Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for updating keys used for public key cryptography

A technology of public key and password, applied in the direction of public key of secure communication, transmission system, digital transmission system, etc., can solve the problem that the key cannot provide the security level PKC program, etc.

Active Publication Date: 2009-07-29
SAP AG
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another reason can be that the used keys do not provide the required level of security against breaches of the PKC program due to the development of new technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for updating keys used for public key cryptography
  • System and method for updating keys used for public key cryptography
  • System and method for updating keys used for public key cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following examples and descriptions are intended to illustrate embodiments of the invention, not to limit the scope of the invention.

[0026] figure 1 A diagram of an example embodiment of a providing system 100 and a receiving system 200 is shown. An embodiment of the provisioning system 100 has two components, a computing unit 110 and a sending unit 120 . The embodiment of the receiving system 200 also has two components, the receiving unit 210 and the authenticating unit 210 . The arrow between the two units in the figure represents the interface between the two units for transferring data in the direction indicated by the arrow. Embodiments of the providing system 100 are applicable to embodiments where the public key sequence is provided to the receiving system 200 in a secure manner. Each public key in the sequence relates to a private key and can be applied to public key cryptography (PKC) procedures. PKC programs apply PKC methods or algorithms to provi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention includes a provider system (100) for providing a sequence of public keys to a receiver system (200), wherein each public key of the sequence is related to a private key and is applicable for a public key cryptography procedure. The provider system (100) comprises a computing unit (110) and a sending unit (120). The computing unit (110) is configured to: generate the sequence of public keys and related keys and compute a plurality of data sets, a data set of the plurality comprising a public key and a proof value. The proof values is a result of applying a hash function to a following data set comprising a further public key following in the sequence. The sending unit (120) is configured to provide the plurality of data to a receiver system (200).

Description

technical field [0001] The present invention relates generally to the field of electronic data processing, and in particular to providing secure electronic transactions. Background technique [0002] In today's world, electronic communication has reached a high standard. Multiple parties such as individuals, companies or official agents use electronic infrastructures such as the Internet to communicate. It is therefore often desirable that electronic transactions, ie the electronic exchange of data, be secure. For example, a secure transaction means that the sender of a document can be identified in a reliable way, or that the document cannot be read by an unauthorized person who intercepts the transmission of the document. [0003] A very effective way to provide this aspect of secure electronic transactions is to use public key cryptography (PKC). PKC involves the PKC method and a pair of complementary keys, including a public key and a private key associated with that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L29/06
CPCH04L2209/80H04L9/0891H04L9/3236H04L2209/56H04L9/14
Inventor 佐尔坦·诺赫塔
Owner SAP AG