IN2014DN08235A - - Google Patents

Info

Publication number
IN2014DN08235A
IN2014DN08235A IN8235DEN2014A IN2014DN08235A IN 2014DN08235 A IN2014DN08235 A IN 2014DN08235A IN 8235DEN2014 A IN8235DEN2014 A IN 8235DEN2014A IN 2014DN08235 A IN2014DN08235 A IN 2014DN08235A
Authority
IN
India
Application number
Inventor
Michael Fiske
Original Assignee
Michael Fiske
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Michael Fiske filed Critical Michael Fiske
Publication of IN2014DN08235A publication Critical patent/IN2014DN08235A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
IN8235DEN2014 2012-03-05 2014-10-01 IN2014DN08235A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261634778P 2012-03-05 2012-03-05
PCT/US2013/029187 WO2013134306A1 (en) 2012-03-05 2013-03-05 One-time passcodes with asymmetric keys

Publications (1)

Publication Number Publication Date
IN2014DN08235A true IN2014DN08235A (en) 2015-05-15

Family

ID=49117273

Family Applications (1)

Application Number Title Priority Date Filing Date
IN8235DEN2014 IN2014DN08235A (en) 2012-03-05 2014-10-01

Country Status (3)

Country Link
US (2) US9235697B2 (en)
IN (1) IN2014DN08235A (en)
WO (1) WO2013134306A1 (en)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10268843B2 (en) 2011-12-06 2019-04-23 AEMEA Inc. Non-deterministic secure active element machine
US9858401B2 (en) * 2011-08-09 2018-01-02 Biogy, Inc. Securing transactions against cyberattacks
WO2013134306A1 (en) 2012-03-05 2013-09-12 Michael Fiske One-time passcodes with asymmetric keys
US9270649B1 (en) * 2013-03-11 2016-02-23 Emc Corporation Secure software authenticator data transfer between processing devices
US9407441B1 (en) * 2013-06-26 2016-08-02 Emc Corporation Adding entropy to key generation on a mobile device
US20170063530A1 (en) * 2013-08-13 2017-03-02 Michael Stephen Fiske NADO Cryptography with Key Generators
US9178708B2 (en) * 2013-12-02 2015-11-03 Guardtime Ip Holdings Limited Non-deterministic time systems and methods
US9658831B2 (en) 2014-03-11 2017-05-23 Sony Corporation Optical random number generator and method for generating a random number
US10360395B2 (en) * 2014-11-28 2019-07-23 Fiske Software, Llc Hiding information in noise
US20160217464A1 (en) * 2015-01-27 2016-07-28 Paypal, Inc. Mobile transaction devices enabling unique identifiers for facilitating credit checks
US10069864B2 (en) * 2015-03-20 2018-09-04 Oracle International Corporation Method and system for using smart images
WO2016187432A1 (en) * 2015-05-19 2016-11-24 Michael Fiske Hiding a public key exchange in noise
US10075450B2 (en) * 2015-05-29 2018-09-11 Rockwell Automation Technologies, Inc. One time use password for temporary privilege escalation in a role-based access control (RBAC) system
US9876783B2 (en) 2015-12-22 2018-01-23 International Business Machines Corporation Distributed password verification
US10313351B2 (en) 2016-02-22 2019-06-04 At&T Intellectual Property I, L.P. Dynamic passcodes in association with a wireless access point
CN107231234B (en) 2016-03-25 2020-06-09 创新先进技术有限公司 Identity registration method and device
US10558978B1 (en) 2016-12-30 2020-02-11 Wells Fargo Bank, N.A. One-time passcode
US10163084B2 (en) 2017-02-13 2018-12-25 Bank Of America Corporation Banking systems controlled by data bearing records
US10306061B1 (en) 2017-06-16 2019-05-28 Wells Fargo Bank, N.A. System for creating a voice authentication credential
EP3643101B1 (en) * 2017-06-23 2023-08-02 3M Innovative Properties Company Wireless authentication systems
CN108847928B (en) * 2018-04-26 2021-04-06 如般量子科技有限公司 Communication system and communication method for realizing information encryption and decryption transmission based on group type quantum key card
US11032275B2 (en) * 2018-10-05 2021-06-08 Mimecast Services Ltd. System for improved identification and authentication
US11165581B2 (en) * 2018-10-05 2021-11-02 Mimecast Services Ltd. System for improved identification and authentication
US11374759B2 (en) * 2018-10-29 2022-06-28 Xiid Corporation Username-less and password-less one-time identification and authentication code method and system
US10990356B2 (en) * 2019-02-18 2021-04-27 Quantum Lock Technologies LLC Tamper-resistant smart factory
WO2020171841A1 (en) * 2019-02-18 2020-08-27 Quantum Lock Technologies LLC Quantum random number generator lock
KR20200100481A (en) * 2019-02-18 2020-08-26 삼성전자주식회사 Electronic device for authenticating biometric information and operating method thereof
US11654635B2 (en) 2019-04-18 2023-05-23 The Research Foundation For Suny Enhanced non-destructive testing in directed energy material processing
US11271911B2 (en) 2020-02-26 2022-03-08 Amera Lot Inc. Method and apparatus for imprinting private key on IoT
US10817590B1 (en) 2020-02-26 2020-10-27 Amera IoT Inc. Method and apparatus for creating and using quantum resistant keys
US11258602B2 (en) 2020-02-26 2022-02-22 Amera IoT Inc. Method and apparatus for secure private key storage on IoT device
US11256783B2 (en) 2020-02-26 2022-02-22 Amera IoT Inc. Method and apparatus for simultaneous key generation on device and server for secure communication
EP3799683B1 (en) * 2020-03-06 2022-10-05 Alipay (Hangzhou) Information Technology Co., Ltd. Methods and devices for generating and verifying passwords

