SG11202000807YA - Computer-implemented system and method for highly secure, high speed encryption and transmission of data - Google Patents
Computer-implemented system and method for highly secure, high speed encryption and transmission of dataInfo
- Publication number
- SG11202000807YA SG11202000807YA SG11202000807YA SG11202000807YA SG11202000807YA SG 11202000807Y A SG11202000807Y A SG 11202000807YA SG 11202000807Y A SG11202000807Y A SG 11202000807YA SG 11202000807Y A SG11202000807Y A SG 11202000807YA SG 11202000807Y A SG11202000807Y A SG 11202000807YA
- Authority
- SG
- Singapore
- Prior art keywords
- computer
- transmission
- data
- high speed
- implemented system
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1713499.0A GB201713499D0 (en) | 2017-08-23 | 2017-08-23 | Computer-implemented system and method |
IB2017055073 | 2017-08-23 | ||
PCT/IB2018/056116 WO2019038634A1 (en) | 2017-08-23 | 2018-08-15 | Computer-implemented system and method for highly secure, high speed encryption and transmission of data |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202000807YA true SG11202000807YA (en) | 2020-03-30 |
Family
ID=63490643
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202000807YA SG11202000807YA (en) | 2017-08-23 | 2018-08-15 | Computer-implemented system and method for highly secure, high speed encryption and transmission of data |
Country Status (9)
Country | Link |
---|---|
US (1) | US12010216B2 (en) |
EP (2) | EP4283922A3 (en) |
JP (2) | JP2020532177A (en) |
KR (2) | KR20200040248A (en) |
CN (2) | CN118802114A (en) |
SG (1) | SG11202000807YA (en) |
TW (1) | TWI760546B (en) |
WO (1) | WO2019038634A1 (en) |
ZA (1) | ZA202000405B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB201905348D0 (en) * | 2019-04-16 | 2019-05-29 | Nchain Holdings Ltd | Computer implemented method and system for encrypting data |
CN111488618B (en) * | 2020-04-13 | 2021-05-18 | 深圳信息职业技术学院 | Block chain-based one-time pad encryption method, device and storage medium |
EP3926497A1 (en) * | 2020-06-19 | 2021-12-22 | The Swatch Group Research and Development Ltd | Method for traceability of an item of digital information in a computer system |
EP3956775B1 (en) * | 2020-06-24 | 2024-03-20 | Beatdapp Software Inc. | System and method for continuous tracking of media playback using blockchain |
TWI761243B (en) * | 2021-06-29 | 2022-04-11 | 中華電信股份有限公司 | Encryption system and encryption method for group instant massaging |
US20230421357A1 (en) * | 2022-06-09 | 2023-12-28 | NEC Laboratories Europe GmbH | Method and system for anonymous symmetric authenticated key establishment |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5577124A (en) * | 1995-03-09 | 1996-11-19 | Arithmetica, Inc. | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions |
US5991405A (en) | 1998-01-27 | 1999-11-23 | Dsc Telecom, L.P. | Method for dynamically updating cellular phone unique encryption keys |
CN1281555C (en) | 1998-05-27 | 2006-10-25 | 东陶机器株式会社 | Sanitary earthenware products and process for producing same |
ATE403992T1 (en) * | 1999-06-22 | 2008-08-15 | Hitachi Ltd | CRYPTOGRAPHIC APPARATUS AND METHOD |
US7290142B1 (en) | 1999-09-28 | 2007-10-30 | Thomas Licensing | System and method for initializing a simple network management protocol (SNMP) agent |
JP2003134107A (en) * | 2001-10-25 | 2003-05-09 | Ntt Data Corp | System, method and program for individual authentication |
AU2003293125A1 (en) | 2002-11-27 | 2004-06-23 | Rsa Security Inc | Identity authentication system and method |
CN1759563A (en) * | 2003-03-25 | 2006-04-12 | 独立行政法人情报通信研究机构 | Device, method, and program for random number generation, encryption, and decryption, and recording medium |
