MY157055A - A system and method for quantum mobile access verification - Google Patents
A system and method for quantum mobile access verificationInfo
- Publication number
- MY157055A MY157055A MYPI2010005982A MYPI2010005982A MY157055A MY 157055 A MY157055 A MY 157055A MY PI2010005982 A MYPI2010005982 A MY PI2010005982A MY PI2010005982 A MYPI2010005982 A MY PI2010005982A MY 157055 A MY157055 A MY 157055A
- Authority
- MY
- Malaysia
- Prior art keywords
- mav
- key
- encryption
- keys
- data streaming
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
THE PRESENT INVENTION PROVIDES A SYSTEM (100) FOR QUANTUM MOBILE ACCESS VERIFICATION, Q-MAV THAT GENERATES TRUE RANDOM IDENTICAL KEYS FOR ENCRYPTION AND DECRYPTION OF DATA STREAMING. THE SYSTEM (100) COMPRISES AT LEAST ONE QUANTUM RANDOM NUMBER GENERATOR, QRNG WITH AT LEAST ONE MULTI OUTPUT PROCESSOR, MOP (106); AT LEAST ONE ENCRYPTED STORAGE (102); AT LEAST ONE BIOMETRIC SYSTEM (101); AT LEAST ONE ENCRYPTION SYSTEM (107); AND AT LEAST ONE DISPLAY SYSTEM (104), CHARACTERIZED IN THAT THE AT LEAST ONE QRNG WITH AT LEAST ONE MOP (106) GENERATES TRUE RANDOM IDENTICAL KEYS, KNOWN AS TRULY RANDOM INDEPENDENT-IDENTICAL KEYS OR i2 KEYS, FOR ENCRYPTION AND DECRYPTION OF DATA STREAMING WHEREIN FIRST KEY IS USED TO ENCRYPT HARDWARE IDENTIFICATION OF Q-MAV AND AUTHORITY CODE, AND SECOND KEY IS USED TO DECRYPT ENCRYPTED DATA THAT HAS BEEN SENT TO AN ACCESS SYSTEM. ANOTHER EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD FOR GENERATING TRUE RANDOM IDENTICAL KEYS FOR ENCRYPTION AND DECRYPTION OF DATA STREAMING. Q-MAV SYSTEM IS FIRST ACTIVATED (402). THEREAFTER, AT LEAST ONE SECURE SERVICE AND AT LEAST ONE UN-SECURE SERVICE IS DISPLAYED AT DISPLAY OF Q-MAV (404). USERS FINGER PRINT IS SCANNED IF SECURE SERVICE IS CHOSEN BY USER (406) AND USERS FINGERPRINT IDENTIFY IS VERIFIED BY Q-MAV SYSTEM (408). SUBSEQUENTLY, LOG ERROR IS DISPLAYED AND SEVERAL MEANS IS PROVIDED TO ATTEMPT IF VERIFICATION PROCESS IS UNSUCCESSFUL (410) AND USERS ACCOUNT IS LOCKED WHEN NUMBER OF ATTEMPTS IS EXCEEDED WHEREIN Q-MAV WILL FUNCTION AS MOBILE PHONE DEVICE (412). HARDWARE IDENTIFICATION OR QMAV AND AUTHORITY CODE IS PROVIDED IF VERIFICATION WAS VERIFIED (414) AND HARDWARE IDENTIFICATION AND AUTHORITY CODE IS SENT TO ENCRYPTION SYSTEM (416). TRULY RANDOM INDEPENDENT-IDENTICAL KEYS, i2-KEYS IS GENERATED AS PIN NUMBERS BY QRNG-MOP (418) AND HARDWARE IDENTIFICATION AND AUTHORITY CODE IS ENCRYPTED USING FIRST i2-KEY (420). THEREAFTER, ENCRYPTED DATA STREAMING IS SENT TO ACCESS SYSTEM BEING USED VIA TRANSMITTER CHANNEL MEANS (422); SECOND i2-KEY IS DISPLAYED ON DISPLAY SYSTEM OF Q-MAV SYSTEM (424) AND SECOND i2-KEY IS INSERTED INTO ACCESS SYSTEM USED TO DECRYPT ENCRYPTED DATA STREAMING (426). SUBSEQUENTLY, AUTHORIZATION FROM ACCESS SYSTEM IS OBTAIN IF DECRYPTION PROCESS IS SUCCESSFUL OR THE KEY IS VALIDATED (428) AND KEY IS DELETED IF TIME FRAME IS EXCEEDED WHEREIN THE TIME FRAME IS DETERMINED BASED ON USER?S PREFERENCE (430). THE MOST ILLUSTRATIVEDRAWING IS
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2010005982A MY157055A (en) | 2010-12-15 | 2010-12-15 | A system and method for quantum mobile access verification |
PCT/MY2011/000163 WO2012081968A1 (en) | 2010-12-15 | 2011-06-30 | A system and method for quantum mobile access verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2010005982A MY157055A (en) | 2010-12-15 | 2010-12-15 | A system and method for quantum mobile access verification |
Publications (1)
Publication Number | Publication Date |
---|---|
MY157055A true MY157055A (en) | 2016-04-29 |
Family
ID=46244923
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2010005982A MY157055A (en) | 2010-12-15 | 2010-12-15 | A system and method for quantum mobile access verification |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY157055A (en) |
WO (1) | WO2012081968A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115035634A (en) * | 2022-04-26 | 2022-09-09 | 江铃汽车股份有限公司 | Bluetooth key ID resetting method, system, readable storage medium and computer |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114124367B (en) * | 2020-08-31 | 2023-03-24 | Oppo广东移动通信有限公司 | Data transmission method, device and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8477940B2 (en) * | 2005-07-15 | 2013-07-02 | Tyfone, Inc. | Symmetric cryptography with user authentication |
US20100046755A1 (en) * | 2005-12-07 | 2010-02-25 | Fiske Software Llc | Cryptography related to keys with signature |
US8194858B2 (en) * | 2009-02-19 | 2012-06-05 | Physical Optics Corporation | Chaotic cipher system and method for secure communication |
-
2010
- 2010-12-15 MY MYPI2010005982A patent/MY157055A/en unknown
-
2011
- 2011-06-30 WO PCT/MY2011/000163 patent/WO2012081968A1/en active Application Filing
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115035634A (en) * | 2022-04-26 | 2022-09-09 | 江铃汽车股份有限公司 | Bluetooth key ID resetting method, system, readable storage medium and computer |
CN115035634B (en) * | 2022-04-26 | 2024-03-26 | 江铃汽车股份有限公司 | Bluetooth key ID resetting method, system, readable storage medium and computer |
Also Published As
Publication number | Publication date |
---|---|
WO2012081968A1 (en) | 2012-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10146983B2 (en) | Fingerprint decryption method and device | |
KR101874721B1 (en) | Identity authentication system, apparatus, and method, and identity authentication request apparatus | |
EP3132368B1 (en) | Method and apparatus of verifying usability of biological characteristic image | |
RU2007135358A (en) | SMALL DIGITAL SIGNATURES BASED ON OPEN KEY USED FOR AUTHENTICATION | |
WO2017016447A1 (en) | Two-dimensional code mask encryption and decryption method and system | |
CN102946392A (en) | URL (Uniform Resource Locator) data encrypted transmission method and system | |
CA2530944A1 (en) | Challenge response system and method | |
RU2013140418A (en) | SAFE ACCESS TO PERSONAL HEALTH RECORDS IN EMERGENCIES | |
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
JP2014508456A5 (en) | ||
RU2005105579A (en) | HIGHLY RELIABLE BIOMETRIC DEVICE | |
CN109684129B (en) | Data backup recovery method, storage medium, encryption machine, client and server | |
CN103560892A (en) | Secret key generation method and secret key generation device | |
US20130198826A1 (en) | Authenticate a fingerprint image | |
KR100826522B1 (en) | Apparatus and method for dynamic ciphering in mobile communication system | |
WO2017128486A1 (en) | Unlocking method, unlocking apparatus, wearable intelligent device and terminal | |
CN103701596A (en) | Document access method, system and equipment and document access request response method, system and equipment | |
CN113630241B (en) | Password recovery method and system, cloud server and electronic equipment | |
KR101485968B1 (en) | Method for accessing to encoded files | |
WO2013025091A1 (en) | Mobile access control system involving a quantum random number generator | |
CN112351043A (en) | Vehicle navigation factory setting password management method and system | |
MY157055A (en) | A system and method for quantum mobile access verification | |
CN105282738A (en) | Security authentication method for mobile terminal | |
CN111726320B (en) | Data processing method, device and equipment | |
US20180332040A1 (en) | Method of login control |