AU2021104202A4 - Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain - Google Patents
Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain Download PDFInfo
- Publication number
- AU2021104202A4 AU2021104202A4 AU2021104202A AU2021104202A AU2021104202A4 AU 2021104202 A4 AU2021104202 A4 AU 2021104202A4 AU 2021104202 A AU2021104202 A AU 2021104202A AU 2021104202 A AU2021104202 A AU 2021104202A AU 2021104202 A4 AU2021104202 A4 AU 2021104202A4
- Authority
- AU
- Australia
- Prior art keywords
- private key
- local network
- key
- communication
- secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000004891 communication Methods 0.000 title claims abstract description 83
- 230000005540 biological transmission Effects 0.000 claims description 15
- 238000012546 transfer Methods 0.000 claims description 3
- 230000005856 abnormality Effects 0.000 abstract 1
- 238000010420 art technique Methods 0.000 abstract 1
- 238000000034 method Methods 0.000 description 26
- 230000007246 mechanism Effects 0.000 description 3
- 241000234282 Allium Species 0.000 description 1
- 235000002732 Allium cepa var. cepa Nutrition 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
INTELLIGENT SECURE PRIVATE KEY
SHARING FRAMEWORK FOR ADVANCED
COMMUNICATION USING ASYMMETRIC
CRYPTOGRAPHY AND BLOCKCHAIN
ABSTRACT
The present invention is related to intelligent secure private key
sharing framework for advanced communication using asymmetric
cryptography and blockchain. The objective of present invention is to
solve the abnormalities presented in the prior art techniques related to
secure private key sharing framework for secure communication using
asymmetric cryptography and blockchain.
28
DRAWINGS
LOCAL NETWORK
Private Key
I
C=
FIGURE 1
29
Description
Private Key
C= I
FIGURE 1
[001]. The present invention relates to the technical field of
communication.
[002]. The present invention relates to the field secure communication
using asymmetric cryptography and blockchain.
[003]. More particularly, the present invention is related to intelligent
secure private key sharing framework for advanced communication
using asymmetric cryptography and blockchain.
[004]. The subject matter discussed in the background section should
not be assumed to be prior art merely as a result of its mention in
the background section. Similarly, a problem mentioned in the
background section or associated with the subject matter of the
background section should not be assumed to have been previously
recognized in the prior art. The subject matter in the background
section merely represents different approaches, which in-and-of
themselves may also be inventions.
[005]. Some of the prior work is listed herewith:
[006]. WO/2014/138494SECURE SESSION CAPABILITY USING
THE PRIVATE KEY WO - 12.09.2014 Int.Class H04L
9/08Appl.No PCT/US2014/021434Applicant CLOUDFLARE,
IN Inventor PAHL, Sebastian Andreas Henry A server
establishes a secure session with a client device where a private
key used in the handshake when establishing the secure session
is stored in a different server. During the handshake procedure,
the server receives a premaster secret that has been encrypted.
[007]. 2997693SECURE SESSION CAPABILITY USING PUBLIC
KEY EP - 23.03.2016 Int.Class H04L 9/08Appl.No
14759676Applicant CLOUDFLARE IN Inventor PAHL
SEBASTIAN ANDREAS HENRY A server establishes a secure
session with a client device where a private key used in the
handshake when establishing the secure session is stored in a
different server. During the handshake procedure, the server receives
a premaster secret that has been encrypted using a public key bound
with a domain for which the client device is attempting to establish a
secure session with. The server transmits the encrypted premaster
secret to another server for decryption. The server receives the
decrypted premaster secret and continues with the handshake
procedure including generating a master secret from the decrypted
premaster secret and generating one or more session keys that are
used in the secure session for encrypting and decrypting
communication between the client device and the server.
