed. If necessary, the account of the special customer B will increase the security of the special customer R. The security of the special customer B can be used with the special money of the customer B, such as 24 hours. After the transaction is completed, the transaction is returned to conquest. Conquer the transaction message generated by the customer and receive the transaction message of customer B respectively. The message in customer B can be used by the latest available sexual volume of customer B and the transaction volume update of the previous transaction of customer A and customer B respectively. Save the transaction and then save customer A And customers Messages and related messages return transactions. The transaction message is as follows
客戶A交易 消息 AC4 V 4 4 客戶 交易 消息 Customer A transaction message AC4 V 4 4 Customer transaction message
C DE2表示特 交易 Y是 筆交易流水 可以增加 A O T力交易金額 RES ET表示 。 C DE2 indicates that special transaction Y is a transaction pipeline, which can increase the transaction amount of A O T force and RES ET indicates.
R DE2+ Y+A q + S T R DE2 + Y + A q + S T
AC2 V1 2  AC2 V1 2
客戶B直接向 行服 提出清 Customer B directly submits the clearance
DE2+K Y+A qT DE2 + K Y + A qT
AC V  AC V
10、 交易 接收到交易 可以將交易 的交易 消 息及相 消息 或者 都可以 行服各器重新取回 交易 及相 消息 。 交易 征服各 同 方法 以 交易 性交量的最 交易 都 可以 交易 。  10. When the transaction receives the transaction, it can send the transaction message and related message of the transaction or both can serve the devices to retrieve the transaction and related message. The transaction conquers the same method, and the most transaction of the transactional volume can be traded.
有一益的效果 Has a beneficial effect
交易 使用 性交量的 數字 方法 可以 保交易信息 的完整的、 新鮮 通 多 可以 、 甚至多方 的身份 。 使得交易 在 保安全的前提下 相 化 其交 易的安全性只 的 休相夫 使用的 方式或 終端  The transaction uses the digital method of sexual intercourse to ensure the integrity and freshness of the transaction information, and even the identity of multiple parties. Make the transaction phased under the premise of ensuring the security of the transaction. Only the way or terminal used by Hugh Husband
就可以使用 的 高度的安全性和便利性。  It can be used with a high degree of safety and convenience.
使用本方案 阿上 e e 阿 使用的 行服各 可 將 征服各 WEB 器之同使用自 又 萬 比如 似 的  With this solution, you can use the same service as the web server you used to conquer the same WEB devices.
交易消息只能 自 又 外部 者就不可能入侵到 征服 而 交易消息必須得到 才能 任何不是 休的第三者 都不可能仿造或 交易消息 就可以 金的安全性 力保障 各安全 各的 和效果 而不是 金安全 在 B 各 e e 阿 的 接需要使用防火 防止各 各的 客戶的通信 可以使用安全 套接 增加保密 和增強安全性。 阿上 的 金安全 WEB 各 、外部阿防火 、 阿 及客戶所使用的 金安全只 休有夫 即 征服各器和客戶 有夫。所以客戶也可以在任意 一台 阿的 上使用阿上 只要 客戶 的 安全 即使 是不可以信任的 仍然可以 金的安全。 It is impossible for the outsider to invade the conquest only if the transaction message is only from the outsider and the transaction message must be obtained in order to any third party who is not a holiday It is impossible to counterfeit or trade messages. The security of gold can guarantee the security and effect of each security instead of the security of gold. The connection of B ee needs to use fire prevention to prevent the communication of each customer. Security socket can be used to increase confidentiality and enhance safety. The Golden Security WEB, the external fire protection, and the Golden Security used by the customers are only conquered by the devices and customers. Therefore, customers can also use A-Shang on any A-Shang as long as the customer's safety is safe even if it cannot be trusted.
由于本方案的消息 使用的字符 是阿拉伯數字 故客戶很容易通 阿 上 、 、 甚至人工服各中心等渠道 行各 交易 可以方便 各 交易 隨地的使用。而 和客戶的資金安全性 使用的各神通 系統 及渠道 。 由于使用相同 所 各 交易方式的交易 基本相同 在各 渠道的交易方式具有 似 于使用 而且 在 和 系統 其 可以通用 可以 大量 和 。  Because the characters used in the message of this solution are Arabic numerals, it is easy for customers to conduct various transactions through channels such as A, A, and even artificial service centers, which can facilitate the use of all transactions anywhere. And the magical power systems and channels used by customers' funds security. Since the transactions using the same transaction methods are basically the same, the transaction methods in each channel have similar use and they can be used in the system and can be used in large numbers.

Claims

要求 Claim
1、 數字 方法 其特 在于 1. The digital method is characterized by
使用 和 消息 消息 使用 性交量 性交量在使用前需要 定可使用的交量及其使用狀 消息 的 必須使用 性交量 消息一起 在 消息 不但要 消息 必須 同 使用的一 性交量及其使用狀  Use and Message Message Use Sexual Intercourse Before using sexual intercourse, you need to determine the amount of available intercourse and its usage status. The message must use the sexual intercourse quantity.
在使用 性交量 必須 和保存 使用狀  The amount of sexual intercourse must be used and saved
于 的 和 函數 性交量只用來有效 同 的消息 。  Yu's and functional sex are only used for the same message.
2、 要求 1 的 數字 方法 其特 在于 的一 性 交量由多 共同使用 具有多 使用狀 于每一介不同的 2. The digital method of Requirement 1 is characterized by the common use of the volume of sexuality, which has multiple uses, and is different for each medium.
性交量有不同的使用狀 性交量 于不同的 使用 相 的 消息。  The amount of sexual intercourse has different uses. The amount of sexual intercourse is different from the use of different messages.
PCT/CN2006/003276 2005-12-05 2006-12-05 A key digital authentication method using one-time variable WO2007065348A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNA2005101018198A CN1980124A (en) 2005-12-05 2005-12-05 Key digital identification method using once variable quantity
CN200510101819.8 2005-12-05

Publications (1)

Publication Number Publication Date
WO2007065348A1 true WO2007065348A1 (en) 2007-06-14

Family

ID=38122478

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/003276 WO2007065348A1 (en) 2005-12-05 2006-12-05 A key digital authentication method using one-time variable

Country Status (2)

Country Link
CN (1) CN1980124A (en)
WO (1) WO2007065348A1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011121566A1 (en) * 2010-03-31 2011-10-06 Paytel Inc. A method for mutual authentication of a user and service provider
CN102291238A (en) * 2011-07-29 2011-12-21 朱新泉 Network user identity authentication method
CN102446315B (en) * 2011-09-20 2019-05-14 深圳市科陆电子科技股份有限公司 A kind of wireless power consuming administrative system and management method
CN103259768B (en) * 2012-02-17 2018-06-19 中兴通讯股份有限公司 A kind of message authentication method, system and device
CN111212021A (en) * 2013-09-08 2020-05-29 王正伟 Control information identification method
CN104363199B (en) * 2014-09-30 2017-10-27 熊文俊 Safety certifying method and time synchronous code module based on time synchronized code
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
CN112291055B (en) * 2019-07-24 2024-03-29 广东知业科技有限公司 Industrial Internet data communication encryption method
CN112214785A (en) * 2020-12-01 2021-01-12 南京芯驰半导体科技有限公司 Data encryption method and device, and data decryption method and device
CN112615820A (en) * 2020-12-05 2021-04-06 百果园技术(新加坡)有限公司 Replay attack detection method, device, equipment and storage medium
CN115174125A (en) * 2022-09-07 2022-10-11 北京笔新互联网科技有限公司 Method and device for acquiring trusted true random number in trusted execution environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001352324A (en) * 2000-06-07 2001-12-21 Nec Corp One-time password generator, authentication method and recording medium with one-time password generating program recorded therein
CN1601490A (en) * 2003-09-26 2005-03-30 刘任 Information security authentication and method for its encrypting device
CN1645790A (en) * 2005-01-23 2005-07-27 姚忠凯 Message identifying method between receiving-transmitting sides

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001352324A (en) * 2000-06-07 2001-12-21 Nec Corp One-time password generator, authentication method and recording medium with one-time password generating program recorded therein
CN1601490A (en) * 2003-09-26 2005-03-30 刘任 Information security authentication and method for its encrypting device
CN1645790A (en) * 2005-01-23 2005-07-27 姚忠凯 Message identifying method between receiving-transmitting sides

Also Published As

Publication number Publication date
CN1980124A (en) 2007-06-13

Similar Documents

Publication Publication Date Title
WO2007065348A1 (en) A key digital authentication method using one-time variable
US7362869B2 (en) Method of distributing a public key
CN104994114B (en) A kind of identity authorization system and method based on electronic ID card
CN101496344B (en) Method and system having self-setting authentication formula for webs bank payment and identification confirmation
AU2002246210B2 (en) Cryptographic authentication with ephemeral modules
CN109327313A (en) A kind of Bidirectional identity authentication method with secret protection characteristic, server
CN101216923A (en) A system and method to enhance the data security of e-bank dealings
CN113301022B (en) Internet of things equipment identity security authentication method based on block chain and fog calculation
Irshad et al. An improved and secure chaotic map based authenticated key agreement in multi-server architecture
CN115238294A (en) Digital RMB transaction privacy protection method, system and device based on mixed currency protocol
CN110572392A (en) Identity authentication method based on HyperLegger network
Abuarqoub A lightweight two-factor authentication scheme for mobile cloud computing
Sung et al. User authentication using mobile phones for mobile payment
Al-Hussain et al. A biometric-based authentication system for web services mobile user
Chen et al. CallChain: Identity authentication based on blockchain for telephony networks
Pampori et al. Securely eradicating cellular dependency for e-banking applications
Nosrati et al. Security assessment of mobile-banking
CN111212017A (en) Intelligent terminal-oriented safe transmission method and system
CN101827079A (en) Blocking and attacking-resistant terminal connection building method and terminal access authenticating system
Nosrati et al. A review of mobile banking security
Liu et al. On the security of Yoon and Yoo’s biometrics remote user authentication scheme
Yannick et al. Practical Design And Implementation Of A Mobile Off-Line E-Wallet
Wu et al. On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
Al-Khouri Identity management in the age of mobilification
Lakshmi et al. Block Chain Technology Implementations for Secured Financial Transactions using Cloud Environment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06817950

Country of ref document: EP

Kind code of ref document: A1