MY157055A - A system and method for quantum mobile access verification - Google Patents

A system and method for quantum mobile access verification

Info

Publication number
MY157055A
MY157055A MYPI2010005982A MYPI2010005982A MY157055A MY 157055 A MY157055 A MY 157055A MY PI2010005982 A MYPI2010005982 A MY PI2010005982A MY PI2010005982 A MYPI2010005982 A MY PI2010005982A MY 157055 A MY157055 A MY 157055A
Authority
MY
Malaysia
Prior art keywords
mav
key
encryption
keys
data streaming
Prior art date
Application number
MYPI2010005982A
Inventor
Meilana Siswanto
Gunawan Witjaksono
Zharfan Hamdan
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2010005982A priority Critical patent/MY157055A/en
Priority to PCT/MY2011/000163 priority patent/WO2012081968A1/en
Publication of MY157055A publication Critical patent/MY157055A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

THE PRESENT INVENTION PROVIDES A SYSTEM (100) FOR QUANTUM MOBILE ACCESS VERIFICATION, Q-MAV THAT GENERATES TRUE RANDOM IDENTICAL KEYS FOR ENCRYPTION AND DECRYPTION OF DATA STREAMING. THE SYSTEM (100) COMPRISES AT LEAST ONE QUANTUM RANDOM NUMBER GENERATOR, QRNG WITH AT LEAST ONE MULTI OUTPUT PROCESSOR, MOP (106); AT LEAST ONE ENCRYPTED STORAGE (102); AT LEAST ONE BIOMETRIC SYSTEM (101); AT LEAST ONE ENCRYPTION SYSTEM (107); AND AT LEAST ONE DISPLAY SYSTEM (104), CHARACTERIZED IN THAT THE AT LEAST ONE QRNG WITH AT LEAST ONE MOP (106) GENERATES TRUE RANDOM IDENTICAL KEYS, KNOWN AS TRULY RANDOM INDEPENDENT-IDENTICAL KEYS OR i2 KEYS, FOR ENCRYPTION AND DECRYPTION OF DATA STREAMING WHEREIN FIRST KEY IS USED TO ENCRYPT HARDWARE IDENTIFICATION OF Q-MAV AND AUTHORITY CODE, AND SECOND KEY IS USED TO DECRYPT ENCRYPTED DATA THAT HAS BEEN SENT TO AN ACCESS SYSTEM. ANOTHER EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD FOR GENERATING TRUE RANDOM IDENTICAL KEYS FOR ENCRYPTION AND DECRYPTION OF DATA STREAMING. Q-MAV SYSTEM IS FIRST ACTIVATED (402). THEREAFTER, AT LEAST ONE SECURE SERVICE AND AT LEAST ONE UN-SECURE SERVICE IS DISPLAYED AT DISPLAY OF Q-MAV (404). USERS FINGER PRINT IS SCANNED IF SECURE SERVICE IS CHOSEN BY USER (406) AND USERS FINGERPRINT IDENTIFY IS VERIFIED BY Q-MAV SYSTEM (408). SUBSEQUENTLY, LOG ERROR IS DISPLAYED AND SEVERAL MEANS IS PROVIDED TO ATTEMPT IF VERIFICATION PROCESS IS UNSUCCESSFUL (410) AND USERS ACCOUNT IS LOCKED WHEN NUMBER OF ATTEMPTS IS EXCEEDED WHEREIN Q-MAV WILL FUNCTION AS MOBILE PHONE DEVICE (412). HARDWARE IDENTIFICATION OR QMAV AND AUTHORITY CODE IS PROVIDED IF VERIFICATION WAS VERIFIED (414) AND HARDWARE IDENTIFICATION AND AUTHORITY CODE IS SENT TO ENCRYPTION SYSTEM (416). TRULY RANDOM INDEPENDENT-IDENTICAL KEYS, i2-KEYS IS GENERATED AS PIN NUMBERS BY QRNG-MOP (418) AND HARDWARE IDENTIFICATION AND AUTHORITY CODE IS ENCRYPTED USING FIRST i2-KEY (420). THEREAFTER, ENCRYPTED DATA STREAMING IS SENT TO ACCESS SYSTEM BEING USED VIA TRANSMITTER CHANNEL MEANS (422); SECOND i2-KEY IS DISPLAYED ON DISPLAY SYSTEM OF Q-MAV SYSTEM (424) AND SECOND i2-KEY IS INSERTED INTO ACCESS SYSTEM USED TO DECRYPT ENCRYPTED DATA STREAMING (426). SUBSEQUENTLY, AUTHORIZATION FROM ACCESS SYSTEM IS OBTAIN IF DECRYPTION PROCESS IS SUCCESSFUL OR THE KEY IS VALIDATED (428) AND KEY IS DELETED IF TIME FRAME IS EXCEEDED WHEREIN THE TIME FRAME IS DETERMINED BASED ON USER?S PREFERENCE (430). THE MOST ILLUSTRATIVEDRAWING IS
MYPI2010005982A 2010-12-15 2010-12-15 A system and method for quantum mobile access verification MY157055A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2010005982A MY157055A (en) 2010-12-15 2010-12-15 A system and method for quantum mobile access verification
PCT/MY2011/000163 WO2012081968A1 (en) 2010-12-15 2011-06-30 A system and method for quantum mobile access verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2010005982A MY157055A (en) 2010-12-15 2010-12-15 A system and method for quantum mobile access verification

Publications (1)

Publication Number Publication Date
MY157055A true MY157055A (en) 2016-04-29

Family

ID=46244923

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2010005982A MY157055A (en) 2010-12-15 2010-12-15 A system and method for quantum mobile access verification

Country Status (2)

Country Link
MY (1) MY157055A (en)
WO (1) WO2012081968A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115035634A (en) * 2022-04-26 2022-09-09 江铃汽车股份有限公司 Bluetooth key ID resetting method, system, readable storage medium and computer

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114124367B (en) * 2020-08-31 2023-03-24 Oppo广东移动通信有限公司 Data transmission method, device and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8477940B2 (en) * 2005-07-15 2013-07-02 Tyfone, Inc. Symmetric cryptography with user authentication
US20100046755A1 (en) * 2005-12-07 2010-02-25 Fiske Software Llc Cryptography related to keys with signature
US8194858B2 (en) * 2009-02-19 2012-06-05 Physical Optics Corporation Chaotic cipher system and method for secure communication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115035634A (en) * 2022-04-26 2022-09-09 江铃汽车股份有限公司 Bluetooth key ID resetting method, system, readable storage medium and computer
CN115035634B (en) * 2022-04-26 2024-03-26 江铃汽车股份有限公司 Bluetooth key ID resetting method, system, readable storage medium and computer

Also Published As

Publication number Publication date
WO2012081968A1 (en) 2012-06-21

Similar Documents

Publication Publication Date Title
US10146983B2 (en) Fingerprint decryption method and device
KR101874721B1 (en) Identity authentication system, apparatus, and method, and identity authentication request apparatus
EP3132368B1 (en) Method and apparatus of verifying usability of biological characteristic image
RU2007135358A (en) SMALL DIGITAL SIGNATURES BASED ON OPEN KEY USED FOR AUTHENTICATION
WO2017016447A1 (en) Two-dimensional code mask encryption and decryption method and system
CN102946392A (en) URL (Uniform Resource Locator) data encrypted transmission method and system
CA2530944A1 (en) Challenge response system and method
RU2013140418A (en) SAFE ACCESS TO PERSONAL HEALTH RECORDS IN EMERGENCIES
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
JP2014508456A5 (en)
RU2005105579A (en) HIGHLY RELIABLE BIOMETRIC DEVICE
CN109684129B (en) Data backup recovery method, storage medium, encryption machine, client and server
CN103560892A (en) Secret key generation method and secret key generation device
US20130198826A1 (en) Authenticate a fingerprint image
KR100826522B1 (en) Apparatus and method for dynamic ciphering in mobile communication system
WO2017128486A1 (en) Unlocking method, unlocking apparatus, wearable intelligent device and terminal
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN113630241B (en) Password recovery method and system, cloud server and electronic equipment
KR101485968B1 (en) Method for accessing to encoded files
WO2013025091A1 (en) Mobile access control system involving a quantum random number generator
CN112351043A (en) Vehicle navigation factory setting password management method and system
MY157055A (en) A system and method for quantum mobile access verification
CN105282738A (en) Security authentication method for mobile terminal
CN111726320B (en) Data processing method, device and equipment
US20180332040A1 (en) Method of login control