WO2013009280A2 - Method of cryptology to authenticate, deny, and disinform - Google Patents
Method of cryptology to authenticate, deny, and disinform Download PDFInfo
- Publication number
- WO2013009280A2 WO2013009280A2 PCT/US2011/001383 US2011001383W WO2013009280A2 WO 2013009280 A2 WO2013009280 A2 WO 2013009280A2 US 2011001383 W US2011001383 W US 2011001383W WO 2013009280 A2 WO2013009280 A2 WO 2013009280A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- receiver
- password
- sender
- key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Definitions
- Cryptology typically relies on the encryption and decryption of data vising a key, or "password.”
- passwords can be compromised, and a message can be received without knowing whether it truly originated from the sender.
- This method incorporates different types of information into a multi-part key, in order to improve authentication, deny interception, and disinform someone who would attempt interception.
- a multi-part key is assembled from the combination of: 1) a traditional key or
- password 2) biometric data from the sender (e.g. fingerprint data), 3) biometric data from the receiver (e.g. fingerprint data), 4) temporal data, specifically the date and time when the message can be decrypted, and 5) spatial data, specifically the coordinates (e.g. GPS) of a location where the receiver must be when the message can be decrypted.
- the message sender supplies information for the multi-part key, a true message, and a pseudo message.
- the true message is encrypted with the multi-part key.
- a pseudo message is added to the encrypted true message (e.g. prepended).
- the combined message is encrypted with only the password.
- the sender sends the message to the receiver.
- the receiver decrypts the message with the password, removes the pseudo message, assembles the multi-part key using the current time and the receiver's location, and then decrypts the true message.
- Biometric data may be specifically captured for this method, in a technical form that is unusable outside of the scope of this method.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Medical Treatment And Welfare Office Work (AREA)
Abstract
According to one specific embodiment, the method requires that the receiver has a password, and is biometrically authenticated at a pre-determined place and time, in order to decrypt the message. In another specific embodiment, the method provides that the message indicates that it originated from a biometrically authenticated sender. In another specific embodiment, the method provides a mechanism for the disclosure of disinformation, should the message be intercepted and the password compromised.
Description
Provisional application that meets the requirements of § 1.51(c)(1).
Ryan Lee Maxwell
07/14/2011
TITLE
Method of Cryptology to Authenticate, Deny, and Disinform. DESCRIPTION
Cryptology typically relies on the encryption and decryption of data vising a key, or "password." However, passwords can be compromised, and a message can be received without knowing whether it truly originated from the sender. This method incorporates different types of information into a multi-part key, in order to improve authentication, deny interception, and disinform someone who would attempt interception.
ABSTRACT
A multi-part key is assembled from the combination of: 1) a traditional key or
"password", 2) biometric data from the sender (e.g. fingerprint data), 3) biometric data from the receiver (e.g. fingerprint data), 4) temporal data, specifically the date and time when the message can be decrypted, and 5) spatial data, specifically the coordinates (e.g. GPS) of a location where the receiver must be when the message can be decrypted. The message sender supplies information for the multi-part key, a true message, and a pseudo message. The true message is encrypted with the multi-part key. A pseudo message is added to the encrypted true message (e.g. prepended). The combined message is encrypted with only the password. The sender sends the message to the receiver. The receiver decrypts the message with the password, removes the pseudo message, assembles the multi-part key using the current time and the receiver's location, and then decrypts the true message. Biometric data may be specifically captured for this method, in a technical form that is unusable outside of the scope of this method.
We claim:
1. A method of cryptology to authenticate the sender and receiver, actively deny interception, and disinform upon compromise.
2. The method of claim 1 , wherein the sender's complete key is assembled by combining multiple parts.
Claims
3. The key of claim 2, wherein one part is a password.
4. The key of claim 2, wherein one part is biometric information from the sender.
5. The key of claim 2, wherein one part is biometric information from the receiver.
6. The key of claim 2, wherein one part is temporal data, specifically the date and time when the message can be decrypted.
7. The key of claim 2, wherein one part is spatial data, specifically the coordinates (e.g. GPS) of a specific location where the receiver must be when the message can be decrypted.
8. The method of claim 1 , wherein the sender provides a true message.
9. The method of claim 1 , wherein the sender provides a pseudo message.
10. The method of claim 1 , wherein the true message is encrypted with the combined multi-part key of claim 2.
11. The method of claim 1 , wherein the combined pseudo message and encrypted true message are encrypted with only the password in claim 3.
12. The method of claim 1 , wherein the sender sends the message.
13. The method of claim 1 , wherein the receiver receives the message.
14. The method of claim 1 , wherein the message is decrypted by the receiver with the password in claim 3.
15. The method of claim 1 , wherein the pseudo message is removed from the message by the receiver.
16. The method of claim 1 , wherein the receiver's complete multi-part key is assembled using the password, the sender's biometric information, the receiver's biometric information, the current date and time, and the receiver's location.
17. The method of claim 1 , wherein the true message is decrypted by the receiver using the complete multi-part cryptographic key.
BACKGROUND
Cryptology typically relies on the encryption and decryption of data using a key, or "password." Systems access to encrypted data is typically authorized to an individual after the individual's identity has been authenticated. These methods are insufficient. Passwords can be compromised, and messages can be received without knowing whether they originated from an authenticated sender.
This method requires that the receiver has a password, and is biometrically authenticated at a pre-determined place and time in order to decrypt the message. Additionally, the method enables the message to indicate that it originated from a biometrically
authenticated sender.
The method also provides a mechanism for disinformation upon compromise. If the password is compromised, and the message is decrypted using the password only, a pseudo message will be produced. Additionally, if it is suspected that a capability exists
to compromise complete multi-part keys, the sender can send multiple messages, using different locations and times, knowing that the receiver will only be able to decrypt and view messages consistent with the receiver's location.
SUMMARY
According to one specific embodiment, the method requires that the receiver has a password, and is biometrically authenticated at a pre-determined place and time, in order to decrypt the message. In another specific embodiment, the method provides that the message indicates that it originated from a biometrically authenticated sender. In another specific embodiment, the method provides a mechanism for the disclosure of
disinformation, should the message be intercepted and the password compromised.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161506166P | 2011-07-11 | 2011-07-11 | |
US61/506,166 | 2011-07-11 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2013009280A2 true WO2013009280A2 (en) | 2013-01-17 |
WO2013009280A3 WO2013009280A3 (en) | 2013-06-27 |
Family
ID=47506770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2011/001383 WO2013009280A2 (en) | 2011-07-11 | 2011-08-05 | Method of cryptology to authenticate, deny, and disinform |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2013009280A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105262756A (en) * | 2015-10-28 | 2016-01-20 | 广东欧珀移动通信有限公司 | Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030145224A1 (en) * | 2002-01-28 | 2003-07-31 | Bailey Ronn H. | Method and system for detecting and preventing an intrusion in multiple platform computing environments |
WO2007008217A1 (en) * | 2005-07-08 | 2007-01-18 | Catcher, Inc. | Portable handheld security device |
US20070255953A1 (en) * | 2006-04-28 | 2007-11-01 | Plastyc Inc. | Authentication method and apparatus between an internet site and on-line customers using customer-specific streamed audio or video signals |
US20070255960A1 (en) * | 2001-10-26 | 2007-11-01 | Authenex, Inc. | System and method for validating a network session |
US20100050268A1 (en) * | 2007-02-21 | 2010-02-25 | Invicta Networks Inc. | Password protection system and method |
WO2010052332A1 (en) * | 2008-11-10 | 2010-05-14 | Sms Passcode A/S | Method and system protecting against identity theft or replication abuse |
-
2011
- 2011-08-05 WO PCT/US2011/001383 patent/WO2013009280A2/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070255960A1 (en) * | 2001-10-26 | 2007-11-01 | Authenex, Inc. | System and method for validating a network session |
US20030145224A1 (en) * | 2002-01-28 | 2003-07-31 | Bailey Ronn H. | Method and system for detecting and preventing an intrusion in multiple platform computing environments |
WO2007008217A1 (en) * | 2005-07-08 | 2007-01-18 | Catcher, Inc. | Portable handheld security device |
US20070255953A1 (en) * | 2006-04-28 | 2007-11-01 | Plastyc Inc. | Authentication method and apparatus between an internet site and on-line customers using customer-specific streamed audio or video signals |
US20100050268A1 (en) * | 2007-02-21 | 2010-02-25 | Invicta Networks Inc. | Password protection system and method |
WO2010052332A1 (en) * | 2008-11-10 | 2010-05-14 | Sms Passcode A/S | Method and system protecting against identity theft or replication abuse |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105262756A (en) * | 2015-10-28 | 2016-01-20 | 广东欧珀移动通信有限公司 | Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus |
CN105262756B (en) * | 2015-10-28 | 2017-07-18 | 广东欧珀移动通信有限公司 | The encryption and decryption approaches and encryption and decryption devices of data |
US9979706B2 (en) | 2015-10-28 | 2018-05-22 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Data encryption and decryption method and encryption and decryption device |
Also Published As
Publication number | Publication date |
---|---|
WO2013009280A3 (en) | 2013-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007011897A3 (en) | Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks | |
CN104796265A (en) | Internet-of-things identity authentication method based on Bluetooth communication access | |
EP3679502B1 (en) | Methods and systems of securely transferring data | |
TW200733686A (en) | Asynchronous encryption for secured electronic communications | |
US11032069B2 (en) | Methods and systems of securely transferring data | |
US9280650B2 (en) | Authenticate a fingerprint image | |
US11888832B2 (en) | System and method to improve user authentication for enhanced security of cryptographically protected communication sessions | |
Jaros et al. | New location-based authentication techniques in the access management | |
CN102387161A (en) | Authentication method | |
CN101145230B (en) | Enciphered sign board and composite encryption signing method | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
GB2579884A (en) | Methods and systems of securely transferring data | |
CN101539978B (en) | Software protection method based on space | |
WO2013009280A2 (en) | Method of cryptology to authenticate, deny, and disinform | |
JP2008048166A (en) | Authentication system | |
CN102984157A (en) | Information encryption method based on human faces | |
GB201201930D0 (en) | A method and database system for secure storage and communication of information | |
Sharma et al. | ASCCS: architecture for secure communication using cloud services | |
Khalid et al. | New and Simple Offline Authentication Approach using Time-based One-time Password with Biometric for Car Sharing Vehicles | |
KR101308578B1 (en) | Secure information transmitting method | |
KR100892941B1 (en) | Method for security-service processing based on mobile device | |
RU2008104627A (en) | METHOD AND DEVICE FOR AUTHENTICATION AND PRIVACY | |
CN108243156B (en) | Method and system for network authentication based on fingerprint key | |
Townsend et al. | Software Implementation using Hardware-Based Verification for Secure Content Delivery | |
CN101582885A (en) | Encryption and authentication method for communication software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11869486 Country of ref document: EP Kind code of ref document: A2 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11869486 Country of ref document: EP Kind code of ref document: A2 |