WO2013009280A2 - Method of cryptology to authenticate, deny, and disinform - Google Patents

Method of cryptology to authenticate, deny, and disinform Download PDF

Info

Publication number
WO2013009280A2
WO2013009280A2 PCT/US2011/001383 US2011001383W WO2013009280A2 WO 2013009280 A2 WO2013009280 A2 WO 2013009280A2 US 2011001383 W US2011001383 W US 2011001383W WO 2013009280 A2 WO2013009280 A2 WO 2013009280A2
Authority
WO
WIPO (PCT)
Prior art keywords
message
receiver
password
sender
key
Prior art date
Application number
PCT/US2011/001383
Other languages
French (fr)
Other versions
WO2013009280A3 (en
Inventor
Ryan Lee MAXWELL
Original Assignee
Maxwell Ryan Lee
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maxwell Ryan Lee filed Critical Maxwell Ryan Lee
Publication of WO2013009280A2 publication Critical patent/WO2013009280A2/en
Publication of WO2013009280A3 publication Critical patent/WO2013009280A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Definitions

  • Cryptology typically relies on the encryption and decryption of data vising a key, or "password.”
  • passwords can be compromised, and a message can be received without knowing whether it truly originated from the sender.
  • This method incorporates different types of information into a multi-part key, in order to improve authentication, deny interception, and disinform someone who would attempt interception.
  • a multi-part key is assembled from the combination of: 1) a traditional key or
  • password 2) biometric data from the sender (e.g. fingerprint data), 3) biometric data from the receiver (e.g. fingerprint data), 4) temporal data, specifically the date and time when the message can be decrypted, and 5) spatial data, specifically the coordinates (e.g. GPS) of a location where the receiver must be when the message can be decrypted.
  • the message sender supplies information for the multi-part key, a true message, and a pseudo message.
  • the true message is encrypted with the multi-part key.
  • a pseudo message is added to the encrypted true message (e.g. prepended).
  • the combined message is encrypted with only the password.
  • the sender sends the message to the receiver.
  • the receiver decrypts the message with the password, removes the pseudo message, assembles the multi-part key using the current time and the receiver's location, and then decrypts the true message.
  • Biometric data may be specifically captured for this method, in a technical form that is unusable outside of the scope of this method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

According to one specific embodiment, the method requires that the receiver has a password, and is biometrically authenticated at a pre-determined place and time, in order to decrypt the message. In another specific embodiment, the method provides that the message indicates that it originated from a biometrically authenticated sender. In another specific embodiment, the method provides a mechanism for the disclosure of disinformation, should the message be intercepted and the password compromised.

Description

Provisional application that meets the requirements of § 1.51(c)(1).
Ryan Lee Maxwell
07/14/2011
TITLE
Method of Cryptology to Authenticate, Deny, and Disinform. DESCRIPTION
Cryptology typically relies on the encryption and decryption of data vising a key, or "password." However, passwords can be compromised, and a message can be received without knowing whether it truly originated from the sender. This method incorporates different types of information into a multi-part key, in order to improve authentication, deny interception, and disinform someone who would attempt interception.
ABSTRACT
A multi-part key is assembled from the combination of: 1) a traditional key or
"password", 2) biometric data from the sender (e.g. fingerprint data), 3) biometric data from the receiver (e.g. fingerprint data), 4) temporal data, specifically the date and time when the message can be decrypted, and 5) spatial data, specifically the coordinates (e.g. GPS) of a location where the receiver must be when the message can be decrypted. The message sender supplies information for the multi-part key, a true message, and a pseudo message. The true message is encrypted with the multi-part key. A pseudo message is added to the encrypted true message (e.g. prepended). The combined message is encrypted with only the password. The sender sends the message to the receiver. The receiver decrypts the message with the password, removes the pseudo message, assembles the multi-part key using the current time and the receiver's location, and then decrypts the true message. Biometric data may be specifically captured for this method, in a technical form that is unusable outside of the scope of this method.
We claim:
1. A method of cryptology to authenticate the sender and receiver, actively deny interception, and disinform upon compromise.
2. The method of claim 1 , wherein the sender's complete key is assembled by combining multiple parts.

Claims

3. The key of claim 2, wherein one part is a password.
4. The key of claim 2, wherein one part is biometric information from the sender.
5. The key of claim 2, wherein one part is biometric information from the receiver.
6. The key of claim 2, wherein one part is temporal data, specifically the date and time when the message can be decrypted.
7. The key of claim 2, wherein one part is spatial data, specifically the coordinates (e.g. GPS) of a specific location where the receiver must be when the message can be decrypted.
8. The method of claim 1 , wherein the sender provides a true message.
9. The method of claim 1 , wherein the sender provides a pseudo message.
10. The method of claim 1 , wherein the true message is encrypted with the combined multi-part key of claim 2.
11. The method of claim 1 , wherein the combined pseudo message and encrypted true message are encrypted with only the password in claim 3.
12. The method of claim 1 , wherein the sender sends the message.
13. The method of claim 1 , wherein the receiver receives the message.
14. The method of claim 1 , wherein the message is decrypted by the receiver with the password in claim 3.
15. The method of claim 1 , wherein the pseudo message is removed from the message by the receiver.
16. The method of claim 1 , wherein the receiver's complete multi-part key is assembled using the password, the sender's biometric information, the receiver's biometric information, the current date and time, and the receiver's location.
17. The method of claim 1 , wherein the true message is decrypted by the receiver using the complete multi-part cryptographic key.
BACKGROUND
Cryptology typically relies on the encryption and decryption of data using a key, or "password." Systems access to encrypted data is typically authorized to an individual after the individual's identity has been authenticated. These methods are insufficient. Passwords can be compromised, and messages can be received without knowing whether they originated from an authenticated sender.
This method requires that the receiver has a password, and is biometrically authenticated at a pre-determined place and time in order to decrypt the message. Additionally, the method enables the message to indicate that it originated from a biometrically
authenticated sender.
The method also provides a mechanism for disinformation upon compromise. If the password is compromised, and the message is decrypted using the password only, a pseudo message will be produced. Additionally, if it is suspected that a capability exists to compromise complete multi-part keys, the sender can send multiple messages, using different locations and times, knowing that the receiver will only be able to decrypt and view messages consistent with the receiver's location.
SUMMARY
According to one specific embodiment, the method requires that the receiver has a password, and is biometrically authenticated at a pre-determined place and time, in order to decrypt the message. In another specific embodiment, the method provides that the message indicates that it originated from a biometrically authenticated sender. In another specific embodiment, the method provides a mechanism for the disclosure of
disinformation, should the message be intercepted and the password compromised.
PCT/US2011/001383 2011-07-11 2011-08-05 Method of cryptology to authenticate, deny, and disinform WO2013009280A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201161506166P 2011-07-11 2011-07-11
US61/506,166 2011-07-11

Publications (2)

Publication Number Publication Date
WO2013009280A2 true WO2013009280A2 (en) 2013-01-17
WO2013009280A3 WO2013009280A3 (en) 2013-06-27

Family

ID=47506770

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/001383 WO2013009280A2 (en) 2011-07-11 2011-08-05 Method of cryptology to authenticate, deny, and disinform

Country Status (1)

Country Link
WO (1) WO2013009280A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105262756A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030145224A1 (en) * 2002-01-28 2003-07-31 Bailey Ronn H. Method and system for detecting and preventing an intrusion in multiple platform computing environments
WO2007008217A1 (en) * 2005-07-08 2007-01-18 Catcher, Inc. Portable handheld security device
US20070255953A1 (en) * 2006-04-28 2007-11-01 Plastyc Inc. Authentication method and apparatus between an internet site and on-line customers using customer-specific streamed audio or video signals
US20070255960A1 (en) * 2001-10-26 2007-11-01 Authenex, Inc. System and method for validating a network session
US20100050268A1 (en) * 2007-02-21 2010-02-25 Invicta Networks Inc. Password protection system and method
WO2010052332A1 (en) * 2008-11-10 2010-05-14 Sms Passcode A/S Method and system protecting against identity theft or replication abuse

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070255960A1 (en) * 2001-10-26 2007-11-01 Authenex, Inc. System and method for validating a network session
US20030145224A1 (en) * 2002-01-28 2003-07-31 Bailey Ronn H. Method and system for detecting and preventing an intrusion in multiple platform computing environments
WO2007008217A1 (en) * 2005-07-08 2007-01-18 Catcher, Inc. Portable handheld security device
US20070255953A1 (en) * 2006-04-28 2007-11-01 Plastyc Inc. Authentication method and apparatus between an internet site and on-line customers using customer-specific streamed audio or video signals
US20100050268A1 (en) * 2007-02-21 2010-02-25 Invicta Networks Inc. Password protection system and method
WO2010052332A1 (en) * 2008-11-10 2010-05-14 Sms Passcode A/S Method and system protecting against identity theft or replication abuse

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105262756A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus
CN105262756B (en) * 2015-10-28 2017-07-18 广东欧珀移动通信有限公司 The encryption and decryption approaches and encryption and decryption devices of data
US9979706B2 (en) 2015-10-28 2018-05-22 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data encryption and decryption method and encryption and decryption device

Also Published As

Publication number Publication date
WO2013009280A3 (en) 2013-06-27

Similar Documents

Publication Publication Date Title
WO2007011897A3 (en) Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks
CN104796265A (en) Internet-of-things identity authentication method based on Bluetooth communication access
EP3679502B1 (en) Methods and systems of securely transferring data
TW200733686A (en) Asynchronous encryption for secured electronic communications
US11032069B2 (en) Methods and systems of securely transferring data
US9280650B2 (en) Authenticate a fingerprint image
US11888832B2 (en) System and method to improve user authentication for enhanced security of cryptographically protected communication sessions
Jaros et al. New location-based authentication techniques in the access management
CN102387161A (en) Authentication method
CN101145230B (en) Enciphered sign board and composite encryption signing method
KR101358375B1 (en) Prevention security system and method for smishing
GB2579884A (en) Methods and systems of securely transferring data
CN101539978B (en) Software protection method based on space
WO2013009280A2 (en) Method of cryptology to authenticate, deny, and disinform
JP2008048166A (en) Authentication system
CN102984157A (en) Information encryption method based on human faces
GB201201930D0 (en) A method and database system for secure storage and communication of information
Sharma et al. ASCCS: architecture for secure communication using cloud services
Khalid et al. New and Simple Offline Authentication Approach using Time-based One-time Password with Biometric for Car Sharing Vehicles
KR101308578B1 (en) Secure information transmitting method
KR100892941B1 (en) Method for security-service processing based on mobile device
RU2008104627A (en) METHOD AND DEVICE FOR AUTHENTICATION AND PRIVACY
CN108243156B (en) Method and system for network authentication based on fingerprint key
Townsend et al. Software Implementation using Hardware-Based Verification for Secure Content Delivery
CN101582885A (en) Encryption and authentication method for communication software

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11869486

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 11869486

Country of ref document: EP

Kind code of ref document: A2