[008]. 3.5737419COMPUTER SYSTEM FOR SECURING
ASYMMETRIC CRYPTOGRAPHY US - 07.04.1998 Int.Class
H04K 1/00Appl.No 08660403Applicant Bell Atlantic Network
Services, Inc. Inventor Ganesa Ravi A programmed computer
secures communications between users of a crypto-system in which
each user has an associated asymmetric crypto-key with a public key
portion accessible to all system users and a corresponding private
key portion having a first private key portion known only to the
associated user and a corresponding second private key portion. The
computer includes a processor programmed to generate a temporary
asymmetric crypto-key having a first temporary key portion and an
associated second temporary key portion. The computer then
encrypts the second temporary key portion with the first private key
portion of a first user crypto-key associated with a first user to form
a first encrypted message. The processor directs the issuance of the
first encrypted message to a second user having access to the second
private key portion of the first user crypto-key. The processor next
applies the public key portion of the first user crypto-key to decrypt
a second encrypted message generated by the second user, which
[009]. 11078432INEW SECURITY ANONYMOUS
11.02.2020 Int.Class H04L 9/08Appl.No 201911077872.7Applicant
QUFU NORMAL UNIVERSITY Inventor LI FENGYIN The
invention discloses a new security anonymous communication
protocol based on a public and private key cryptography mechanism,
and aims to change the current situation of frequent leakage of
privacy information of a user in a current communication network
and protect the privacy security of the user. Technical key points are
as follows, the method is based on an onion routing technology and a
public and private key cryptography mechanism. A new anonymous
communication data packet packaging format is designed, a safe
anonymous communication link is constructed, a safe anonymous
communication protocol is realized, in the protocol, session data and
authentication data are treated differently, the number of encryption
layers of the session data is reduced, the calculation amount is
reduced, and the forwarding efficiency of anonymous information is
effectively improved. The method has anonymity of communication and confidentiality and integrity of anonymous messages, and rapid and safe anonymous message transmission can be realized.
[0010]. 20160080337SECURE SESSION CAPABILITY USING
PRIVATE KEY US - 17.03.2016 Int.Class H04L 29/06Appl.No
14937805Applicant CLOUDFLARE, INC. Inventor Sebastian
Andreas Henry Pahl A server establishes a secure session with a
client device where a private key used in the handshake when
establishing the secure session is stored in a different server. During
the handshake procedure, the server receives a premaster secret that
has been encrypted using a public key bound with a domain for
which the client device is attempting to establish a secure session.
The server transmits the encrypted premaster secret to the different
server for decryption along with other information necessary to
compute a master secret and session keys for the secure session. The
different server decrypts the encrypted premaster secret, generates
the master secret, and generates session keys that are used in the
secure session for encrypting and decrypting communication
between the client device and the server and transmits those session
keys to that server.
[0011]. 20190140843SECURE SESSION CAPABILITY USING
PRIVATE KEY US - 09.05.2019 Int.Class H04L 29/06Appl.No
16019109Applicant CLOUDFLARE, INC.Inventor Sebastian
Andreas Henry Pahl A server establishes a secure session with a
client device where a private key used in the handshake when
establishing the secure session is stored in a different server. During
the handshake procedure, the server receives a premaster secret that
has been encrypted using a public key bound with a domain for
which the client device is attempting to establish a secure session
with. The server transmits the encrypted premaster secret to the
different server for decryption along with other information
necessary to compute a master secret. The different server decrypts
the encrypted premaster secret, generates the master secret, and
transmits the master secret to the server. The server receives the
master secret and continues with the handshake procedure including
generating one or more session keys that are used in the secure
session for encryptin
[0012]. .20170134346SECURE SESSION CAPABILITY USING
PRIVATE KEY US - 11.05.2017 Int.Class H04L 29/06Appl.No
15413187Applicant CloudFlare, Inc.Inventor Sebastian Andreas
Henry Pahl A server establishes a secure session with a client device
where a private key used in the handshake when establishing the
secure session is stored in a different server. During the handshake
procedure, the server receives a premaster secret that has been
encrypted using a public key bound with a domain for which the
client device is attempting to establish a secure session with. The
server transmits the encrypted premaster secret to another server for
decryption. The server receives the decrypted premaster secret and
continues with the handshake procedure including generating a
master secret from the decrypted premaster secret and generating one
or more session keys that are used in the secure session for
encrypting and decrypting communication between the client device
and the server.
