BR112022023105A2 - Gerar chaves com o uso de corrupção controlada em redes de computador - Google Patents

Gerar chaves com o uso de corrupção controlada em redes de computador

Info

Publication number
BR112022023105A2
BR112022023105A2 BR112022023105A BR112022023105A BR112022023105A2 BR 112022023105 A2 BR112022023105 A2 BR 112022023105A2 BR 112022023105 A BR112022023105 A BR 112022023105A BR 112022023105 A BR112022023105 A BR 112022023105A BR 112022023105 A2 BR112022023105 A2 BR 112022023105A2
Authority
BR
Brazil
Prior art keywords
devices
operative
solution
corruption
controlled
Prior art date
Application number
BR112022023105A
Other languages
English (en)
Inventor
Selva Kumar Vijayanarayanan Devi
Original Assignee
Autnhive Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US16/872,127 external-priority patent/US10903997B2/en
Application filed by Autnhive Corp filed Critical Autnhive Corp
Publication of BR112022023105A2 publication Critical patent/BR112022023105A2/pt

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/30Compression, e.g. Merkle-Damgard construction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Selective Calling Equipment (AREA)

Abstract

GERAR CHAVES COM O USO DE CORRUPÇÃO CONTROLADA EM REDES DE COMPUTADOR. A presente invenção refere-se a uma plataforma e/ou método agnóstico e um sistema operacional para proteger dados, documentos, dispositivos, comunicações e transações. As modalidades da presente invenção podem ser operacionais para autenticar usuários e pode ser operacional com qualquer sistema de cliente. O método e sistema são operacionais para distribuir porções únicas de informações relacionadas anônimas dentre múltiplos dispositivos. Esses dispositivos distribuem porções únicas de informações anônimas e são usados pela solução para proteger transmissões de dados sensíveis e para autenticar usuários, dados, documentos, dispositivo e transações. Quando usado para autenticação, informações relacionadas a login não são armazenadas em qualquer porção da solução, usuários e dispositivos são autenticados anonimamente. A solução também permite que um usuário acesse porções presas do sistema de cliente através de um processo semiautônomo e sem ter que revelar a chave do usuário.
BR112022023105A 2020-05-11 2021-05-10 Gerar chaves com o uso de corrupção controlada em redes de computador BR112022023105A2 (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16/872,127 US10903997B2 (en) 2017-10-19 2020-05-11 Generating keys using controlled corruption in computer networks
PCT/IB2021/053964 WO2021229410A1 (en) 2020-05-11 2021-05-10 Generating keys using controlled corruption in computer networks

Publications (1)

Publication Number Publication Date
BR112022023105A2 true BR112022023105A2 (pt) 2023-01-17

Family

ID=78525415

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112022023105A BR112022023105A2 (pt) 2020-05-11 2021-05-10 Gerar chaves com o uso de corrupção controlada em redes de computador

Country Status (9)

Country Link
EP (1) EP4150858A1 (pt)
JP (1) JP2023525774A (pt)
KR (1) KR20230024279A (pt)
CN (1) CN116018592A (pt)
AU (1) AU2021272736A1 (pt)
BR (1) BR112022023105A2 (pt)
CA (1) CA3178613A1 (pt)
MX (1) MX2022014179A (pt)
WO (1) WO2021229410A1 (pt)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2348447B1 (en) * 2009-12-18 2014-07-16 CompuGroup Medical AG A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device
US10103885B2 (en) * 2016-01-20 2018-10-16 Mastercard International Incorporated Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
MX2020003721A (es) * 2017-10-19 2020-10-12 Autnhive Corp Sistema y metodo para generar y depositar claves para autenticacion multipunto.

Also Published As

Publication number Publication date
WO2021229410A1 (en) 2021-11-18
CA3178613A1 (en) 2021-11-18
CN116018592A (zh) 2023-04-25
MX2022014179A (es) 2022-12-02
JP2023525774A (ja) 2023-06-19
AU2021272736A1 (en) 2023-01-19
EP4150858A1 (en) 2023-03-22
KR20230024279A (ko) 2023-02-20

Similar Documents

Publication Publication Date Title
Amjad et al. Forward and backward private searchable encryption with SGX
US20160036826A1 (en) Secure content packaging using multiple trusted execution environments
CN104021157B (zh) 云存储中基于双线性对的关键词可搜索加密方法
US7747024B2 (en) System and method for generalized authentication
ES2881486T3 (es) Sistema y método para ofuscar un identificador para proteger al identificador de una apropiación no permitida
Namasudra et al. Security, privacy, trust, and anonymity
BRPI0711042A8 (pt) Sistema, método para possibilitar um emissor de direitos criar dados de autenticação relacionados à um objeto e/ou criptografar o objeto usando uma chave diversificada e dispositivo
US20090260077A1 (en) Security-enhanced log in
US8782403B1 (en) Method and apparatus for securing confidential data for a user in a computer
MX2020003721A (es) Sistema y metodo para generar y depositar claves para autenticacion multipunto.
CN103414562B (zh) 基于url指纹技术的用户权限控制方法及装置
CN104601579A (zh) 一种保障信息安全的计算机系统及其方法
CN104580487A (zh) 一种海量数据存储系统及处理方法
CN106022155A (zh) 用于数据库安全管理的方法及服务器
US10298558B2 (en) User authentication relying on recurring public events for shared secrets
WO2019205389A1 (zh) 电子装置、基于区块链的身份验证方法、程序和计算机存储介质
Lee et al. Reverse‐safe authentication protocol for secure USB memories
US20160085916A1 (en) Privacy preserving genome sequence management
CN103516523A (zh) 一种基于云存储的数据加密体系架构
Ulybyshev et al. Privacy-preserving data dissemination in untrusted cloud
US20180075252A1 (en) Access control through data structures
Zhang et al. Tenant-led ciphertext information flow control for cloud virtual machines
BR112022023105A2 (pt) Gerar chaves com o uso de corrupção controlada em redes de computador
Nasirinejad et al. SASy username and password management on the cloud
KR20140011542A (ko) 로그인 시스템 및 방법