US20040268126A1 (en) * | 2003-06-24 | 2004-12-30 | Dogan Mithat C. | Shared secret generation for symmetric key cryptography |
FR2861234A1 (en) | 2003-10-17 | 2005-04-22 | St Microelectronics Sa | ENCRYPTION OF DATA IN AN ELECTRONIC APPARATUS WITH MULTIPLE SYMMETRIC PROCESSORS |
WO2004100496A2 (en) | 2004-09-02 | 2004-11-18 | Pisaramedia Oy | Ends - messaging protocol that recovers and has backward security |
US8594323B2 (en) | 2004-09-21 | 2013-11-26 | Rockstar Consortium Us Lp | Method and apparatus for generating large numbers of encryption keys |
EP1851902A1 (en) * | 2005-02-25 | 2007-11-07 | QUALCOMM Incorporated | Small public-key based digital signatures for authentication |
JP5060081B2 (en) | 2006-08-09 | 2012-10-31 | 富士通株式会社 | Relay device that encrypts and relays frames |
US8165303B1 (en) * | 2007-05-03 | 2012-04-24 | Adobe Systems Incorporated | Method and apparatus for public key cryptography |
US8060750B2 (en) | 2007-06-29 | 2011-11-15 | Emc Corporation | Secure seed provisioning |
DE102008020928B4 (en) | 2008-04-25 | 2014-04-17 | Continental Automotive Gmbh | A method for controlling an air-fuel ratio and method for detecting a fuel quality |
EP2196937A1 (en) * | 2008-12-15 | 2010-06-16 | Thomson Licensing | Methods and devices for instruction level software encryption |
US8762741B2 (en) | 2009-01-29 | 2014-06-24 | Microsoft Corporation | Privacy-preserving communication |
RS53816B1 (en) | 2009-08-28 | 2015-06-30 | Geox S.P.A. | Insert for vapor-permeable and waterproof soles |
GB201020424D0 (en) | 2010-12-02 | 2011-01-19 | Qinetiq Ltd | Quantum key distribution |
JP5167374B2 (en) * | 2011-01-21 | 2013-03-21 | シャープ株式会社 | Data encryption device and memory card |
JP5525467B2 (en) * | 2011-02-18 | 2014-06-18 | 株式会社日立製作所 | Sensor device and control method thereof |
US9858401B2 (en) * | 2011-08-09 | 2018-01-02 | Biogy, Inc. | Securing transactions against cyberattacks |
JP5622714B2 (en) * | 2011-12-27 | 2014-11-12 | 株式会社東芝 | Information processing apparatus and power usage adjustment system |
JP6019453B2 (en) | 2012-07-05 | 2016-11-02 | 株式会社クリプト・ベーシック | ENCRYPTION DEVICE, DECRYPTION DEVICE, AND PROGRAM |
JP5911654B2 (en) | 2013-02-28 | 2016-04-27 | コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. | Random number generator and stream cipher |
DE102013110552B4 (en) * | 2013-09-24 | 2015-05-07 | Bundesrepublik Deutschland, Vertreten Durch Das Bundesministerium Des Innern, Vertreten Durch Das Bundesamt Für Sicherheit In Der Informationstechnik, Vertreten Durch Den Präsidenten | Provision and use of pseudonymous keys in hybrid encryption |
EP2985945A1 (en) * | 2014-08-15 | 2016-02-17 | CompuGroup Medical AG | Method for secure e-mail exchange |
JP6287785B2 (en) * | 2014-11-28 | 2018-03-07 | ソニー株式会社 | Cryptographic processing apparatus, cryptographic processing method, and program |
US9735958B2 (en) | 2015-05-19 | 2017-08-15 | Coinbase, Inc. | Key ceremony of a security system forming part of a host computer for cryptographic transactions |
US10142107B2 (en) | 2015-12-31 | 2018-11-27 | Microsoft Technology Licensing, Llc | Token binding using trust module protected keys |
AU2017223133B2 (en) | 2016-02-23 | 2022-09-08 | nChain Holdings Limited | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
TWI615732B (en) * | 2016-12-27 | 2018-02-21 | 瑞昱半導體股份有限公司 | Electronic component of electronic device, method of starting electronic device and encryption method |
-
2018
- 2018-08-14 TW TW107128338A patent/TWI760546B/en active
- 2018-08-15 EP EP23193892.9A patent/EP4283922A3/en active Pending