[0013]. .20190097983SECURE SESSION CAPABILITY USING
PRIVATE KEY US - 28.03.2019 Int.Class H04L 29/06Appl.No
16188244Applicant CLOUDFLARE, INC.Inventor Sebastian
Andreas Henry Pahl A server establishes a secure session with a
client device where a private key used in the handshake when
establishing the secure session is stored in a different server. During
the handshake procedure, the server receives a premaster secret that
has been encrypted using a public key bound with a domain for
which the client device is attempting to establish a secure session
with. The server transmits the encrypted premaster secret to another
server for decryption. The server receives the decrypted premaster
secret and continues with the handshake procedure including
generating a master secret from the decrypted premaster secret and
generating one or more session keys that are used in the secure
session for encrypting and decrypting communication between the
client device and the server.
[0014]. 105993146SECURE SESSION CAPABILITY USING
PRIVATE KEY CN - 05.10.2016 Int.Class H04L 9/08Appl.No
112014000026113Applicant CLOUDFLARE INCInventor PAHL
SEBASTIAN ANDREAS HENRY A server establishes a secure
session with a client device where a private key used in the
handshake when establishing the secure session is stored in a
different server. During the handshake procedure, the server receives
a premaster secret that has been encrypted using a public key bound
with a domain for which the client device is attempting to establish a
secure session with. The server transmits the encrypted premaster
secret to another server for decryption. The server receives the
decrypted premaster secret and continues with the handshake
procedure including generating a master secret from the decrypted
premaster secret and generating one or more session keys that are
used in the secure session for encrypting and decrypting
communication between the client device and the server.
[0015]. 08782774SECURE SESSION CAPABILITY USING PUBLIC
KEY US - 15.07.2014 Int.Class G06F 9/00Appl.No
13788784Applicant Pahl Sebastian Andreas HenryInventor Pahl
Sebastian Andreas Henry A server establishes a secure session with
a client device where a private key used in the handshake when
establishing the secure session is stored in a different server. During
the handshake procedure, the server receives a premaster secret that
has been encrypted using a public key bound with a domain for
which the client device is attempting to establish a secure session
with. The server transmits the encrypted premaster secret to another
server for decryption. The server receives the decrypted premaster
secret and continues with the handshake procedure including
generating a master secret from the decrypted premaster secret and
generating one or more session keys that are used in the secure
session for encrypting and decrypting communication between the
client device and the server.
[0016]. .20140310526SECURE SESSION CAPABILITY USING
PRIVATE KEY US - 16.10.2014 Int.Class H04L 29/06Appl.No
14315241Applicant CloudFlare, Inc.Inventor Sebastian Andreas
Henry Pahl A server establishes a secure session with a client device
where a private key used in the handshake when establishing the
secure session is stored in a different server. During the handshake
procedure, the server receives a premaster secret that has been
encrypted using a public key bound with a domain for which the
client device is attempting to establish a secure session with. The
server transmits the encrypted premaster secret to another server for
decryption. The server receives the decrypted premaster secret and
continues with the handshake procedure including generating a
master secret from the decrypted premaster secret and generating one
or more session keys that are used in the secure session for
encrypting and decrypting communication between the client device
and the server.
[0017]. 20170237571SECURE SESSION CAPABILITY USING
PRIVATE KEY US - 17.08.2017 Int.Class H04L 29/06Appl.No
1527119OApplicant CLOUDFLARE, INC.Inventor Sebastian
Andreas Henry Pahl A server establishes a secure session with a
client device where a private key used in the handshake when
establishing the secure session is stored in a different server. During
the handshake procedure, the server receives a premaster secret that
has been encrypted using a public key bound with a domain for
which the client device is attempting to establish a secure session
with. The server transmits the encrypted premaster secret to the
different server for decryption along with other information
necessary to compute a master secret. The different server decrypts
the encrypted premaster secret, generates the master secret, and
transmits the master secret to the server. The server receives the
master secret and continues with the handshake procedure including
generating one or more session keys that are used in the secure
session for encrypting and decrypting communication between the
client device and the server.
[0018]. .Groupings of alternative elements or embodiments of the
invention disclosed herein are not to be construed as limitations.
Each group member can be referred to and claimed individually or in
any combination with other members of the group or other elements
found herein. One or more members of a group can be included in,
[0019]. or deleted from, a group for reasons of convenience and/or
patentability. When any such inclusion or deletion occurs, the
specification is herein deemed to contain the group as modified thus
fulfilling the written description of all Markus groups used in the
appended claims.
