IN2014CN04372A - - Google Patents
Info
- Publication number
- IN2014CN04372A IN2014CN04372A IN4372CHN2014A IN2014CN04372A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A IN 4372CHN2014 A IN4372CHN2014 A IN 4372CHN2014A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A
- Authority
- IN
- India
- Prior art keywords
- template
- random number
- public key
- storage portion
- stores
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2011/077623 WO2013080320A1 (ja) | 2011-11-30 | 2011-11-30 | データ処理装置及びデータ処理方法及びプログラム |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2014CN04372A true IN2014CN04372A (cg-RX-API-DMAC7.html) | 2015-09-04 |
Family
ID=48534844
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN4372CHN2014 IN2014CN04372A (cg-RX-API-DMAC7.html) | 2011-11-30 | 2011-11-30 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US20140247939A1 (cg-RX-API-DMAC7.html) |
| EP (1) | EP2787681B1 (cg-RX-API-DMAC7.html) |
| JP (1) | JP5586795B2 (cg-RX-API-DMAC7.html) |
| CN (1) | CN103975553B (cg-RX-API-DMAC7.html) |
| IN (1) | IN2014CN04372A (cg-RX-API-DMAC7.html) |
| WO (1) | WO2013080320A1 (cg-RX-API-DMAC7.html) |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| USRE48146E1 (en) | 2012-01-25 | 2020-08-04 | Mitsubishi Electric Corporation | Data search device, data search method, computer readable medium storing data search program, data registration device, data registration method, computer readable medium storing data registration program, and information processing device |
| JP5963936B2 (ja) | 2013-02-25 | 2016-08-03 | 三菱電機株式会社 | サーバ装置、秘匿検索プログラム,記録媒体及び秘匿検索システム |
| US8966277B2 (en) * | 2013-03-15 | 2015-02-24 | Mitsubishi Electric Research Laboratories, Inc. | Method for authenticating an encryption of biometric data |
| US10680816B2 (en) * | 2014-03-26 | 2020-06-09 | Continental Teves Ag & Co. Ohg | Method and system for improving the data security during a communication process |
| US10592682B2 (en) * | 2015-02-20 | 2020-03-17 | Mitsubishi Electric Corporation | Data storage apparatus, data processing method, and computer readable medium adding a user attribute of a revoked user to an embedded decryption condition while encrypted data remains in an encrypted state |
| WO2019014425A1 (en) * | 2017-07-13 | 2019-01-17 | Pindrop Security, Inc. | SAFE PARTY WITH SEVERAL PARTIES KNOWING NO VOICE IMPRESSIONS |
| EP3752940B1 (en) * | 2018-02-13 | 2023-09-27 | Fingerprint Cards Anacatum IP AB | Updating biometric template protection keys |
| US10665244B1 (en) | 2018-03-22 | 2020-05-26 | Pindrop Security, Inc. | Leveraging multiple audio channels for authentication |
| US11354422B2 (en) * | 2018-11-02 | 2022-06-07 | Rank One Computing Corporation | Optimizations for privacy-preserving distance metric computation |
| WO2020121461A1 (ja) * | 2018-12-12 | 2020-06-18 | 日本電気株式会社 | 照合システム、クライアントおよびサーバ |
| JPWO2020121458A1 (ja) * | 2018-12-12 | 2021-10-21 | 日本電気株式会社 | 照合システム、クライアントおよびサーバ |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| US20240104182A1 (en) | 2021-01-29 | 2024-03-28 | Nec Corporation | Biometric authentication system, template updating method therefor, storage medium, biometric authentication client device, and biometric authentication server device |
| US12493417B2 (en) * | 2022-06-02 | 2025-12-09 | Micron Technology, Inc. | Verified key replacement in secure memory devices |
| US20230396431A1 (en) * | 2022-06-02 | 2023-12-07 | Micron Technology, Inc. | Error reduction during cryptographic key updates in secure memory devices |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5991414A (en) * | 1997-09-12 | 1999-11-23 | International Business Machines Corporation | Method and apparatus for the secure distributed storage and retrieval of information |
| WO2006054208A1 (en) * | 2004-11-16 | 2006-05-26 | Koninklijke Philips Electronics N.V. | Securely computing a similarity measure |
| JP4961214B2 (ja) | 2006-03-29 | 2012-06-27 | 株式会社日立情報制御ソリューションズ | 生体認証方法およびシステム |
| US8995665B1 (en) * | 2008-08-20 | 2015-03-31 | Symantec Corporation | Role based encryption without key management system |
| CN102598576B (zh) | 2009-10-29 | 2014-09-17 | 三菱电机株式会社 | 数据处理装置 |
| JP5573293B2 (ja) * | 2010-03-30 | 2014-08-20 | 富士通株式会社 | 認証装置、暗号化装置、トークンデバイス、認証方法、および認証プログラム |
-
2011
- 2011-11-30 EP EP11876549.4A patent/EP2787681B1/en not_active Not-in-force
- 2011-11-30 IN IN4372CHN2014 patent/IN2014CN04372A/en unknown
- 2011-11-30 CN CN201180075191.2A patent/CN103975553B/zh not_active Expired - Fee Related
- 2011-11-30 JP JP2013546896A patent/JP5586795B2/ja not_active Expired - Fee Related
- 2011-11-30 WO PCT/JP2011/077623 patent/WO2013080320A1/ja not_active Ceased
- 2011-11-30 US US14/350,740 patent/US20140247939A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| CN103975553A (zh) | 2014-08-06 |
| CN103975553B (zh) | 2016-10-12 |
| JPWO2013080320A1 (ja) | 2015-04-27 |
| WO2013080320A1 (ja) | 2013-06-06 |
| JP5586795B2 (ja) | 2014-09-10 |
| EP2787681A1 (en) | 2014-10-08 |
| US20140247939A1 (en) | 2014-09-04 |
| EP2787681A4 (en) | 2015-10-14 |
| EP2787681B1 (en) | 2016-10-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IN2014CN04372A (cg-RX-API-DMAC7.html) | ||
| IN2015DN04037A (cg-RX-API-DMAC7.html) | ||
| BR112017011967A2 (pt) | dispositivo de geração de chave, dispositivo de criptografia de chave pública, dispositivo de descriptografia de chave privada, método de geração de chave configurado para gerar uma chave pública, método de criptografia de chave pública, método de descriptografia de chave privada, e, programa de computador | |
| AU2017269736A1 (en) | Multiple-link cryptologic blockchain | |
| MX2016001900A (es) | Criptografia nado utilizando funciones unidireccionales. | |
| MX2014002142A (es) | Cifrado y descifrado basados en atributos jerarquicos. | |
| BR112017017425A2 (pt) | meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador | |
| IN2014CN04110A (cg-RX-API-DMAC7.html) | ||
| MX2014004838A (es) | Sistema y metodo para gestion de claves para dominio de seguridad del emisor utilizando especificaciones de plataformas globales. | |
| IN2013MU01234A (cg-RX-API-DMAC7.html) | ||
| GB2498039B (en) | Password recovery service | |
| WO2016122747A3 (en) | Storage for encrypted data with enhanced security | |
| ATE496500T1 (de) | Verfahren zum individuellen anpassen eines hörgeräts oder einer hörhilfe | |
| WO2014139341A8 (zh) | 密钥管理方法及系统 | |
| WO2010141445A3 (en) | Workgroup key wrapping for community of interest membership authentication | |
| NZ613485A (en) | Method for authenticating first communication equipment by means of second communication equipment | |
| GB2490407B (en) | Joint encryption of data | |
| UA122327C2 (uk) | Nado- криптографія з генераторами ключів | |
| BR112013001728A2 (pt) | métodos para criptografar um valor introduzido em um dispositivo de usuário, para verificar um valor comunicado a um sistema de autenticação via uma rede de comunicações, e para comunicar um valor introduzido em um dispositivo de usuário a um sistema de autenticação via uma rede de comunicações, dispositivo de usuário, sistema, software, e, meio legível por computador. | |
| WO2014164180A3 (en) | Decoy bits method for direct encryption and key generation | |
| EP3704829B8 (en) | Cryptographic key generation system and method | |
| WO2015023368A3 (en) | Apparatus and method for key update for use in a block cipher algorithm | |
| NZ603822A (en) | Permutation data transform to enhance security | |
| MY159284A (en) | A method for encrypting and decrypting data and a system therefor | |
| GB2500557A (en) | Data encryption |