US 12,470,531 B2
Interactive authentication method, system, computer device, and non-volatile readable storage medium
Xiangye Wei, Beijing (CN); Yiming Bai, Beijing (CN); and Liming Xiu, Beijing (CN)
Assigned to Beijing BOE Technology Development Co., Ltd., Beijing (CN)
Appl. No. 18/266,690
Filed by Beijing BOE Technology Development Co., Ltd., Beijing (CN); and BOE Technology Group Co., Ltd., Beijing (CN)
PCT Filed Dec. 24, 2020, PCT No. PCT/CN2020/139027
§ 371(c)(1), (2) Date Jun. 12, 2023,
PCT Pub. No. WO2022/133904, PCT Pub. Date Jun. 30, 2022.
Prior Publication US 2024/0048540 A1, Feb. 8, 2024
Int. Cl. H04L 9/40 (2022.01); H04L 9/32 (2006.01)
CPC H04L 63/0457 (2013.01) [H04L 9/3278 (2013.01)] 16 Claims
OG exemplary drawing
 
1. An interactive authentication method, applicable to a transmitter, the transmitter being communicatively connected to a receiver,
the authentication method comprising:
generating a first challenge and transmitting the first challenge to the receiver;
receiving a response from the receiver, wherein the response comprises first identity authentication information and a second challenge, the first identity authentication information and the second challenge being encrypted using a first identity authentication key;
generating, based on the first challenge, a second identity authentication key and second identity authentication information; and
decrypting the first identity authentication information using the second identity authentication key, and performing identity authentication by matching the decrypted first identity authentication information with the second identity authentication information;
wherein the first identity authentication key and the first identity authentication information are generated by the receiver based on the first challenge using a first encryption circuit which employs a biased time-average-frequency direct period synthesis and a physical unclonable function, and the second identity authentication key and the second identity authentication information are generated by the transmitter based on the first challenge using a second identity encryption circuit which employs a biased time-average-frequency direct period synthesis and a physical unclonable function, properties of the first encryption circuit and the second encryption circuit being maintained consistent.