[0020]. As used in the description herein and throughout the claims that
follow, the meaning of "a," "an," and "the" includes plural reference
unless the context clearly dictates otherwise. Also, as used in the
description herein, the meaning of "in" includes "in" and "on" unless
the context clearly dictates otherwise.
[0021]. The recitation of ranges of values herein is merely intended to
serve as a shorthand method of referring individually to each separate
value falling within the range. Unless otherwise indicated herein, each
individual value is incorporated into the specification as if it were
individually recited herein. All methods described herein can be
performed in any suitable order unless otherwise indicated herein or
otherwise clearly contradicted by context.
[0022]. The use of any and all examples, or exemplary language (e.g.
"such as") provided with respect to certain embodiments herein is
intended merely to better illuminate the invention and does not pose a
limitation on the scope of the invention otherwise claimed. No
language in the specification should be construed as indicating any
non-claimed element essential to the practice of the invention.
[0023]. The above information disclosed in this Background section is
only for enhancement of understanding of the background of the
invention and therefore it may contain information that does not form
the prior art that is already known in this country to a person of
ordinary skill in the art.
[0024]. The present invention mainly cures and solves the technical
problems existing in the prior art. In response to these problems, the
present invention provides intelligent secure private key sharing
framework for advanced communication using asymmetric
cryptography and blockchain.
[0025]. As one aspect of the present invention relates to A system for
intelligent secure private key sharing framework for advanced
communication using asymmetric cryptography and blockchain
, wherein the system is arranged for wireless transmission between
local network units in an area and for secure transmission according
to a secure private key sharing framework, the asymmetric
cryptography and blockchain system comprising:a first local network
unit arranged to act as the communication unit according to the
secure private key sharing framework for getting access to the local
network, and a second local network unit arranged to act as a
communication unit according to the secure private key sharing
framework for enabling access to the local network by the
communication unit; wherein the communication unit comprises a
communication transmission unit arranged to receive, from the communication unit, a local network access request according to the secure private key sharing framework, the local network access request including an encoded second private key and a first private key, and a communication computing unit comprising a memory arranged to have, for the communication unit, a communication private key and a corresponding communication public key and to have, for the asymmetric cryptography and blockchain system, a local network private key and a corresponding local network public key, the communication computing unit arranged to:derive a first shared key based on the local network public key and the first private key,decode the encoded second private key using the first shared key, verify whether the encoded second private key was encoded by the first shared key and, generate security data using the second private key and the communication public key, derive a second shared key based on the first private key, the second private key and the local network public key,protect asymmetric cryptography and blockchain unit, using the second shared key, at least one of the security data and communication private key, and generate a local network access message according to the secure private key sharing framework, the local network access message including at least one of the protected security data and protected communication private key; the communication unit comprising: an wireless tranmission unit arranged for wireless tranmission; an Asymmetric cryptography and blockchain unit arranged to: acquire a data pattern via an out-of band channel, the data pattern being provided in the area and representing the local network private key; and an computing unit comprising a memory arranged to have the first private key and a corresponding first public key and to have the second private key and a corresponding second public key, the computing unit arranged to: derive the first shared key based on the local network private key and the first public key,encode the second private key using the first shared key, generate the local network access request according to the secure private key sharing framework, the local network access request including the encoded second private key and the first private key, and transfer the local network access request to the communication unit via the wireless tranmission unit; the computing unit further arranged to: receive the local network access message from the communication via the wireless tranmission unit, derive the second shared key based.
[0026]. The principle objective of the present invention is to provide
intelligent secure private key sharing framework for advanced
communication using asymmetric cryptography and blockchain.
[0027]. Further clarify various aspects of some example embodiments of
the present invention, a more particular description of the invention
will be rendered by reference to specific embodiments thereof which
are illustrated in the appended drawings. It is appreciated that these
drawings depict only illustrated embodiments of the invention and are
therefore not to be considered limiting of its scope. The invention will
be described and explained with additional specificity and detail
through the use of the accompanying drawings.
[0028]. In order that the advantages of the present invention will be
easily understood, a detailed description of the invention is discussed
below in conjunction with the appended drawings, which, however,
should not be considered to limit the scope of the invention to the
accompanying drawings, in which:
[0029]. Figure 1 shows an exemplary representation of intelligent secure
private key sharing framework for advanced communication using
asymmetric cryptography and blockchain, according to the present
invention.
