CA3034028C - Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique - Google Patents

Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique Download PDF

Info

Publication number
CA3034028C
CA3034028C CA3034028A CA3034028A CA3034028C CA 3034028 C CA3034028 C CA 3034028C CA 3034028 A CA3034028 A CA 3034028A CA 3034028 A CA3034028 A CA 3034028A CA 3034028 C CA3034028 C CA 3034028C
Authority
CA
Canada
Prior art keywords
data
peripheral device
recipient
key
originator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA3034028A
Other languages
English (en)
Other versions
CA3034028A1 (fr
Inventor
Thomas J. Waters
Richard H. Waters
Robert N. Barrett
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA3034028A priority Critical patent/CA3034028C/fr
Publication of CA3034028A1 publication Critical patent/CA3034028A1/fr
Application granted granted Critical
Publication of CA3034028C publication Critical patent/CA3034028C/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Il devient de plus en plus difficile de sécuriser les informations. Les progrès techniques, ainsi que léchange doutils et dinformations entre les pirates informatiques, compliquent encore davantage les efforts dassurer que les données de nature délicate demeurent sécures. Des systèmes et des procédés pour sécuriser uniquement les données de chaque communication sont décrits. Les systèmes et procédés décrits permettent la transmission de données au-delà de multiples frontières (p. ex., nationales ou linguistiques, ou bien liées aux systèmes dexploitation, aux plateformes ou aux marques) tout en maintenant la sécurité souhaitée des données de lexpéditeur.
CA3034028A 2019-02-15 2019-02-15 Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique Active CA3034028C (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA3034028A CA3034028C (fr) 2019-02-15 2019-02-15 Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA3034028A CA3034028C (fr) 2019-02-15 2019-02-15 Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique

Publications (2)

Publication Number Publication Date
CA3034028A1 CA3034028A1 (fr) 2020-08-15
CA3034028C true CA3034028C (fr) 2022-07-05

Family

ID=72039899

Family Applications (1)

Application Number Title Priority Date Filing Date
CA3034028A Active CA3034028C (fr) 2019-02-15 2019-02-15 Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique

Country Status (1)

Country Link
CA (1) CA3034028C (fr)

Also Published As

Publication number Publication date
CA3034028A1 (fr) 2020-08-15

Similar Documents

Publication Publication Date Title
US10263785B1 (en) Cryptography method and system for securing data via electronic transmission
JP7086327B2 (ja) アプリケーション間でユーザ情報を安全に転送すること
CN108476133A (zh) 通过部分可信的第三方进行的密钥交换
US10643204B2 (en) Cryptography method and system for securing data via electronic transmission
CN107251476A (zh) 保密通信管理
US9374222B2 (en) Secure communication of data between devices
US8484459B2 (en) Secure transfer of information
JP6363032B2 (ja) 鍵付替え方向制御システムおよび鍵付替え方向制御方法
WO2016086788A1 (fr) Procédé et appareil de cryptage/décryptage de données sur terminal mobile
CN112287377A (zh) 基于联邦学习的模型训练方法、计算机设备及存储介质
JP2006221161A (ja) Cartier対形成の暗号化適用
WO2019127265A1 (fr) Procédé d'écriture de données basé sur un contrat intelligent de chaîne de blocs, et dispositif et support de stockage
JP2012080152A (ja) 暗号化システム、暗号化装置、復号装置、暗号化システムプログラム及び暗号化方法
JP6961324B2 (ja) 検索可能暗号処理システム
CN112291268A (zh) 信息的传输方法、装置、设备以及存储介质
US11177959B2 (en) Cryptography method and system for securing data via electronic transmission
WO2018213875A1 (fr) Cryptographie asymétrique et authentification
EP3700123A1 (fr) Procede et systeme cryptographiques pour transmission electronique de donnees
CA3034028C (fr) Procede et methode de cryptographie pour securiser les donnees par la transmission de donnees electronique
AU2020281038A1 (en) Cryptography Method and System for Securing Data Via Electronic Transmission
Arvin S. Lat et al. SOUL System: secure online USB login system
Cai et al. RFID authentication protocol design methodology
JP2015201773A (ja) 再暗号化方法,再暗号化システム及び再暗号化装置
US20240107318A1 (en) A method and a system for securely sharing datasets via glyphs
US9189638B1 (en) Systems and methods for multi-function and multi-purpose cryptography