Family Cites Families (133)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3029381B2 (en) 1994-01-10 2000-04-04 富士通株式会社 Data converter
US5825880A (en) 1994-01-13 1998-10-20 Sudia; Frank W. Multi-step digital signature method and system
US5802199A (en) 1994-11-28 1998-09-01 Smarttouch, Llc Use sensitive identification system
US5604801A (en) 1995-02-03 1997-02-18 International Business Machines Corporation Public key data communications system under control of a portable security device
US5768382A (en) 1995-11-22 1998-06-16 Walker Asset Management Limited Partnership Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols
US7319987B1 (en) 1996-08-29 2008-01-15 Indivos Corporation Tokenless financial access system
JP3558488B2 (en) 1997-05-20 2004-08-25 エニー株式会社 Cryptographic communication system
US7290288B2 (en) 1997-06-11 2007-10-30 Prism Technologies, L.L.C. Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
US6105131A (en) 1997-06-13 2000-08-15 International Business Machines Corporation Secure server and method of operation for a distributed information system
US6064880A (en) 1997-06-25 2000-05-16 Nokia Mobile Phones Limited Mobile station having short code memory system-level backup and restoration function
DE19747654A1 (en) 1997-10-29 1999-05-20 Telefunken Microelectron Procedure for operating a security system
US6041410A (en) 1997-12-22 2000-03-21 Trw Inc. Personal identification fob
US6307956B1 (en) 1998-04-07 2001-10-23 Gerald R. Black Writing implement for identity verification system
US6636973B1 (en) 1998-09-08 2003-10-21 Hewlett-Packard Development Company, L.P. Secure and dynamic biometrics-based token generation for access control and authentication
US6311270B1 (en) 1998-09-14 2001-10-30 International Business Machines Corporation Method and apparatus for securing communication utilizing a security processor
US6607136B1 (en) 1998-09-16 2003-08-19 Beepcard Inc. Physical presence digital authentication system
US20020124176A1 (en) 1998-12-14 2002-09-05 Michael Epstein Biometric identification mechanism that preserves the integrity of the biometric information
JP2000270376A (en) 1999-03-17 2000-09-29 Fujitsu Ltd Mobile phone maintenance service system and method for maintenance service
US6748588B1 (en) 1999-03-31 2004-06-08 Microsoft Corporation One-pass greedy-pattern-matching finite-state-machine code generation
EP1128598A4 (en) 1999-09-07 2007-06-20 Sony Corp Contents management system, device, method, and program storage medium
US6853988B1 (en) 1999-09-20 2005-02-08 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
US7080037B2 (en) 1999-09-28 2006-07-18 Chameleon Network Inc. Portable electronic authorization system and method
US20010045451A1 (en) 2000-02-28 2001-11-29 Tan Warren Yung-Hang Method and system for token-based authentication
US6993658B1 (en) * 2000-03-06 2006-01-31 April System Design Ab Use of personal communication devices for user authentication
US7066382B2 (en) 2000-04-17 2006-06-27 Robert Kaplan Method and apparatus for transferring or receiving data via the Internet securely
US7047426B1 (en) 2000-04-27 2006-05-16 Warranty Corporation Of America Portable computing device communication system and method