[0030]. The present invention discloses intelligent secure private key
sharing framework for advanced communication using asymmetric
cryptography and blockchain.
[0031]. Figure 1 shows the exemplary representation of intelligent
secure private key sharing framework for advanced communication
using asymmetric cryptography and blockchain, according to the
present invention.
[0032]. Although the present disclosure has been described with the
purpose of two intelligent secure private key sharing framework for
advanced communication using asymmetric cryptography and
blockchain, it should be appreciated that the same has been done
merely to illustrate the invention in an exemplary manner and to
highlight any other purpose or function for which explained structures
or configurations could be used and is covered within the scope of the
present disclosure.
[0033]. The system is arranged for wireless transmission
between local network units in an area and for secure transmission
according to a secure private key sharing framework,
[0034]. The asymmetric cryptography and blockchain system
comprising a first local network unit arranged to act as the
communication unit according to the secure private key sharing
framework for getting access to the local network.
[0035]. A second local network unit is arranged to act as a
communication unit according to the secure private key sharing
framework for enabling access to the local network by the
communication unit.
[0036]. The communication unit comprises a communication
transmission unit arranged to receive, from the communication
unit, a local network access request according to the secure private
key sharing framework, the local network access request including
an encoded second private key and a first private key.
[0037]. A communication computing unit comprising a memory
arranged to have, for the communication unit, a communication
private key and a corresponding communication public key and to
have, for the asymmetric cryptography and blockchain system, a
local network private key and a corresponding local network
public key, the communication computing unit arranged to derive a
first shared key based on the local network public key and the first
private key, decode the encoded second private key using the first
shared key, verify whether the encoded second private key was
encoded by the first shared key and, generate security data using
the second private key and the communication public key, derive
a second shared key based on the first private key, the second
private key and the local network public key, protect asymmetric
cryptography and blockchain unit, using the second shared key, at
least one of the security data and communication private key, and
generate a local network access message according to the secure
private key sharing framework, the local network access message
including at least one of the protected security data and protected
communication private key; the communication unit comprising:
[0038]. an wireless transmission unit arranged for wireless
tranmission; an Asymmetric cryptography and blockchain unit
arranged to acquire a data pattern via an out-of-band channel, the
data pattern being provided in the area and representing the local
network private key; and an computing unit comprising a memory
arranged to have the first private key and a corresponding first
public key and to have the second private key and a corresponding
second public key, the computing unit arranged to: derive the first
shared key based on th e local network private key and the first
public key, encode the second private key using the first shared
key, generate the local network access request according to the
secure private key sharing framework, the local network access
request including the encoded second private key and the first
private key, and transfer the local network access request to the
communication unit via the wireless tranmission unit
[0039]. The figures and the foregoing description give examples of
embodiments. Those skilled in the art will appreciate that one or
more of the described elements may well be combined into a single
functional element. Alternatively, certain elements may be split into
multiple functional elements. Elements from one embodiment may
be added to another embodiment. For example, order of processes
described herein may be changed and are not limited to the manner
described herein. Moreover, the actions of any block diagram need
not be implemented in the order shown; nor do all of the acts need to
be necessarily performed. Also, those acts that are not dependent on
other acts may be performed in parallel with the other acts. The
scope of embodiments is by no means limited by these specific
examples.
[0040]. Although implementations of the invention have been described
in a language specific to structural features and/or methods, it is to
be understood that the appended claims are not necessarily limited to
the specific features or methods described. Rather, the specific
features and methods are disclosed as examples of implementations
of the invention.
