WO2005117527B1 - An electronic device to secure authentication to the owner and methods of implementing a global system for highly secured authentication - Google Patents

An electronic device to secure authentication to the owner and methods of implementing a global system for highly secured authentication

Info

Publication number
WO2005117527B1
WO2005117527B1 PCT/IN2005/000180 IN2005000180W WO2005117527B1 WO 2005117527 B1 WO2005117527 B1 WO 2005117527B1 IN 2005000180 W IN2005000180 W IN 2005000180W WO 2005117527 B1 WO2005117527 B1 WO 2005117527B1
Authority
WO
WIPO (PCT)
Prior art keywords
group
user
data
authentication
secret key
Prior art date
Application number
PCT/IN2005/000180
Other languages
French (fr)
Other versions
WO2005117527A3 (en
WO2005117527A2 (en
Inventor
Brian Abram
Original Assignee
Brian Abram
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Brian Abram filed Critical Brian Abram
Publication of WO2005117527A2 publication Critical patent/WO2005117527A2/en
Publication of WO2005117527A3 publication Critical patent/WO2005117527A3/en
Publication of WO2005117527B1 publication Critical patent/WO2005117527B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

An electronic device packaged into a small wearable device (100) containing methods, algorithms, software and hardware & interfaces for the purpose of secure encrypted communication and authentication to personal devices, computers and remote systems (902), combined with biometric information (901) for additional security and verification of the user (904). The device (100) prevents the unauthorised use of personal devices and computers (902). It provides mechanisms to receive, manage and distribute licenses for the purpose of access control to music, video, software and data. It facilitates filtering out unsolicited communication by ignoring unauthenticated sources of mail and messages and by providing traceability of authenticated persons using computers & networks for illegal purposes or infringement of terms of conditions of service providers.

Claims

AMENDED CLAIMS
[(received by the International Bureau on 21 April 2006 (21.04.06)] an EDAS processor for receiving and converting said licenses into EDAS packet and rapid assembling / disassembling and verification of said EDAS packets;
a group messaging sub system having a buffer, a group secret key and a group public key for generating group message packets that can be encrypted or decrypted in real time for communicating a data or message securely to a group of people,
a self-verified authorized secure fund transfer mechanism (YTRAXS) having a YTRAXS assembler for collecting, compressing and signing the required fields and a YTRAXS verifier for checking the digital signature, decompressing and checking the validity of certain fields against specified criteria thereby processing business-to-business and/or business-to- consumer and/or person-to-person digitally signed electronic transaction slips;
a key generator for generating encryption keys including but not limited to: a special secret key, a second dummy secret key , and a pseudo key;
a tamper detection module for detecting any tampering raising an anti- tamper signal for protecting the special secret key by allowing the second dummy secret key to overwrite the special secret key thereby preventing the use of said special secret key and said electronic device for further authentication process.
16. A method for authentication comprising the steps of.
establishing a wireless or electrical communication channel between a user- wearable electronic device and a receptor of any host device via atleast one Universal Serial Bus (USB) port and atleast one Infrared Data Association (IrDA) port of said electronic device for checking if a user of said electronic
36 device has any rights to access any functions or media or data of said host device;
generating a user's data;
sending user's data to said host device;
verifying the user's data;
using network security protocols for authenticating said user's data upon said host device being connected to a suitable network;
transmitting and logging the result of authentication to user- authentication management modules of all the devices which were a party to the authentication process via a remote trusted authentication server;
verifying of the user as an authenticated user; wherein the authenticated user is capable of creating and administrating a secure group key set;
distributing said group keys among selected persons and entities;
inviting said persons and entities to be a member of a group;
allowing said persons and entities to accept or decline to be a member of said group;
allowing an administrator of the group to optionally remove said persons and entities from the group at a later time;
transmitting encrypted and digitally signed messages and data to other group members using the appropriate group key; and, receiving group messages and data from any other person or entity having a copy of the group keys;
enabling a creator and owner of a group to retain control of the group, whereby the owner of a group gives license to the group members to be part of said group and enables the owner of a group to create and transmit
37 new licenses which override the existing licenses, thereby changing the status and privileges of one or more group members, which could even extend to revocation or replacement of the group keys;
generating atleast one copy of a printed electronic bank transfer authorizations with unique transaction numbers and bar codes including a digital signature (YTRAXS), which can later be scanned using a bar code reader by the recipient's authenticated operator and subsequently credited to the recipient's account through electronic fund clearing with no requirement for the printed transaction slips to be processed through the bank's cheque clearing system.
17. A method of claim 16 wherein the user's data includes digital certificate, biometric data or Digital Right Management (DRM) license.
18. A method of claim 16 whereby the authenticated user is capable of; receiving, creating, administrating and transmitting DRM licenses for permitting or denying the person or other entities various rights of access to other devices, functions, applications or contents;
PCT/IN2005/000180 2004-06-02 2005-06-02 An electronic device to secure authentication to the owner and methods of implementing a global system for highly secured authentication WO2005117527A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN613MU2004 2004-06-02
IN613/MUM/2004 2004-06-02

