AU2021104202A4 - Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain - Google Patents

Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain Download PDF

Info

Publication number
AU2021104202A4
AU2021104202A4 AU2021104202A AU2021104202A AU2021104202A4 AU 2021104202 A4 AU2021104202 A4 AU 2021104202A4 AU 2021104202 A AU2021104202 A AU 2021104202A AU 2021104202 A AU2021104202 A AU 2021104202A AU 2021104202 A4 AU2021104202 A4 AU 2021104202A4
Authority
AU
Australia
Prior art keywords
private key
local network
key
communication
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021104202A
Inventor
Kamlesh Kumar Dubey
Keshav Dev Gupta
Arabind Kumar
Mohit Kumar
Sarvesh Kumar
Varun Kumar
Pratap Narayan Pathak
Sheeba Praveen
Ajay Kumar Shukla
Sanjay Yadav
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AU2021104202A priority Critical patent/AU2021104202A4/en
Application granted granted Critical
Publication of AU2021104202A4 publication Critical patent/AU2021104202A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

INTELLIGENT SECURE PRIVATE KEY SHARING FRAMEWORK FOR ADVANCED COMMUNICATION USING ASYMMETRIC CRYPTOGRAPHY AND BLOCKCHAIN ABSTRACT The present invention is related to intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain. The objective of present invention is to solve the abnormalities presented in the prior art techniques related to secure private key sharing framework for secure communication using asymmetric cryptography and blockchain. 28 DRAWINGS LOCAL NETWORK Private Key I C= FIGURE 1 29

Description

DRAWINGS LOCAL NETWORK
Private Key
C= I
FIGURE 1
INTELLIGENT SECURE PRIVATE KEY SHARING FRAMEWORK FOR ADVANCED COMMUNICATION USING ASYMMETRIC CRYPTOGRAPHY AND BLOCKCHAIN FIELD OF INVENTION
[001]. The present invention relates to the technical field of
communication.
[002]. The present invention relates to the field secure communication
using asymmetric cryptography and blockchain.
[003]. More particularly, the present invention is related to intelligent
secure private key sharing framework for advanced communication
using asymmetric cryptography and blockchain.
BACKGROUND & PRIOR ART
[004]. The subject matter discussed in the background section should
not be assumed to be prior art merely as a result of its mention in
the background section. Similarly, a problem mentioned in the
background section or associated with the subject matter of the
background section should not be assumed to have been previously
recognized in the prior art. The subject matter in the background
section merely represents different approaches, which in-and-of
themselves may also be inventions.
[005]. Some of the prior work is listed herewith:
[006]. WO/2014/138494SECURE SESSION CAPABILITY USING
PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO
THE PRIVATE KEY WO - 12.09.2014 Int.Class H04L
9/08Appl.No PCT/US2014/021434Applicant CLOUDFLARE,
IN Inventor PAHL, Sebastian Andreas Henry A server
establishes a secure session with a client device where a private
key used in the handshake when establishing the secure session
is stored in a different server. During the handshake procedure,
the server receives a premaster secret that has been encrypted.
[007]. 2997693SECURE SESSION CAPABILITY USING PUBLIC
KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE PRIVATE
KEY EP - 23.03.2016 Int.Class H04L 9/08Appl.No
14759676Applicant CLOUDFLARE IN Inventor PAHL
SEBASTIAN ANDREAS HENRY A server establishes a secure
session with a client device where a private key used in the
handshake when establishing the secure session is stored in a
different server. During the handshake procedure, the server receives
a premaster secret that has been encrypted using a public key bound
with a domain for which the client device is attempting to establish a
secure session with. The server transmits the encrypted premaster
secret to another server for decryption. The server receives the
decrypted premaster secret and continues with the handshake
procedure including generating a master secret from the decrypted
premaster secret and generating one or more session keys that are
used in the secure session for encrypting and decrypting
communication between the client device and the server.
[008]. 3.5737419COMPUTER SYSTEM FOR SECURING
COMMUNICATIONS USING SPLIT PRIVATE KEY
ASYMMETRIC CRYPTOGRAPHY US - 07.04.1998 Int.Class
H04K 1/00Appl.No 08660403Applicant Bell Atlantic Network
Services, Inc. Inventor Ganesa Ravi A programmed computer
secures communications between users of a crypto-system in which
each user has an associated asymmetric crypto-key with a public key
portion accessible to all system users and a corresponding private
key portion having a first private key portion known only to the
associated user and a corresponding second private key portion. The
computer includes a processor programmed to generate a temporary
asymmetric crypto-key having a first temporary key portion and an
associated second temporary key portion. The computer then
encrypts the second temporary key portion with the first private key
portion of a first user crypto-key associated with a first user to form
a first encrypted message. The processor directs the issuance of the
first encrypted message to a second user having access to the second
private key portion of the first user crypto-key. The processor next
applies the public key portion of the first user crypto-key to decrypt
a second encrypted message generated by the second user, which
[009]. 11078432INEW SECURITY ANONYMOUS
COMMUNICATION PROTOCOL BASED ON PUBLIC AND PRIVATE KEY CRYPTOGRAPHY MECHANISM CN
11.02.2020 Int.Class H04L 9/08Appl.No 201911077872.7Applicant
QUFU NORMAL UNIVERSITY Inventor LI FENGYIN The
invention discloses a new security anonymous communication
protocol based on a public and private key cryptography mechanism,
and aims to change the current situation of frequent leakage of
privacy information of a user in a current communication network
and protect the privacy security of the user. Technical key points are
as follows, the method is based on an onion routing technology and a
public and private key cryptography mechanism. A new anonymous
communication data packet packaging format is designed, a safe
anonymous communication link is constructed, a safe anonymous
communication protocol is realized, in the protocol, session data and
authentication data are treated differently, the number of encryption
layers of the session data is reduced, the calculation amount is
reduced, and the forwarding efficiency of anonymous information is
effectively improved. The method has anonymity of communication and confidentiality and integrity of anonymous messages, and rapid and safe anonymous message transmission can be realized.
[0010]. 20160080337SECURE SESSION CAPABILITY USING
PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE
PRIVATE KEY US - 17.03.2016 Int.Class H04L 29/06Appl.No
14937805Applicant CLOUDFLARE, INC. Inventor Sebastian
Andreas Henry Pahl A server establishes a secure session with a
client device where a private key used in the handshake when
establishing the secure session is stored in a different server. During
the handshake procedure, the server receives a premaster secret that
has been encrypted using a public key bound with a domain for
which the client device is attempting to establish a secure session.
The server transmits the encrypted premaster secret to the different
server for decryption along with other information necessary to
compute a master secret and session keys for the secure session. The
different server decrypts the encrypted premaster secret, generates
the master secret, and generates session keys that are used in the
secure session for encrypting and decrypting communication
between the client device and the server and transmits those session
keys to that server.
[0011]. 20190140843SECURE SESSION CAPABILITY USING
PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE
PRIVATE KEY US - 09.05.2019 Int.Class H04L 29/06Appl.No
16019109Applicant CLOUDFLARE, INC.Inventor Sebastian
Andreas Henry Pahl A server establishes a secure session with a
client device where a private key used in the handshake when
establishing the secure session is stored in a different server. During
the handshake procedure, the server receives a premaster secret that
has been encrypted using a public key bound with a domain for
which the client device is attempting to establish a secure session
with. The server transmits the encrypted premaster secret to the
different server for decryption along with other information
necessary to compute a master secret. The different server decrypts
the encrypted premaster secret, generates the master secret, and
transmits the master secret to the server. The server receives the
master secret and continues with the handshake procedure including
generating one or more session keys that are used in the secure
session for encryptin
[0012]. .20170134346SECURE SESSION CAPABILITY USING
PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE
PRIVATE KEY US - 11.05.2017 Int.Class H04L 29/06Appl.No
15413187Applicant CloudFlare, Inc.Inventor Sebastian Andreas
Henry Pahl A server establishes a secure session with a client device
where a private key used in the handshake when establishing the
secure session is stored in a different server. During the handshake
procedure, the server receives a premaster secret that has been
encrypted using a public key bound with a domain for which the
client device is attempting to establish a secure session with. The
server transmits the encrypted premaster secret to another server for
decryption. The server receives the decrypted premaster secret and
continues with the handshake procedure including generating a
master secret from the decrypted premaster secret and generating one
or more session keys that are used in the secure session for
encrypting and decrypting communication between the client device
and the server.
[0013]. .20190097983SECURE SESSION CAPABILITY USING
PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE
PRIVATE KEY US - 28.03.2019 Int.Class H04L 29/06Appl.No
16188244Applicant CLOUDFLARE, INC.Inventor Sebastian
Andreas Henry Pahl A server establishes a secure session with a
client device where a private key used in the handshake when
establishing the secure session is stored in a different server. During
the handshake procedure, the server receives a premaster secret that
has been encrypted using a public key bound with a domain for
which the client device is attempting to establish a secure session
with. The server transmits the encrypted premaster secret to another
server for decryption. The server receives the decrypted premaster
secret and continues with the handshake procedure including
generating a master secret from the decrypted premaster secret and
generating one or more session keys that are used in the secure
session for encrypting and decrypting communication between the
client device and the server.
[0014]. 105993146SECURE SESSION CAPABILITY USING
PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE
PRIVATE KEY CN - 05.10.2016 Int.Class H04L 9/08Appl.No
112014000026113Applicant CLOUDFLARE INCInventor PAHL
SEBASTIAN ANDREAS HENRY A server establishes a secure
session with a client device where a private key used in the
handshake when establishing the secure session is stored in a
different server. During the handshake procedure, the server receives
a premaster secret that has been encrypted using a public key bound
with a domain for which the client device is attempting to establish a
secure session with. The server transmits the encrypted premaster
secret to another server for decryption. The server receives the
decrypted premaster secret and continues with the handshake
procedure including generating a master secret from the decrypted
premaster secret and generating one or more session keys that are
used in the secure session for encrypting and decrypting
communication between the client device and the server.
[0015]. 08782774SECURE SESSION CAPABILITY USING PUBLIC
KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE PRIVATE
KEY US - 15.07.2014 Int.Class G06F 9/00Appl.No
13788784Applicant Pahl Sebastian Andreas HenryInventor Pahl
Sebastian Andreas Henry A server establishes a secure session with
a client device where a private key used in the handshake when
establishing the secure session is stored in a different server. During
the handshake procedure, the server receives a premaster secret that
has been encrypted using a public key bound with a domain for
which the client device is attempting to establish a secure session
with. The server transmits the encrypted premaster secret to another
server for decryption. The server receives the decrypted premaster
secret and continues with the handshake procedure including
generating a master secret from the decrypted premaster secret and
generating one or more session keys that are used in the secure
session for encrypting and decrypting communication between the
client device and the server.
[0016]. .20140310526SECURE SESSION CAPABILITY USING
PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE
PRIVATE KEY US - 16.10.2014 Int.Class H04L 29/06Appl.No
14315241Applicant CloudFlare, Inc.Inventor Sebastian Andreas
Henry Pahl A server establishes a secure session with a client device
where a private key used in the handshake when establishing the
secure session is stored in a different server. During the handshake
procedure, the server receives a premaster secret that has been
encrypted using a public key bound with a domain for which the
client device is attempting to establish a secure session with. The
server transmits the encrypted premaster secret to another server for
decryption. The server receives the decrypted premaster secret and
continues with the handshake procedure including generating a
master secret from the decrypted premaster secret and generating one
or more session keys that are used in the secure session for
encrypting and decrypting communication between the client device
and the server.
[0017]. 20170237571SECURE SESSION CAPABILITY USING
PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE
PRIVATE KEY US - 17.08.2017 Int.Class H04L 29/06Appl.No
1527119OApplicant CLOUDFLARE, INC.Inventor Sebastian
Andreas Henry Pahl A server establishes a secure session with a
client device where a private key used in the handshake when
establishing the secure session is stored in a different server. During
the handshake procedure, the server receives a premaster secret that
has been encrypted using a public key bound with a domain for
which the client device is attempting to establish a secure session
with. The server transmits the encrypted premaster secret to the
different server for decryption along with other information
necessary to compute a master secret. The different server decrypts
the encrypted premaster secret, generates the master secret, and
transmits the master secret to the server. The server receives the
master secret and continues with the handshake procedure including
generating one or more session keys that are used in the secure
session for encrypting and decrypting communication between the
client device and the server.
[0018]. .Groupings of alternative elements or embodiments of the
invention disclosed herein are not to be construed as limitations.
Each group member can be referred to and claimed individually or in
any combination with other members of the group or other elements
found herein. One or more members of a group can be included in,
[0019]. or deleted from, a group for reasons of convenience and/or
patentability. When any such inclusion or deletion occurs, the
specification is herein deemed to contain the group as modified thus
fulfilling the written description of all Markus groups used in the
appended claims.
[0020]. As used in the description herein and throughout the claims that
follow, the meaning of "a," "an," and "the" includes plural reference
unless the context clearly dictates otherwise. Also, as used in the
description herein, the meaning of "in" includes "in" and "on" unless
the context clearly dictates otherwise.
[0021]. The recitation of ranges of values herein is merely intended to
serve as a shorthand method of referring individually to each separate
value falling within the range. Unless otherwise indicated herein, each
individual value is incorporated into the specification as if it were
individually recited herein. All methods described herein can be
performed in any suitable order unless otherwise indicated herein or
otherwise clearly contradicted by context.
[0022]. The use of any and all examples, or exemplary language (e.g.
"such as") provided with respect to certain embodiments herein is
intended merely to better illuminate the invention and does not pose a
limitation on the scope of the invention otherwise claimed. No
language in the specification should be construed as indicating any
non-claimed element essential to the practice of the invention.
[0023]. The above information disclosed in this Background section is
only for enhancement of understanding of the background of the
invention and therefore it may contain information that does not form
the prior art that is already known in this country to a person of
ordinary skill in the art.
SUMMARY
[0024]. The present invention mainly cures and solves the technical
problems existing in the prior art. In response to these problems, the
present invention provides intelligent secure private key sharing
framework for advanced communication using asymmetric
cryptography and blockchain.
[0025]. As one aspect of the present invention relates to A system for
intelligent secure private key sharing framework for advanced
communication using asymmetric cryptography and blockchain
, wherein the system is arranged for wireless transmission between
local network units in an area and for secure transmission according
to a secure private key sharing framework, the asymmetric
cryptography and blockchain system comprising:a first local network
unit arranged to act as the communication unit according to the
secure private key sharing framework for getting access to the local
network, and a second local network unit arranged to act as a
communication unit according to the secure private key sharing
framework for enabling access to the local network by the
communication unit; wherein the communication unit comprises a
communication transmission unit arranged to receive, from the communication unit, a local network access request according to the secure private key sharing framework, the local network access request including an encoded second private key and a first private key, and a communication computing unit comprising a memory arranged to have, for the communication unit, a communication private key and a corresponding communication public key and to have, for the asymmetric cryptography and blockchain system, a local network private key and a corresponding local network public key, the communication computing unit arranged to:derive a first shared key based on the local network public key and the first private key,decode the encoded second private key using the first shared key, verify whether the encoded second private key was encoded by the first shared key and, generate security data using the second private key and the communication public key, derive a second shared key based on the first private key, the second private key and the local network public key,protect asymmetric cryptography and blockchain unit, using the second shared key, at least one of the security data and communication private key, and generate a local network access message according to the secure private key sharing framework, the local network access message including at least one of the protected security data and protected communication private key; the communication unit comprising: an wireless tranmission unit arranged for wireless tranmission; an Asymmetric cryptography and blockchain unit arranged to: acquire a data pattern via an out-of band channel, the data pattern being provided in the area and representing the local network private key; and an computing unit comprising a memory arranged to have the first private key and a corresponding first public key and to have the second private key and a corresponding second public key, the computing unit arranged to: derive the first shared key based on the local network private key and the first public key,encode the second private key using the first shared key, generate the local network access request according to the secure private key sharing framework, the local network access request including the encoded second private key and the first private key, and transfer the local network access request to the communication unit via the wireless tranmission unit; the computing unit further arranged to: receive the local network access message from the communication via the wireless tranmission unit, derive the second shared key based.
OBJECTIVE OF THE INVENTION
[0026]. The principle objective of the present invention is to provide
intelligent secure private key sharing framework for advanced
communication using asymmetric cryptography and blockchain.
BRIEF DESCRIPTION OF DRAWINGS
[0027]. Further clarify various aspects of some example embodiments of
the present invention, a more particular description of the invention
will be rendered by reference to specific embodiments thereof which
are illustrated in the appended drawings. It is appreciated that these
drawings depict only illustrated embodiments of the invention and are
therefore not to be considered limiting of its scope. The invention will
be described and explained with additional specificity and detail
through the use of the accompanying drawings.
[0028]. In order that the advantages of the present invention will be
easily understood, a detailed description of the invention is discussed
below in conjunction with the appended drawings, which, however,
should not be considered to limit the scope of the invention to the
accompanying drawings, in which:
[0029]. Figure 1 shows an exemplary representation of intelligent secure
private key sharing framework for advanced communication using
asymmetric cryptography and blockchain, according to the present
invention.
DETAIL DESCRIPTION
[0030]. The present invention discloses intelligent secure private key
sharing framework for advanced communication using asymmetric
cryptography and blockchain.
[0031]. Figure 1 shows the exemplary representation of intelligent
secure private key sharing framework for advanced communication
using asymmetric cryptography and blockchain, according to the
present invention.
[0032]. Although the present disclosure has been described with the
purpose of two intelligent secure private key sharing framework for
advanced communication using asymmetric cryptography and
blockchain, it should be appreciated that the same has been done
merely to illustrate the invention in an exemplary manner and to
highlight any other purpose or function for which explained structures
or configurations could be used and is covered within the scope of the
present disclosure.
[0033]. The system is arranged for wireless transmission
between local network units in an area and for secure transmission
according to a secure private key sharing framework,
[0034]. The asymmetric cryptography and blockchain system
comprising a first local network unit arranged to act as the
communication unit according to the secure private key sharing
framework for getting access to the local network.
[0035]. A second local network unit is arranged to act as a
communication unit according to the secure private key sharing
framework for enabling access to the local network by the
communication unit.
[0036]. The communication unit comprises a communication
transmission unit arranged to receive, from the communication
unit, a local network access request according to the secure private
key sharing framework, the local network access request including
an encoded second private key and a first private key.
[0037]. A communication computing unit comprising a memory
arranged to have, for the communication unit, a communication
private key and a corresponding communication public key and to
have, for the asymmetric cryptography and blockchain system, a
local network private key and a corresponding local network
public key, the communication computing unit arranged to derive a
first shared key based on the local network public key and the first
private key, decode the encoded second private key using the first
shared key, verify whether the encoded second private key was
encoded by the first shared key and, generate security data using
the second private key and the communication public key, derive
a second shared key based on the first private key, the second
private key and the local network public key, protect asymmetric
cryptography and blockchain unit, using the second shared key, at
least one of the security data and communication private key, and
generate a local network access message according to the secure
private key sharing framework, the local network access message
including at least one of the protected security data and protected
communication private key; the communication unit comprising:
[0038]. an wireless transmission unit arranged for wireless
tranmission; an Asymmetric cryptography and blockchain unit
arranged to acquire a data pattern via an out-of-band channel, the
data pattern being provided in the area and representing the local
network private key; and an computing unit comprising a memory
arranged to have the first private key and a corresponding first
public key and to have the second private key and a corresponding
second public key, the computing unit arranged to: derive the first
shared key based on th e local network private key and the first
public key, encode the second private key using the first shared
key, generate the local network access request according to the
secure private key sharing framework, the local network access
request including the encoded second private key and the first
private key, and transfer the local network access request to the
communication unit via the wireless tranmission unit
[0039]. The figures and the foregoing description give examples of
embodiments. Those skilled in the art will appreciate that one or
more of the described elements may well be combined into a single
functional element. Alternatively, certain elements may be split into
multiple functional elements. Elements from one embodiment may
be added to another embodiment. For example, order of processes
described herein may be changed and are not limited to the manner
described herein. Moreover, the actions of any block diagram need
not be implemented in the order shown; nor do all of the acts need to
be necessarily performed. Also, those acts that are not dependent on
other acts may be performed in parallel with the other acts. The
scope of embodiments is by no means limited by these specific
examples.
[0040]. Although implementations of the invention have been described
in a language specific to structural features and/or methods, it is to
be understood that the appended claims are not necessarily limited to
the specific features or methods described. Rather, the specific
features and methods are disclosed as examples of implementations
of the invention.

Claims (1)

CLAIMS I/We claim:
1. A system for intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain , wherein the system is arranged for wireless transmission between local network units in an area and for secure transmission according to a secure private key sharing framework, the asymmetric cryptography and blockchain system comprising: a first local network unit arranged to act as the communication unit according to the secure private key sharing framework for getting access to the local network, and a second local network unit arranged to act as a communication unit according to the secure private key sharing framework for enabling access to the local network by the communication unit; wherein the communication unit comprises a communication transmission unit arranged to receive, from the communication unit, a local network access request according to the secure private key sharing framework, the local network access request including an encoded second private key and a first private key, and a communication computing unit comprising a memory arranged to have, for the communication unit, a communication private key and a corresponding communication public key and to have, for the asymmetric cryptography and blockchain system, a local network private key and a corresponding local network public key, the communication computing unit arranged to: derive a first shared key based on the local network public key and the first private key, decode the encoded second private key using the first shared key, verify whether the encoded second private key was encoded by the first shared key and, generate security data using the second private key and the communication public key, derive a second shared key based on the first private key, the second private key and the local network public key, protect asymmetric cryptography and blockchain unit, using the second shared key, at least one of the security data and communication private key, and generate a local network access message according to the secure private key sharing framework, the local network access message including at least one of the protected security data and protected communication private key; the communication unit comprising: an wireless tranmission unit arranged for wireless transmission; an Asymmetric cryptography and blockchain unit arranged to: acquire a data pattern via an out-of-band channel, the data pattern being provided in the area and representing the local network private key; and an computing unit comprising a memory arranged to have the first private key and a corresponding first public key and to have the second private key and a corresponding second public key, the computing unit arranged to: derive the first shared key based on the local network private key and the first public key, encode the second private key using the first shared key, generate the local network access request according to the secure private key sharing framework, the local network access request including the encoded second private key and the first private key, and transfer the local network access request to the communication unit via the wireless transmission unit; the computing unit further arranged to: receive the local network access message from the communication via the wireless transmission unit, derive the second shared key based on the first public key, the second public key and the local network private key, verify whether at least one of the protected security data and the protected communication private key was asymmetric cryptography and blockchain unit protected by the second shared key, and engage the secure transmission based on the second public key and the security data.
AU2021104202A 2021-07-15 2021-07-15 Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain Ceased AU2021104202A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021104202A AU2021104202A4 (en) 2021-07-15 2021-07-15 Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021104202A AU2021104202A4 (en) 2021-07-15 2021-07-15 Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain

Publications (1)

Publication Number Publication Date
AU2021104202A4 true AU2021104202A4 (en) 2022-04-07

Family

ID=80932761

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021104202A Ceased AU2021104202A4 (en) 2021-07-15 2021-07-15 Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain

Country Status (1)

Country Link
AU (1) AU2021104202A4 (en)

Similar Documents

Publication Publication Date Title
US6636968B1 (en) Multi-node encryption and key delivery
US7774594B2 (en) Method and system for providing strong security in insecure networks
CA2690778C (en) System and method of creating and sending broadcast and multicast data
EP3345335B1 (en) Homomorphic based method and system for securely aggregating data
US20100042841A1 (en) Updating and Distributing Encryption Keys
EP3291480B1 (en) Secure data transmission
KR20170035665A (en) Apparatus and method for exchanging encryption key
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
US20050141718A1 (en) Method of transmitting and receiving message using encryption/decryption key
Kuppuswamy et al. New Innovation of Arabic language Encryption Technique using New symmetric key algorithm
CN101047945B (en) Mobile communication system and customer temporary identity distribution method
AU2021104202A4 (en) Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain
WO2012075761A1 (en) Method and system for encrypting multimedia message service
JP2002152189A (en) Open key distributing method, and open key transmitting device and open key receiving device used for the same method
CN112019553B (en) Data sharing method based on IBE/IBBE
JP2006262425A (en) Mutual authentication on network by public key cryptosystem, and mutual exchange system of public key
Pushpa Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
JPH11187008A (en) Delivering method for cryptographic key
JP2010113181A (en) Key management method, key generation method, encryption processing method, decryption processing method, access control method, communication network system
JP2000349748A (en) Secret information sharing method
Chetan et al. Security framework for VANET for privacy preservation
JPH09130376A (en) User password authentication method
JPH10164048A (en) Secret keeping communication method in large-scale service and subscriber equipment and server therefor
KR100567321B1 (en) Method for reusing key using separated encryption key for sending and receiving
Usman et al. A Novel Approach to Enhance the Security of Keys Shared by Users in WLAN Environments Using 3DES Algorithm

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry