BR112022023105A2 - Gerar chaves com o uso de corrupção controlada em redes de computador - Google Patents
Gerar chaves com o uso de corrupção controlada em redes de computadorInfo
- Publication number
- BR112022023105A2 BR112022023105A2 BR112022023105A BR112022023105A BR112022023105A2 BR 112022023105 A2 BR112022023105 A2 BR 112022023105A2 BR 112022023105 A BR112022023105 A BR 112022023105A BR 112022023105 A BR112022023105 A BR 112022023105A BR 112022023105 A2 BR112022023105 A2 BR 112022023105A2
- Authority
- BR
- Brazil
- Prior art keywords
- devices
- operative
- solution
- corruption
- controlled
- Prior art date
Links
- 238000000034 method Methods 0.000 abstract 3
- 230000005540 biological transmission Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Biomedical Technology (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Selective Calling Equipment (AREA)
Abstract
GERAR CHAVES COM O USO DE CORRUPÇÃO CONTROLADA EM REDES DE COMPUTADOR. A presente invenção refere-se a uma plataforma e/ou método agnóstico e um sistema operacional para proteger dados, documentos, dispositivos, comunicações e transações. As modalidades da presente invenção podem ser operacionais para autenticar usuários e pode ser operacional com qualquer sistema de cliente. O método e sistema são operacionais para distribuir porções únicas de informações relacionadas anônimas dentre múltiplos dispositivos. Esses dispositivos distribuem porções únicas de informações anônimas e são usados pela solução para proteger transmissões de dados sensíveis e para autenticar usuários, dados, documentos, dispositivo e transações. Quando usado para autenticação, informações relacionadas a login não são armazenadas em qualquer porção da solução, usuários e dispositivos são autenticados anonimamente. A solução também permite que um usuário acesse porções presas do sistema de cliente através de um processo semiautônomo e sem ter que revelar a chave do usuário.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/872,127 US10903997B2 (en) | 2017-10-19 | 2020-05-11 | Generating keys using controlled corruption in computer networks |
PCT/IB2021/053964 WO2021229410A1 (en) | 2020-05-11 | 2021-05-10 | Generating keys using controlled corruption in computer networks |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112022023105A2 true BR112022023105A2 (pt) | 2023-01-17 |
Family
ID=78525415
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112022023105A BR112022023105A2 (pt) | 2020-05-11 | 2021-05-10 | Gerar chaves com o uso de corrupção controlada em redes de computador |
Country Status (9)
Country | Link |
---|---|
EP (1) | EP4150858A1 (pt) |
JP (1) | JP2023525774A (pt) |
KR (1) | KR20230024279A (pt) |
CN (1) | CN116018592A (pt) |
AU (1) | AU2021272736A1 (pt) |
BR (1) | BR112022023105A2 (pt) |
CA (1) | CA3178613A1 (pt) |
MX (1) | MX2022014179A (pt) |
WO (1) | WO2021229410A1 (pt) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2348447B1 (en) * | 2009-12-18 | 2014-07-16 | CompuGroup Medical AG | A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device |
US10103885B2 (en) * | 2016-01-20 | 2018-10-16 | Mastercard International Incorporated | Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography |
MX2020003721A (es) * | 2017-10-19 | 2020-10-12 | Autnhive Corp | Sistema y metodo para generar y depositar claves para autenticacion multipunto. |
-
2021
- 2021-05-10 BR BR112022023105A patent/BR112022023105A2/pt unknown
- 2021-05-10 KR KR1020227043195A patent/KR20230024279A/ko active Search and Examination
- 2021-05-10 WO PCT/IB2021/053964 patent/WO2021229410A1/en unknown
- 2021-05-10 CA CA3178613A patent/CA3178613A1/en active Pending
- 2021-05-10 AU AU2021272736A patent/AU2021272736A1/en active Pending
- 2021-05-10 MX MX2022014179A patent/MX2022014179A/es unknown
- 2021-05-10 JP JP2022568446A patent/JP2023525774A/ja active Pending
- 2021-05-10 CN CN202180049502.1A patent/CN116018592A/zh active Pending
- 2021-05-10 EP EP21804512.8A patent/EP4150858A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
WO2021229410A1 (en) | 2021-11-18 |
CA3178613A1 (en) | 2021-11-18 |
CN116018592A (zh) | 2023-04-25 |
MX2022014179A (es) | 2022-12-02 |
JP2023525774A (ja) | 2023-06-19 |
AU2021272736A1 (en) | 2023-01-19 |
EP4150858A1 (en) | 2023-03-22 |
KR20230024279A (ko) | 2023-02-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Amjad et al. | Forward and backward private searchable encryption with SGX | |
US20160036826A1 (en) | Secure content packaging using multiple trusted execution environments | |
CN104021157B (zh) | 云存储中基于双线性对的关键词可搜索加密方法 | |
US7747024B2 (en) | System and method for generalized authentication | |
ES2881486T3 (es) | Sistema y método para ofuscar un identificador para proteger al identificador de una apropiación no permitida | |
Namasudra et al. | Security, privacy, trust, and anonymity | |
BRPI0711042A8 (pt) | Sistema, método para possibilitar um emissor de direitos criar dados de autenticação relacionados à um objeto e/ou criptografar o objeto usando uma chave diversificada e dispositivo | |
US20090260077A1 (en) | Security-enhanced log in | |
US8782403B1 (en) | Method and apparatus for securing confidential data for a user in a computer | |
MX2020003721A (es) | Sistema y metodo para generar y depositar claves para autenticacion multipunto. | |
CN103414562B (zh) | 基于url指纹技术的用户权限控制方法及装置 | |
CN104601579A (zh) | 一种保障信息安全的计算机系统及其方法 | |
CN104580487A (zh) | 一种海量数据存储系统及处理方法 | |
CN106022155A (zh) | 用于数据库安全管理的方法及服务器 | |
US10298558B2 (en) | User authentication relying on recurring public events for shared secrets | |
WO2019205389A1 (zh) | 电子装置、基于区块链的身份验证方法、程序和计算机存储介质 | |
Lee et al. | Reverse‐safe authentication protocol for secure USB memories | |
US20160085916A1 (en) | Privacy preserving genome sequence management | |
CN103516523A (zh) | 一种基于云存储的数据加密体系架构 | |
Ulybyshev et al. | Privacy-preserving data dissemination in untrusted cloud | |
US20180075252A1 (en) | Access control through data structures | |
Zhang et al. | Tenant-led ciphertext information flow control for cloud virtual machines | |
BR112022023105A2 (pt) | Gerar chaves com o uso de corrupção controlada em redes de computador | |
Nasirinejad et al. | SASy username and password management on the cloud | |
KR20140011542A (ko) | 로그인 시스템 및 방법 |