- 2018-08-15 CN CN202411127509.2A patent/CN118802114A/en active Pending
- 2018-08-15 KR KR1020207006129A patent/KR20200040248A/en not_active Application Discontinuation
- 2018-08-15 KR KR1020247028905A patent/KR20240135040A/en unknown
- 2018-08-15 WO PCT/IB2018/056116 patent/WO2019038634A1/en unknown
- 2018-08-15 SG SG11202000807YA patent/SG11202000807YA/en unknown
- 2018-08-15 JP JP2020508447A patent/JP2020532177A/en active Pending
- 2018-08-15 EP EP18765196.3A patent/EP3673610B1/en active Active
- 2018-08-15 CN CN201880054448.8A patent/CN110999202B/en active Active
-
2020
- 2020-01-21 ZA ZA2020/00405A patent/ZA202000405B/en unknown
-
2022
- 2022-12-12 US US18/064,804 patent/US12010216B2/en active Active
-
2023
- 2023-06-02 JP JP2023091339A patent/JP2023101776A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
EP3673610A1 (en) | 2020-07-01 |
EP4283922A2 (en) | 2023-11-29 |
CN118802114A (en) | 2024-10-18 |
TW201921887A (en) | 2019-06-01 |
US12010216B2 (en) | 2024-06-11 |
KR20240135040A (en) | 2024-09-10 |
WO2019038634A1 (en) | 2019-02-28 |
EP3673610B1 (en) | 2023-10-04 |
KR20200040248A (en) | 2020-04-17 |
ZA202000405B (en) | 2023-12-20 |
CN110999202B (en) | 2024-09-06 |
CN110999202A (en) | 2020-04-10 |
JP2023101776A (en) | 2023-07-21 |
TWI760546B (en) | 2022-04-11 |
JP2020532177A (en) | 2020-11-05 |
EP4283922A3 (en) | 2024-02-28 |
US20230188325A1 (en) | 2023-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3459202A4 (en) | Method and system for secure data transmission | |
ZA201902947B (en) | Data transmission method, apparatus and system | |
SG11202000807YA (en) | Computer-implemented system and method for highly secure, high speed encryption and transmission of data | |
EP3195674A4 (en) | Method and system for security and authentication of aircraft data transmissions | |
EP3300294A4 (en) | Data encryption apparatus and method, and data decryption apparatus and method | |
EP3289689A4 (en) | Method and system for low data rate transmission | |
EP3720019A4 (en) | Internet of things data transmission method, device and system | |
EP3565148A4 (en) | Data transmission method, apparatus and system | |
GB2539721B (en) | System and method for secure transmission of data signals | |
EP3204858A4 (en) | Highly secure networked system and methods for storage, processing, and transmission of sensitive personal information | |
EP3487116A4 (en) | Method for ensuring security of data transformation, and network device | |
EP3226463A4 (en) | Data encryption and decryption method and encryption and decryption device | |
EP3337088A4 (en) | Data encryption method, decryption method, apparatus, and system | |
EP3331308A4 (en) | Method and system for data transmission | |
EP3427212A4 (en) | Systems, methods, and devices for secure generation and processing of data sets representing pre-funded payments | |
EP3232632A4 (en) | Method and system for acquiring plaintext of network secret data | |
EP3232638A4 (en) | Data transmission method, apparatus and system | |
EP3487241A4 (en) | Data transmission method and system | |
EP3718040A4 (en) | Systems and methods for improved data encryption | |
EP3404978A4 (en) | Data transmission method, related apparatus and system | |
EP3282787A4 (en) | Data transmission method, apparatus and system | |
EP3288304A4 (en) | Data transmission method, apparatus and system | |
EP3297385A4 (en) | Data transmission method, device and system, and access point | |
GB2526389B (en) | System and method for secure transmission of data signals | |
IL265907A (en) | Method and system for the transmission of bioinformatics data |