Publications (3)

Publication Number Publication Date
WO2005117527A2 WO2005117527A2 (en) 2005-12-15
WO2005117527A3 WO2005117527A3 (en) 2006-04-20
WO2005117527B1 true WO2005117527B1 (en) 2006-09-28

Family

ID=35463240

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2005/000180 WO2005117527A2 (en) 2004-06-02 2005-06-02 An electronic device to secure authentication to the owner and methods of implementing a global system for highly secured authentication

Country Status (1)

Country Link
WO (1) WO2005117527A2 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2703628C (en) * 2007-10-24 2016-09-13 Securekey Technologies Inc. Method and system for effecting secure communication over a network
US9071441B2 (en) 2010-01-04 2015-06-30 Google Inc. Identification and authorization of communication devices
US9646261B2 (en) 2011-05-10 2017-05-09 Nymi Inc. Enabling continuous or instantaneous identity recognition of a large group of people based on physiological biometric signals obtained from members of a small group of people
WO2013082329A1 (en) * 2011-11-29 2013-06-06 Bruce Ross Layered security for age verification and transaction authorization
WO2015011552A1 (en) * 2013-07-25 2015-01-29 Bionym Inc. Preauthorized wearable biometric device, system and method for use thereof
US9032501B1 (en) 2014-08-18 2015-05-12 Bionym Inc. Cryptographic protocol for portable devices
US9197414B1 (en) 2014-08-18 2015-11-24 Nymi Inc. Cryptographic protocol for portable devices
US10061905B2 (en) 2016-01-26 2018-08-28 Twentieth Century Fox Film Corporation Method and system for conditional access via license of proprietary functionality
KR101810945B1 (en) * 2016-05-25 2018-01-26 한국스마트아이디(주) Wearable device and certification system using it
CN106411498B (en) * 2016-12-23 2019-07-30 艾体威尔电子技术(北京)有限公司 A method of realizing national secret algorithm
WO2018165146A1 (en) 2017-03-06 2018-09-13 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997032284A1 (en) * 1996-02-27 1997-09-04 Richard Sydney Thorp Security identification and information system
US20030046228A1 (en) * 2001-08-28 2003-03-06 Jean-Marc Berney User-wearable functional jewelry with biometrics and smartcard to remotely sign and/or authenticate to e-services

Also Published As

Publication number Publication date
WO2005117527A3 (en) 2006-04-20
WO2005117527A2 (en) 2005-12-15

Similar Documents

Publication Publication Date Title
WO2005117527B1 (en) An electronic device to secure authentication to the owner and methods of implementing a global system for highly secured authentication
AU780201B2 (en) Remote printing of secure and/or authenticated documents
EP1455503B1 (en) Data certification method and apparatus
US20020023220A1 (en) Distributed information system and protocol for affixing electronic signatures and authenticating documents
JPH07509086A (en) Trusted path subsystem for workstations
KR20030036787A (en) System for establishing an audit trail to protect objects distributed over a network
AU2002355593A1 (en) Data certification method and apparatus
JP2004509399A (en) System for protecting objects distributed over a network
US10311215B2 (en) Secure recording and rendering of encrypted multimedia content
US20110202772A1 (en) Networked computer identity encryption and verification
JP2005502269A (en) Method and apparatus for creating a digital certificate
JPH1131130A (en) Service providing device
JP2009290508A (en) Electronized information distribution system, client device, server device and electronized information distribution method
US8281407B2 (en) In-line decryption device for securely printing documents
US20120131347A1 (en) Securing of electronic transactions
CA2335532A1 (en) Apparatus and method for end-to-end authentication using biometric data
JP2008502045A5 (en)
US20010048747A1 (en) Method and device for implementing secured data transmission in a networked environment
CN118051888A (en) Digital rights management system
Din et al. Building a truster environment for e-business: a Malaysian perspective
Dhabu Biometrics Encryption for Protecting Multimedia Data
JPH10143440A (en) Digital information protection method and device therefor
CN1345007A (en) No-identification fully dynamic confirming method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase