IN2014CN04372A - - Google Patents
Info
- Publication number
- IN2014CN04372A IN2014CN04372A IN4372CHN2014A IN2014CN04372A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A IN 4372CHN2014 A IN4372CHN2014 A IN 4372CHN2014A IN 2014CN04372 A IN2014CN04372 A IN 2014CN04372A
- Authority
- IN
- India
- Prior art keywords
- template
- random number
- public key
- storage portion
- stores
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2011/077623 WO2013080320A1 (ja) | 2011-11-30 | 2011-11-30 | データ処理装置及びデータ処理方法及びプログラム |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2014CN04372A true IN2014CN04372A (enExample) | 2015-09-04 |
Family
ID=48534844
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN4372CHN2014 IN2014CN04372A (enExample) | 2011-11-30 | 2011-11-30 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US20140247939A1 (enExample) |
| EP (1) | EP2787681B1 (enExample) |
| JP (1) | JP5586795B2 (enExample) |
| CN (1) | CN103975553B (enExample) |
| IN (1) | IN2014CN04372A (enExample) |
| WO (1) | WO2013080320A1 (enExample) |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2013111284A1 (ja) | 2012-01-25 | 2013-08-01 | 三菱電機株式会社 | データ検索装置、データ検索方法、データ検索プログラム、データ登録装置、データ登録方法、データ登録プログラムおよび情報処理装置 |
| WO2014128958A1 (ja) | 2013-02-25 | 2014-08-28 | 三菱電機株式会社 | サーバ装置、秘匿検索プログラム,記録媒体及び秘匿検索システム |
| US8966277B2 (en) * | 2013-03-15 | 2015-02-24 | Mitsubishi Electric Research Laboratories, Inc. | Method for authenticating an encryption of biometric data |
| DE102015205428A1 (de) * | 2014-03-26 | 2015-10-01 | Continental Teves Ag & Co. Ohg | Verfahren und System zur Verbesserung der Datensicherheit bei einem Kommunikationsvorgang |
| WO2016132546A1 (ja) * | 2015-02-20 | 2016-08-25 | 三菱電機株式会社 | データ保管装置及びデータ処理方法及びデータ処理プログラム |
| WO2019014425A1 (en) * | 2017-07-13 | 2019-01-17 | Pindrop Security, Inc. | SAFE PARTY WITH SEVERAL PARTIES KNOWING NO VOICE IMPRESSIONS |
| WO2019160472A1 (en) | 2018-02-13 | 2019-08-22 | Fingerprint Cards Ab | Updating biometric template protection keys |
| US10665244B1 (en) | 2018-03-22 | 2020-05-26 | Pindrop Security, Inc. | Leveraging multiple audio channels for authentication |
| US11354422B2 (en) * | 2018-11-02 | 2022-06-07 | Rank One Computing Corporation | Optimizations for privacy-preserving distance metric computation |
| US12063293B2 (en) * | 2018-12-12 | 2024-08-13 | Nec Corporation | Collation system, client and server |
| JPWO2020121458A1 (ja) * | 2018-12-12 | 2021-10-21 | 日本電気株式会社 | 照合システム、クライアントおよびサーバ |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| WO2022162884A1 (ja) * | 2021-01-29 | 2022-08-04 | 日本電気株式会社 | 生体認証システム、そのテンプレート更新方法、記録媒体、生体認証クライアント装置及び生体認証サーバ装置 |
| US20230396431A1 (en) * | 2022-06-02 | 2023-12-07 | Micron Technology, Inc. | Error reduction during cryptographic key updates in secure memory devices |
| US12493417B2 (en) * | 2022-06-02 | 2025-12-09 | Micron Technology, Inc. | Verified key replacement in secure memory devices |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5991414A (en) * | 1997-09-12 | 1999-11-23 | International Business Machines Corporation | Method and apparatus for the secure distributed storage and retrieval of information |
| US8281148B2 (en) * | 2004-11-16 | 2012-10-02 | Koninklijke Philips Electronics N.V. | Securely computing a similarity measure |
| JP4961214B2 (ja) | 2006-03-29 | 2012-06-27 | 株式会社日立情報制御ソリューションズ | 生体認証方法およびシステム |
| US8995665B1 (en) * | 2008-08-20 | 2015-03-31 | Symantec Corporation | Role based encryption without key management system |
| US8958552B2 (en) * | 2009-10-29 | 2015-02-17 | Mitsubishi Electric Corporation | Data processing device |
| JP5573293B2 (ja) * | 2010-03-30 | 2014-08-20 | 富士通株式会社 | 認証装置、暗号化装置、トークンデバイス、認証方法、および認証プログラム |
-
2011
- 2011-11-30 IN IN4372CHN2014 patent/IN2014CN04372A/en unknown
- 2011-11-30 WO PCT/JP2011/077623 patent/WO2013080320A1/ja not_active Ceased
- 2011-11-30 US US14/350,740 patent/US20140247939A1/en not_active Abandoned
- 2011-11-30 JP JP2013546896A patent/JP5586795B2/ja not_active Expired - Fee Related
- 2011-11-30 CN CN201180075191.2A patent/CN103975553B/zh not_active Expired - Fee Related
- 2011-11-30 EP EP11876549.4A patent/EP2787681B1/en not_active Not-in-force
Also Published As
| Publication number | Publication date |
|---|---|
| JPWO2013080320A1 (ja) | 2015-04-27 |
| EP2787681A4 (en) | 2015-10-14 |
| CN103975553B (zh) | 2016-10-12 |
| EP2787681B1 (en) | 2016-10-12 |
| WO2013080320A1 (ja) | 2013-06-06 |
| CN103975553A (zh) | 2014-08-06 |
| US20140247939A1 (en) | 2014-09-04 |
| JP5586795B2 (ja) | 2014-09-10 |
| EP2787681A1 (en) | 2014-10-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IN2014CN04372A (enExample) | ||
| IN2015DN04037A (enExample) | ||
| MX2016001900A (es) | Criptografia nado utilizando funciones unidireccionales. | |
| MX2014002142A (es) | Cifrado y descifrado basados en atributos jerarquicos. | |
| BR112017017425A2 (pt) | meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador | |
| IN2014CN04110A (enExample) | ||
| MX2014004838A (es) | Sistema y metodo para gestion de claves para dominio de seguridad del emisor utilizando especificaciones de plataformas globales. | |
| ATE496500T1 (de) | Verfahren zum individuellen anpassen eines hörgeräts oder einer hörhilfe | |
| WO2010141445A3 (en) | Workgroup key wrapping for community of interest membership authentication | |
| NZ613485A (en) | Method for authenticating first communication equipment by means of second communication equipment | |
| GB2490407B (en) | Joint encryption of data | |
| UA122327C2 (uk) | Nado- криптографія з генераторами ключів | |
| BR112013001728A2 (pt) | métodos para criptografar um valor introduzido em um dispositivo de usuário, para verificar um valor comunicado a um sistema de autenticação via uma rede de comunicações, e para comunicar um valor introduzido em um dispositivo de usuário a um sistema de autenticação via uma rede de comunicações, dispositivo de usuário, sistema, software, e, meio legível por computador. | |
| WO2008099831A1 (ja) | 鍵生成装置、鍵導出装置、暗号化装置、復号化装置、方法、及び、プログラム | |
| WO2014164180A3 (en) | Decoy bits method for direct encryption and key generation | |
| GB201210004D0 (en) | Random number distruibution | |
| EP3704829B8 (en) | Cryptographic key generation system and method | |
| WO2015023368A3 (en) | Apparatus and method for key update for use in a block cipher algorithm | |
| NZ603822A (en) | Permutation data transform to enhance security | |
| SG10201606165SA (en) | A key generation and distribution method based on identity-based cryptography | |
| GB2500557A (en) | Data encryption | |
| WO2012051076A3 (en) | A method for securing credentials in a remote repository | |
| WO2012106466A3 (en) | Data encryption method | |
| MY153911A (en) | Dual coding coherent phase protocol | |
| WO2013024230A3 (fr) | Dispositif et procédé de compression de clés publiques pour algorithme de chiffrement pleinement homomorphique |