DE10022570A1 (en) 2000-05-09 2001-11-15 Giesecke & Devrient Gmbh Method for generating coded record for authentication of person at access- and entrance system, involves generating multi-position PIN-code using coded record
WO2001086860A1 (en) 2000-05-09 2001-11-15 Verizon Laboratories Inc. Stream-cipher method and apparatus
US6732278B2 (en) 2001-02-12 2004-05-04 Baird, Iii Leemon C. Apparatus and method for authenticating access to a network resource
FR2822002B1 (en) 2001-03-12 2003-06-06 France Telecom CRYPTOGRAPHIC AUTHENTICATION BY EPHEMER MODULES
US7516325B2 (en) 2001-04-06 2009-04-07 Certicom Corp. Device authentication in a PKI
US7369688B2 (en) 2001-05-09 2008-05-06 Nanyang Technological Univeristy Method and device for computer-based processing a template minutia set of a fingerprint and a computer readable storage medium
JP2002353952A (en) 2001-05-24 2002-12-06 Sanyo Electric Co Ltd Data terminal equipment
CA2450834C (en) 2001-06-18 2013-08-13 Daon Holdings Limited An electronic data vault providing biometrically protected electronic signatures
DE10136608B4 (en) 2001-07-16 2005-12-08 Francotyp-Postalia Ag & Co. Kg Method and system for real-time recording with security module
GB2381603B (en) 2001-10-30 2005-06-08 F Secure Oyj Method and apparatus for selecting a password
US7249116B2 (en) 2002-04-08 2007-07-24 Fiske Software, Llc Machine learning
GB2387999B (en) 2002-04-24 2004-03-24 Richard Mervyn Gardner Sequential authentication with infinitely variable codes
US7308708B2 (en) 2002-08-02 2007-12-11 Hewlett-Packard Development Company, L.P. Alternate encodings of a biometric identifier
US20040107170A1 (en) 2002-08-08 2004-06-03 Fujitsu Limited Apparatuses for purchasing of goods and services
US20040117636A1 (en) 2002-09-25 2004-06-17 David Cheng System, method and apparatus for secure two-tier backup and retrieval of authentication information
US7215769B2 (en) 2002-11-06 2007-05-08 Fiske Software Llc Non-autonomous dynamical orbit cryptography
US7774603B2 (en) 2003-03-04 2010-08-10 Sony Corporation Wireless device registration
US7398260B2 (en) 2003-03-24 2008-07-08 Fiske Software Llc Effector machine computation
US7103772B2 (en) 2003-05-02 2006-09-05 Giritech A/S Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
US7848493B2 (en) 2003-06-24 2010-12-07 Hewlett-Packard Development Company, L.P. System and method for capturing media
US7519989B2 (en) 2003-07-17 2009-04-14 Av Thenex Inc. Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions
US7669236B2 (en) 2004-11-18 2010-02-23 Biogy, Inc. Determining whether to grant access to a passcode protected system
US7831050B2 (en) 2003-12-04 2010-11-09 Geraldo Alexandre Barbosa Fast multi-photon key distribution scheme secured by quantum noise
DE60320322T2 (en) 2003-12-24 2009-06-18 Telefonaktiebolaget Lm Ericsson (Publ) AUTHENTICATION IN A COMMUNICATION NETWORK
JP4288184B2 (en) 2004-01-09 2009-07-01 株式会社エヌ・ティ・ティ・ドコモ Key update method, cryptographic system, cryptographic server, terminal device and external device
US20050193198A1 (en) 2004-01-27 2005-09-01 Jean-Michel Livowsky System, method and apparatus for electronic authentication
US7643637B2 (en) 2004-02-10 2010-01-05 Microsoft Corporation Efficient code constructions via cryptographic assumptions
US20070258595A1 (en) 2004-03-11 2007-11-08 Universal Electronics Inc. Syncronizing Device-Specific Encrypted Data to and from Mobile Devices Using Detachable Storage Media
US20050210267A1 (en) 2004-03-18 2005-09-22 Jun Sugano User authentication method and system, information terminal device and service providing server, subject identification method and system, correspondence confirmation method and system, object confirmation method and system, and program products for them
US7886345B2 (en) * 2004-07-02 2011-02-08 Emc Corporation Password-protection module
JP2008514975A (en) 2004-09-24 2008-05-08 シナプティック ラボラトリーズ リミテッド s box
JP4533389B2 (en) 2004-10-27 2010-09-01 三菱電機株式会社 Time certification server, terminal device, time certification method, and time certification program
CN1773905B (en) 2004-11-10 2010-08-18 日电(中国)有限公司 Method, equipment and system for generating anonymous common key in safety communication system
US20060107067A1 (en) 2004-11-15 2006-05-18 Max Safal Identification card with bio-sensor and user authentication method
WO2006054340A1 (en) 2004-11-17 2006-05-26 Fujitsu Limited Portable wireless terminal and its security system
US7979716B2 (en) 2004-11-18 2011-07-12 Biogy, Inc. Method of generating access keys
US7565548B2 (en) 2004-11-18 2009-07-21 Biogy, Inc. Biometric print quality assurance
US7702911B2 (en) 2004-11-18 2010-04-20 Biogy, Inc. Interfacing with a system that includes a passcode authenticator
US8209751B2 (en) 2004-11-18 2012-06-26 Biogy, Inc. Receiving an access key
US7770018B2 (en) 2004-11-18 2010-08-03 Biogy, Inc. Setting up a security access system
US20090228714A1 (en) * 2004-11-18 2009-09-10 Biogy, Inc. Secure mobile device with online vault
US7707622B2 (en) 2004-11-18 2010-04-27 Biogy, Inc. API for a system having a passcode authenticator
US20060107315A1 (en) 2004-11-18 2006-05-18 Michael Fiske System that uses access keys
US7886155B2 (en) 2004-12-20 2011-02-08 Biogy, Inc. System for generating requests to a passcode protected entity
US20060107309A1 (en) 2004-11-18 2006-05-18 Michael Fiske Using an access key
US20060107041A1 (en) 2004-11-18 2006-05-18 Michael Fiske Assembling a security access system
US8817981B2 (en) 2004-11-18 2014-08-26 Biogy, Inc. Generation of registration codes, keys and passcodes using non-determinism
EP1825374B8 (en) 2004-11-18 2022-08-24 Biogy, Inc. Biometric print quality assurance
US7657033B2 (en) 2004-12-10 2010-02-02 Fiske Software Llc Cryptography related to keys
WO2006069082A2 (en) 2004-12-20 2006-06-29 Bionopoly Llc Access keys
US20080288786A1 (en) 2004-12-20 2008-11-20 Michael Stephen Fiske System with access keys
WO2006091301A2 (en) 2005-01-24 2006-08-31 Bionopoly Llc Passcodes
US20090158049A1 (en) * 2005-04-06 2009-06-18 Michael Stephen Fiske Building a security access system
US7889868B2 (en) 2005-09-30 2011-02-15 Verizon Business Global Llc Quantum key distribution system
US20100046755A1 (en) 2005-12-07 2010-02-25 Fiske Software Llc Cryptography related to keys with signature
US20080294899A1 (en) 2006-01-17 2008-11-27 Boardvantage, Inc. Secure management of document in a client-server environment
US7962755B2 (en) 2006-04-28 2011-06-14 Ceelox, Inc. System and method for biometrically secured, transparent encryption and decryption
US7957532B2 (en) 2006-06-23 2011-06-07 Microsoft Corporation Data protection for a mobile device
US8077933B1 (en) 2006-09-06 2011-12-13 Fiske Software, Llc Matching prints with feature collections
FR2906934B1 (en) * 2006-10-05 2009-01-30 Commissariat Energie Atomique ULTRASENSITIVE OPTICAL SENSOR WITH HIGH TEMPORAL RESOLUTION USING NETWORK COUPLING.
WO2008053279A1 (en) * 2006-11-01 2008-05-08 Danske Bank A/S Logging on a user device to a server
US8041954B2 (en) * 2006-12-07 2011-10-18 Paul Plesman Method and system for providing a secure login solution using one-time passwords
JP2009003501A (en) * 2007-06-19 2009-01-08 Dainippon Printing Co Ltd Onetime password authentication system
US8327450B2 (en) 2007-07-19 2012-12-04 Wells Fargo Bank N.A. Digital safety deposit box
WO2009039223A1 (en) * 2007-09-17 2009-03-26 Vidoop Llc Methods and systems for management of image-based password accounts
US8615087B2 (en) 2008-02-21 2013-12-24 Telcordia Technologies, Inc. OCDM-based photonic encryption system with provable security
US8762447B2 (en) 2008-05-02 2014-06-24 General Electric Company System and method to secure communications over a public network
WO2010030927A2 (en) 2008-09-11 2010-03-18 University Of Utah Research Foundation Method and system for secret key exchange using wireless link characteristics and random device movement
GB0819665D0 (en) 2008-10-27 2008-12-03 Qinetiq Ltd Quantum key dsitribution
GB0915000D0 (en) 2009-08-27 2009-09-30 Univ Bruxelles Quantum random number generation
GB0917060D0 (en) * 2009-09-29 2009-11-11 Qinetiq Ltd Methods and apparatus for use in quantum key distribution
US20140098955A1 (en) 2009-12-15 2014-04-10 Los Alamos National Security, Llc Quantum enabled security for optical communications
GB201001422D0 (en) 2010-01-29 2010-03-17 Hewlett Packard Development Co Quantum key distribution method and apparatus
FR2956541B1 (en) 2010-02-18 2012-03-23 Centre Nat Rech Scient CRYPTOGRAPHIC METHOD FOR COMMUNICATING CONFIDENTIAL INFORMATION.
US8433070B2 (en) 2010-05-17 2013-04-30 Raytheon Bbn Technologies Corp. Systems and methods for stabilization of interferometers for quantum key distribution
GB2481587B (en) * 2010-06-28 2016-03-23 Vodafone Ip Licensing Ltd Authentication
US8554814B2 (en) 2010-08-20 2013-10-08 The Governing Council Of The University Of Toronto Random signal generator using quantum noise
MY150189A (en) 2010-09-27 2013-12-13 Mimos Berhad System and method for quantum key distribution
US20120121080A1 (en) 2010-11-11 2012-05-17 Sap Ag Commutative order-preserving encryption
GB201020424D0 (en) 2010-12-02 2011-01-19 Qinetiq Ltd Quantum key distribution
US9152779B2 (en) 2011-01-16 2015-10-06 Michael Stephen Fiske Protecting codes, keys and user credentials with identity and patterns
US9698979B2 (en) 2011-04-15 2017-07-04 Quintessencelabs Pty Ltd. QKD key management system
WO2012159192A1 (en) 2011-05-26 2012-11-29 Certicom Corp. Randomness for encryption operations
US8478990B2 (en) * 2011-06-02 2013-07-02 Cryptite LLC Mobile transaction methods and devices with three-dimensional colorgram tokens
IL213497A0 (en) 2011-06-12 2011-08-31 Eliphaz Hibshoosh Light public key cryptography
US9858401B2 (en) 2011-08-09 2018-01-02 Biogy, Inc. Securing transactions against cyberattacks
WO2013037062A1 (en) 2011-09-12 2013-03-21 Luetkenhaus Norbert System and method for quantum key distribution
WO2013044192A2 (en) 2011-09-25 2013-03-28 Biogy, Inc. Securing transactions against cyberattacks
US20130089204A1 (en) 2011-10-11 2013-04-11 Nucrypt Llc Quantum encrypted data transmission in optically-amplified wdm communications
WO2013112351A2 (en) 2012-01-23 2013-08-01 The Trustees Of Columbia University In The City Of New York Systems and methods for telecommunication using high-dimensional temporal quantum key distribution
WO2013134306A1 (en) 2012-03-05 2013-09-12 Michael Fiske One-time passcodes with asymmetric keys
US8693691B2 (en) 2012-05-25 2014-04-08 The Johns Hopkins University Embedded authentication protocol for quantum key distribution systems
US9160719B2 (en) 2012-07-20 2015-10-13 Protected Mobility, Llc Hiding ciphertext using a linguistics algorithm with dictionaries
WO2014074194A2 (en) 2012-08-24 2014-05-15 Los Alamos National Security, Llc Scalable software architecture for quantum cryptographic key management
US20150067786A1 (en) 2013-09-04 2015-03-05 Michael Stephen Fiske Visual image authentication and transaction authorization using non-determinism
US20140270165A1 (en) 2013-03-15 2014-09-18 Alexandre Andre DURAND Cryptographic system based on reproducible random sequences
WO2015023332A2 (en) 2013-05-23 2015-02-19 Gridcom Technologies, Inc. Incorruptible public key using quantum cryptography for secure wired and wireless communications
US9430192B2 (en) 2013-06-03 2016-08-30 University Of Windsor Method and system for generating random numbers
US20170063530A1 (en) 2013-08-13 2017-03-02 Michael Stephen Fiske NADO Cryptography with Key Generators
US10403173B2 (en) 2013-08-13 2019-09-03 Fiske Software, Llc NADO cryptography using one-way functions
US20150106623A1 (en) 2013-10-10 2015-04-16 Elwha Llc Methods, systems, and devices for handling image data from captured images
US10756891B2 (en) 2014-04-09 2020-08-25 The Boeing Company Secure data communication
US10171238B2 (en) 2014-04-09 2019-01-01 The Boeing Company Secure data transmission using quantum communication
US20150326392A1 (en) 2014-05-06 2015-11-12 Cavalry Storage, Inc. Matrix-based cryptosystem
US9306739B1 (en) 2014-11-19 2016-04-05 The United States Of America As Represented By The Secretary Of The Navy Quantum key distribution protocol process
US10360395B2 (en) 2014-11-28 2019-07-23 Fiske Software, Llc Hiding information in noise
WO2016187432A1 (en) 2015-05-19 2016-11-24 Michael Fiske Hiding a public key exchange in noise

Also Published As

Publication number Publication date
US9235697B2 (en) 2016-01-12
WO2013134306A1 (en) 2013-09-12
US20170078091A1 (en) 2017-03-16
US20140201536A1 (en) 2014-07-17
US10728027B2 (en) 2020-07-28

Similar Documents

Publication Publication Date Title
IN2014DN08235A (en)
BR112014020022A2 (en)
BR112014017635A2 (en)
BR112014017614A2 (en)
BR112014017659A2 (en)
BR112014017646A2 (en)
BR112014017638A2 (en)
BR112014017607A2 (en)
BR112014027724A2 (en)
BR112014019349A2 (en)
BR112014017634A2 (en)
BR112014017609A2 (en)
BR112014018439A2 (en)
BR112014017673A2 (en)
BR112014018485A2 (en)
BR112014017644A2 (en)
BR112014017647A2 (en)
BR112014017618A2 (en)
BR112014017630A2 (en)
BR112014017652A2 (en)
BR112014017621A2 (en)
BR112014017627A2 (en)
BR112014017623A2 (en)
BR112014017622A2 (en)
BR112014017641A2 (en)