JPWO2020255793A1 - - Google Patents
Info
- Publication number
- JPWO2020255793A1 JPWO2020255793A1 JP2021528109A JP2021528109A JPWO2020255793A1 JP WO2020255793 A1 JPWO2020255793 A1 JP WO2020255793A1 JP 2021528109 A JP2021528109 A JP 2021528109A JP 2021528109 A JP2021528109 A JP 2021528109A JP WO2020255793 A1 JPWO2020255793 A1 JP WO2020255793A1
- Authority
- JP
- Japan
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/80—Camera processing pipelines; Components thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2019113731 | 2019-06-19 | ||
PCT/JP2020/022668 WO2020255793A1 (ja) | 2019-06-19 | 2020-06-09 | 暗号鍵生成装置、暗号鍵生成方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
JPWO2020255793A1 true JPWO2020255793A1 (ja) | 2020-12-24 |
Family
ID=74037227
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021528109A Pending JPWO2020255793A1 (ja) | 2019-06-19 | 2020-06-09 |
Country Status (7)
Country | Link |
---|---|
US (1) | US20220271930A1 (ja) |
EP (1) | EP3989206A4 (ja) |
JP (1) | JPWO2020255793A1 (ja) |
KR (1) | KR20220023992A (ja) |
CN (1) | CN113939820A (ja) |
TW (1) | TWI772820B (ja) |
WO (2) | WO2020255575A1 (ja) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI806577B (zh) * | 2022-04-28 | 2023-06-21 | 瑞昱半導體股份有限公司 | 數位簽章方法及數位簽章的驗證方法 |
CN116431846B (zh) * | 2023-06-14 | 2023-08-18 | 泰山学院 | 一种学生敏感信息存储系统及方法 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060036864A1 (en) * | 1999-12-28 | 2006-02-16 | Parulski Kenneth A | Digital camera with image authentication |
JP4226534B2 (ja) * | 2004-09-07 | 2009-02-18 | 三菱電機インフォメーションシステムズ株式会社 | コンテンツ多段暗号化システムおよびコンテンツ多段暗号化プログラム |
US7703126B2 (en) * | 2006-03-31 | 2010-04-20 | Intel Corporation | Hierarchical trust based posture reporting and policy enforcement |
US20100084472A1 (en) * | 2008-10-02 | 2010-04-08 | Silverbrook Research Pty Ltd | Method of distinguishing first coding pattern from second coding pattern |
US8615651B1 (en) * | 2010-05-17 | 2013-12-24 | Google Inc. | Offline shared security key calculation |
JP6648555B2 (ja) * | 2016-02-29 | 2020-02-14 | 富士ゼロックス株式会社 | 情報処理装置及びプログラム |
JP2017184198A (ja) | 2016-03-31 | 2017-10-05 | ソニー株式会社 | イメージセンサ、撮像装置、イメージセンサ特定方法、画像偽造防止方法および画像改変制限方法 |
WO2018043742A1 (ja) * | 2016-09-05 | 2018-03-08 | 国立大学法人北海道大学 | 量子暗号鍵出力装置、量子暗号鍵通信システム及び量子暗号鍵出力方法 |
JP2019020431A (ja) * | 2017-07-11 | 2019-02-07 | ソニーセミコンダクタソリューションズ株式会社 | 固体撮像装置及び情報処理装置 |
US10418405B2 (en) * | 2017-09-05 | 2019-09-17 | Sony Semiconductor Solutions Corporation | Sensor chip and electronic apparatus |
EP3474485B1 (en) * | 2017-10-20 | 2020-05-27 | Secure-IC SAS | Key generation from an imaging sensor |
EP3769467B1 (en) * | 2018-03-23 | 2024-02-28 | nChain Licensing AG | Computer-implemented system and method for exchange of data |
US20210273795A1 (en) * | 2020-02-28 | 2021-09-02 | Seagate Technology Llc | Trusted imaging |
-
2020
- 2020-05-07 WO PCT/JP2020/018533 patent/WO2020255575A1/ja active Application Filing
- 2020-06-09 JP JP2021528109A patent/JPWO2020255793A1/ja active Pending
- 2020-06-09 US US17/618,018 patent/US20220271930A1/en active Pending
- 2020-06-09 KR KR1020217040450A patent/KR20220023992A/ko unknown
- 2020-06-09 CN CN202080042538.2A patent/CN113939820A/zh active Pending
- 2020-06-09 WO PCT/JP2020/022668 patent/WO2020255793A1/ja unknown
- 2020-06-09 EP EP20825529.9A patent/EP3989206A4/en active Pending
- 2020-06-12 TW TW109119812A patent/TWI772820B/zh active
Also Published As
Publication number | Publication date |
---|---|
CN113939820A (zh) | 2022-01-14 |
TWI772820B (zh) | 2022-08-01 |
US20220271930A1 (en) | 2022-08-25 |
WO2020255793A1 (ja) | 2020-12-24 |
WO2020255575A1 (ja) | 2020-12-24 |
KR20220023992A (ko) | 2022-03-03 |
EP3989206A4 (en) | 2022-08-10 |
EP3989206A1 (en) | 2022-04-27 |
TW202115561A (zh) | 2021-04-16 |
Similar Documents
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20230424 |
|
RD02 | Notification of acceptance of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7422 Effective date: 20230424 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20240507 |