MY158544A - Secured i2-keys management - Google Patents

Secured i2-keys management

Info

Publication number
MY158544A
MY158544A MYPI2011003858A MYPI2011003858A MY158544A MY 158544 A MY158544 A MY 158544A MY PI2011003858 A MYPI2011003858 A MY PI2011003858A MY PI2011003858 A MYPI2011003858 A MY PI2011003858A MY 158544 A MY158544 A MY 158544A
Authority
MY
Malaysia
Prior art keywords
keys
key
block
present
qrng
Prior art date
Application number
MYPI2011003858A
Inventor
Mohammad Firdaus Juhari
Meilana Siswanto
Gunawan Witjaksono
Zharfan Hamdan
Aizuddin Nuruddin
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2011003858A priority Critical patent/MY158544A/en
Priority to PCT/MY2012/000158 priority patent/WO2013025091A1/en
Publication of MY158544A publication Critical patent/MY158544A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

SECURED I2-KEYS MANAGEMENT RELATES TO A SYSTEM AND METHOD FOR MANAGING KEYS IN QUANTUM MOBILE ACCESS VERIFICATION (Q-MAV) TO ENSURE INTEGRITY OF KEYS AND CONTINUITY OF OPERATION.THE Q-MAV SYSTEM OF THE PRESENT INVENTION PROVIDES SECURE MOBILE COMMUNICATION BASED ON QUANTUM RANDOM NUMBER GENERATOR (QRNG) WITH MULTI OUTPUT PROCESSOR (MOP) WHICH FUNCTIONS FOR MULTI PURPOSES OF ACCESS SYSTEM VERIFICATION AND AUTHENTICATION.THE PRESENT INVENTION COMPRISES AT LEAST ONE KEY GENERATOR (202) COMPRISING OF AT LEAST ONE QUANTUM RANDOM NUMBER GENERATOR (QRNG) WITH AT LEAST ONE MULTI OUTPUT PROCESSOR (MOP), AT LEAST ONE KEY PREPARATION BLOCK (204) TO PROCESS TRULY RANDOM INDEPENDENT IDENTICAL KEYS, I2-KEYS (FIRST I2 KEY 1 AND SECOND I2 KEY) AND IDENTIFICATION (ID) TAG, AT LEAST ONE KEY COMPARATOR BLOCK (206) FOR COMPARING I2-KEYS TO ENSURE KEYS REMAINS IDENTICAL, AT LEAST ONE ENCODER (208, 210) TO ENCODE EXTRACTED I2- KEYS AND AT LEAST ONE DATA TAGGER BLOCK (212). THE DATA TAGGER BLOCK (212) OF THE PRESENT INVENTION SYNCHRONIZES KEYS AT ACCESS SYSTEM AND ENSURES CONTINUITY OF OPERATION BY APPENDING ENCRYPTED DATA USING IDENTIFICATION (ID) TAG.
MYPI2011003858A 2011-08-17 2011-08-17 Secured i2-keys management MY158544A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2011003858A MY158544A (en) 2011-08-17 2011-08-17 Secured i2-keys management
PCT/MY2012/000158 WO2013025091A1 (en) 2011-08-17 2012-06-28 Mobile access control system involving a quantum random number generator

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2011003858A MY158544A (en) 2011-08-17 2011-08-17 Secured i2-keys management

Publications (1)

Publication Number Publication Date
MY158544A true MY158544A (en) 2016-10-14

Family

ID=46640087

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2011003858A MY158544A (en) 2011-08-17 2011-08-17 Secured i2-keys management

Country Status (2)

Country Link
MY (1) MY158544A (en)
WO (1) WO2013025091A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9838385B2 (en) 2015-06-30 2017-12-05 International Business Machines Corporation Password generation based on dynamic factors
CN105024801B (en) * 2015-07-06 2017-05-17 国网山东寿光市供电公司 Quantum encryption communication method
US10990356B2 (en) * 2019-02-18 2021-04-27 Quantum Lock Technologies LLC Tamper-resistant smart factory
WO2020171841A1 (en) * 2019-02-18 2020-08-27 Quantum Lock Technologies LLC Quantum random number generator lock

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2409558B (en) * 2001-04-17 2005-08-10 Symbol Technologies Inc Trigger-operated system for electro-optically reading indicia
DE10317257A1 (en) * 2003-04-14 2004-11-04 Giesecke & Devrient Gmbh Contactless data carrier
US20040267847A1 (en) * 2003-05-13 2004-12-30 Bsi2000, Inc. Hardware random-number generator
US7646873B2 (en) * 2004-07-08 2010-01-12 Magiq Technologies, Inc. Key manager for QKD networks
US7577257B2 (en) * 2006-12-21 2009-08-18 Verizon Services Operations, Inc. Large scale quantum cryptographic key distribution network
JP4404924B2 (en) * 2007-09-13 2010-01-27 シャープ株式会社 Display system
CN101897165B (en) * 2007-10-30 2013-06-12 意大利电信股份公司 Method of authentication of users in data processing systems
EP2474931A1 (en) * 2010-12-31 2012-07-11 Gemalto SA System providing an improved skimming resistance for an electronic identity document.

Also Published As

Publication number Publication date
WO2013025091A1 (en) 2013-02-21

Similar Documents

Publication Publication Date Title
WO2010015906A3 (en) Apparatus, systems and methods for authentication of objects having multiple components
AU2018256568A1 (en) Systems and methods for software based encryption
MX2009002509A (en) Method and system for secure processing of authentication key material in an ad hoc wireless network.
AU2012225621A8 (en) Secure file sharing method and system
MX2016011988A (en) Confidential data management method and device, and security authentication mehod and system.
PE20170656A1 (en) AUTHENTICATION OF THE SERVICE NETWORK
WO2015065913A8 (en) A set of servers for "machine-to-machine" communications using public key infrastructure
PH12018502160A1 (en) Systems and methods for secure storage of user information in a user profile
WO2013066513A3 (en) Systems and methods to secure user identification
WO2013068843A8 (en) Multi-key cryptography for encrypting file system acceleration
WO2012096791A8 (en) Methods and systems for distributing cryptographic data to authenticated recipients
WO2008091978A3 (en) Methods and apparatus for enhancing privacy of objects associated with radio-frequency identification tags
WO2011119300A3 (en) System and methods for remote maintenance of multiple clients in an electronic network using time-based encryption keys
RS20120254A1 (en) System and method for high security biometric access control
WO2013009045A3 (en) Method for changing mno in embedded sim on basis of dynamic key generation and embedded sim and recording medium therefor
NO20091199L (en) Method, system and device for synchronization between server and mobile device
GB2509278A (en) Network user identification and authentication
IN2014CN03915A (en)
WO2012172832A3 (en) Authenticator, authenticatee and authentication method
EP2398208A3 (en) Method for securing transmission data and security system for implementing the same
BR112013001728A2 (en) methods for encrypting a value entered in a user device, for verifying a value communicated to an authentication system via a communications network, and for communicating a value entered in a user device to an authentication system via a communications network, user device, system, software, and computer readable medium.
SG11202104530YA (en) Key management method, security chip, service server and information system
GB2498063B (en) System for checking acceptance of string by automaton
GB201217507D0 (en) Database management system
EP2544397A4 (en) Method and communication device for accessing to devices in security