Light access authentication method and system
First Claim
Patent Images
1. A light access authentication method, comprising:
- enciphering, by a third processing apparatus of a trusted third party, an MSG to obtain a MSG cipher text, and writing, by the third processing apparatus of the trusted third party, the MSG cipher text into a first entity;
obtaining, by a second processing apparatus of a second entity, the MSG cipher text from a first processing apparatus of the first entity, and obtaining, by the second processing apparatus of the second entity, a key from the trusted third party on obtaining the MSG cipher text; and
deciphering, by the second processing apparatus of the second entity, the MSG cipher text with the key, and determining that the authentication is successful if a MSG plain text is obtained or determining that the authentication fails if a MSG plain text is not obtained.
1 Assignment
0 Petitions
Accused Products
Abstract
A light access authentication method and system, the method includes: the trustful third party writes the MSG cipher text formed by enciphering MSG into the first entity; the second entity attains the MSG cipher text from the first entity, and attains the key from the trustful third party after attaining the MSG cipher text; the MSG cipher text is deciphered according to the key, and the MSG plaintext is attained. The embodiment of the present invention can be widely applied at a condition limited by the equipment and environment, and the access authentication is simplified and lightened.
18 Citations
10 Claims
-
1. A light access authentication method, comprising:
-
enciphering, by a third processing apparatus of a trusted third party, an MSG to obtain a MSG cipher text, and writing, by the third processing apparatus of the trusted third party, the MSG cipher text into a first entity; obtaining, by a second processing apparatus of a second entity, the MSG cipher text from a first processing apparatus of the first entity, and obtaining, by the second processing apparatus of the second entity, a key from the trusted third party on obtaining the MSG cipher text; and deciphering, by the second processing apparatus of the second entity, the MSG cipher text with the key, and determining that the authentication is successful if a MSG plain text is obtained or determining that the authentication fails if a MSG plain text is not obtained. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A light access authentication system, comprising:
- a first entity, a second entity and a third entity which is a trusted third party, wherein;
the first entity comprises a first processing apparatus adapted to receive an MSG cipher text from the third entity and supply the MSG cipher text to the second entity on receiving a data request from the second entity, the MSG cipher text carrying a CP, a PKeyID and a CMSG, where the PKeyID is a key identifier selected randomly, the CMSG is obtained by enciphering the MSG with K, where K=r·
QTTP·
PKeyID, r is a secret random number, QTTP is a public key of the third entity, and CP=r·
P, where P is a generator;the second entity comprises a second processing apparatus adapted to obtain the MSG cipher text from the first entity, to obtain a key response message from the third entity and to determine a key, to decipher the MSG cipher text with the key, and to determine that the authentication is successful if a MSG plain text is obtained, or to determine that the authentication fails if a MSG plain text is not obtained; and the third entity comprises a third processing apparatus adapted to generate the MSG cipher text, to transmit the MSG cipher text to the first entity, and to transmit the key response message to the second entity in response to the request from the second entity. - View Dependent Claims (10)
- a first entity, a second entity and a third entity which is a trusted third party, wherein;
Specification