Claims (1)
1. A system for intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain , wherein the system is arranged for wireless transmission between local network units in an area and for secure transmission according to a secure private key sharing framework, the asymmetric cryptography and blockchain system comprising: a first local network unit arranged to act as the communication unit according to the secure private key sharing framework for getting access to the local network, and a second local network unit arranged to act as a communication unit according to the secure private key sharing framework for enabling access to the local network by the communication unit; wherein the communication unit comprises a communication transmission unit arranged to receive, from the communication unit, a local network access request according to the secure private key sharing framework, the local network access request including an encoded second private key and a first private key, and a communication computing unit comprising a memory arranged to have, for the communication unit, a communication private key and a corresponding communication public key and to have, for the asymmetric cryptography and blockchain system, a local network private key and a corresponding local network public key, the communication computing unit arranged to: derive a first shared key based on the local network public key and the first private key, decode the encoded second private key using the first shared key, verify whether the encoded second private key was encoded by the first shared key and, generate security data using the second private key and the communication public key, derive a second shared key based on the first private key, the second private key and the local network public key, protect asymmetric cryptography and blockchain unit, using the second shared key, at least one of the security data and communication private key, and generate a local network access message according to the secure private key sharing framework, the local network access message including at least one of the protected security data and protected communication private key; the communication unit comprising: an wireless tranmission unit arranged for wireless transmission; an Asymmetric cryptography and blockchain unit arranged to: acquire a data pattern via an out-of-band channel, the data pattern being provided in the area and representing the local network private key; and an computing unit comprising a memory arranged to have the first private key and a corresponding first public key and to have the second private key and a corresponding second public key, the computing unit arranged to: derive the first shared key based on the local network private key and the first public key, encode the second private key using the first shared key, generate the local network access request according to the secure private key sharing framework, the local network access request including the encoded second private key and the first private key, and transfer the local network access request to the communication unit via the wireless transmission unit; the computing unit further arranged to: receive the local network access message from the communication via the wireless transmission unit, derive the second shared key based on the first public key, the second public key and the local network private key, verify whether at least one of the protected security data and the protected communication private key was asymmetric cryptography and blockchain unit protected by the second shared key, and engage the secure transmission based on the second public key and the security data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021104202A AU2021104202A4 (en) | 2021-07-15 | 2021-07-15 | Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021104202A AU2021104202A4 (en) | 2021-07-15 | 2021-07-15 | Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021104202A4 true AU2021104202A4 (en) | 2022-04-07 |
Family
ID=80932761
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021104202A Ceased AU2021104202A4 (en) | 2021-07-15 | 2021-07-15 | Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2021104202A4 (en) |
-
2021
- 2021-07-15 AU AU2021104202A patent/AU2021104202A4/en not_active Ceased
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6636968B1 (en) | Multi-node encryption and key delivery | |
US7774594B2 (en) | Method and system for providing strong security in insecure networks | |
CA2690778C (en) | System and method of creating and sending broadcast and multicast data | |
EP3345335B1 (en) | Homomorphic based method and system for securely aggregating data | |
US20100042841A1 (en) | Updating and Distributing Encryption Keys | |
EP3291480B1 (en) | Secure data transmission | |
KR20170035665A (en) | Apparatus and method for exchanging encryption key | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
US20050141718A1 (en) | Method of transmitting and receiving message using encryption/decryption key | |
Kuppuswamy et al. | New Innovation of Arabic language Encryption Technique using New symmetric key algorithm | |
CN101047945B (en) | Mobile communication system and customer temporary identity distribution method | |
AU2021104202A4 (en) | Intelligent secure private key sharing framework for advanced communication using asymmetric cryptography and blockchain | |
WO2012075761A1 (en) | Method and system for encrypting multimedia message service | |
JP2002152189A (en) | Open key distributing method, and open key transmitting device and open key receiving device used for the same method | |
CN112019553B (en) | Data sharing method based on IBE/IBBE | |
JP2006262425A (en) | Mutual authentication on network by public key cryptosystem, and mutual exchange system of public key | |
Pushpa | Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms | |
JPH11187008A (en) | Delivering method for cryptographic key | |
JP2010113181A (en) | Key management method, key generation method, encryption processing method, decryption processing method, access control method, communication network system | |
JP2000349748A (en) | Secret information sharing method | |
Chetan et al. | Security framework for VANET for privacy preservation | |
JPH09130376A (en) | User password authentication method | |
JPH10164048A (en) | Secret keeping communication method in large-scale service and subscriber equipment and server therefor | |
KR100567321B1 (en) | Method for reusing key using separated encryption key for sending and receiving | |
Usman et al. | A Novel Approach to Enhance the Security of Keys Shared by Users in WLAN Environments Using 3DES Algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |