CA3034028A1 - Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique - Google Patents
Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique Download PDFInfo
- Publication number
- CA3034028A1 CA3034028A1 CA3034028A CA3034028A CA3034028A1 CA 3034028 A1 CA3034028 A1 CA 3034028A1 CA 3034028 A CA3034028 A CA 3034028A CA 3034028 A CA3034028 A CA 3034028A CA 3034028 A1 CA3034028 A1 CA 3034028A1
- Authority
- CA
- Canada
- Prior art keywords
- data
- peripheral device
- recipient
- randomly
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Il devient de plus en plus difficile de sécuriser les informations. Les progrès techniques, ainsi que léchange doutils et dinformations entre les pirates informatiques, compliquent encore davantage les efforts dassurer que les données de nature délicate demeurent sécures. Des systèmes et des procédés pour sécuriser uniquement les données de chaque communication sont décrits. Les systèmes et procédés décrits permettent la transmission de données au-delà de multiples frontières (p. ex., nationales ou linguistiques, ou bien liées aux systèmes dexploitation, aux plateformes ou aux marques) tout en maintenant la sécurité souhaitée des données de lexpéditeur.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA3034028A CA3034028C (fr) | 2019-02-15 | 2019-02-15 | Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA3034028A CA3034028C (fr) | 2019-02-15 | 2019-02-15 | Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique |
Publications (2)
Publication Number | Publication Date |
---|---|
CA3034028A1 true CA3034028A1 (fr) | 2020-08-15 |
CA3034028C CA3034028C (fr) | 2022-07-05 |
Family
ID=72039899
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA3034028A Active CA3034028C (fr) | 2019-02-15 | 2019-02-15 | Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA3034028C (fr) |
-
2019
- 2019-02-15 CA CA3034028A patent/CA3034028C/fr active Active
Also Published As
Publication number | Publication date |
---|---|
CA3034028C (fr) | 2022-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10263785B1 (en) | Cryptography method and system for securing data via electronic transmission | |
JP7086327B2 (ja) | アプリケーション間でユーザ情報を安全に転送すること | |
CN108476133A (zh) | 通过部分可信的第三方进行的密钥交换 | |
CN107251476A (zh) | 保密通信管理 | |
US9374222B2 (en) | Secure communication of data between devices | |
US10643204B2 (en) | Cryptography method and system for securing data via electronic transmission | |
JP6363032B2 (ja) | 鍵付替え方向制御システムおよび鍵付替え方向制御方法 | |
WO2016086788A1 (fr) | Procédé et appareil de cryptage/décryptage de données sur terminal mobile | |
CN112287377A (zh) | 基于联邦学习的模型训练方法、计算机设备及存储介质 | |
WO2019127265A1 (fr) | Procédé d'écriture de données basé sur un contrat intelligent de chaîne de blocs, et dispositif et support de stockage | |
WO2020155812A1 (fr) | Procédé et dispositif de stockage de données, et appareil | |
JP2012080152A (ja) | 暗号化システム、暗号化装置、復号装置、暗号化システムプログラム及び暗号化方法 | |
JP6961324B2 (ja) | 検索可能暗号処理システム | |
CN112291268A (zh) | 信息的传输方法、装置、设备以及存储介质 | |
CN107104938B (zh) | 建立安全的数据交换通道方法、客户端及计算机可读介质 | |
US11882097B2 (en) | Providing substitute domain information in a virtual private network | |
Hamed et al. | Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption. | |
US10699021B2 (en) | Method and a device for secure storage of at least one element of digital information, and system comprising such device | |
WO2018213875A1 (fr) | Cryptographie asymétrique et authentification | |
EP3700123A1 (fr) | Procede et systeme cryptographiques pour transmission electronique de donnees | |
CA3034028C (fr) | Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique | |
AU2020281038A1 (en) | Cryptography Method and System for Securing Data Via Electronic Transmission | |
KR20190007336A (ko) | 보안채널 생성 방법 및 그 장치와 이를 이용한 보안정보의 송수신 방법 및 그 장치 | |
Arvin S. Lat et al. | SOUL System: secure online USB login system | |
JP2015201773A (ja) | 再暗号化方法,再暗号化システム及び再暗号化装置 |