×

Device for authenticating user's access rights to resources and method

  • US 6,073,234 A
  • Filed: 04/27/1998
  • Issued: 06/06/2000
  • Est. Priority Date: 05/07/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. A device for authenticating user'"'"'s access rights to resources by verifying legitimacy of proof data generated in order to prove the right of said user, said device for authenticating user'"'"'s access rights to resources comprising:

  • first memory means for storing first authentication data;

    second memory means for storing unique identifying information of the user;

    third memory means for storing proof support information which are executed results obtained when said the user unique identifying information and unique security characteristic information are calculated in a predetermined manner;

    proof data generation means for generating proof data by the application of specified calculation to said first authentication data stored in said first memory means, said the user unique identifying information stored in said second memory means, and said proof support information stored in said third memory means; and

    verification means for verifying the legitimacy of said proof data by verifying that said authentication data and unique security characteristic information satisfy a specific predefined relation,provided that, in particular, said unique security characteristic information X is a decryption key in an asymmetric cryptosystem arranged in such a way as to satisfy a relationship expressed as Y=ax modp, where p is a modulus and a is a positive integer,said proof data generation means generating a value which is obtained by multiplying said first authentication data stored in said first memory means by a power of said X value under the modulus p as proof data, and said verfication means verifies the legitimacy of proof data by verifying that the proof proof data generated by said proof data generation means is identical with decryption of the data which is encrypted with encryption key corresponding to said decryption key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×