Unlock instant, AI-driven research and patent intelligence for your innovation.

Cryptographic authentication and identification method using real-time encryption

An encryption key and encryption key technology, which is applied in the direction of cryptographic processing, usage of multiple keys/algorithms, encryption device with shift register/memory, etc.

Inactive Publication Date: 2015-01-28
FINALOGIC BUSINESS TECH
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this teaching is that the third communication point, for example in the form of a server, must be in permanent operation
However, the disadvantage of invalid protection still exists when the display algorithm is known

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic authentication and identification method using real-time encryption
  • Cryptographic authentication and identification method using real-time encryption
  • Cryptographic authentication and identification method using real-time encryption

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0075] The common digital ordering is: 1234567890. Its layout looks like Figure 3a as shown. according to Figure 3b , the sorted digital layout of the PIN code input is 6278015943. Now, for the sequenced entry of the PIN code '7510', the customer presses the key sequence '3765'.

example 2

[0077] Here is also an example of the mode of operation used to demonstrate the method of sorting the PIN codes. The sequenced number layout for PIN code entry is: 0768352419, eg Figure 3c as shown. Now, for a sequenced entry of PIN code '415597', the customer presses '896602'.

[0078] The random digit request rules change with each PIN code entry or other numerical data entry (eg credit card number) rather than per digit.

[0079] The personalization method used to ensure the authenticity of the user and sender of the system proceeds as follows:

[0080] i. Immediately after opening the APP, request the confidential key decryption key St from the central server in order to obtain the customer's own encryption key Sc;

[0081] ii. Then the data processing central server generates a new, arbitrary digital layout, such as '9243605718', such as Figure 3d and encrypt it with the public customer key Pc according to ENC(Pc)(CustData, '9243605718') and send it now to the custo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for securing data and safeguarding its origin, in which the data are transmitted from a customer device to a center in an encrypted manner using digital keys and certificates. The encryption includes the steps of generating several key pairs at a center and transmitting keys, key-encrypted keys, and encrypted data to a customer device. The customer device is afterwards able to transmit data encrypted by a safe key to the center. The data may be a PIN code.

Description

technical field [0001] The present invention relates to a method for protecting data and ensuring the origin of said data, wherein the data is transmitted electronically encrypted from a client device to a central server. Background technique [0002] Methods for securely transmitting electronic data by means of digital encryption are known in the prior art. [0003] US 2002 059 146 A1 shows a method for identifying a user and for securely transmitting a digital code. A transaction code generated by encrypting random numbers with the aid of the user's PIN code, which is known only to the user and the central server, is used here. The disadvantage here is that prying eyes on the PIN code would already compromise the security of the method. [0004] Methods for transmitting encrypted messages are disclosed in AT 504 634 B1 as well as in WO 2008 151 209 A1 and also published as US 2008 298588 A1. In this case, by alternately using symmetric and asymmetric keys, for example R...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCG06Q20/3829H04L9/0822H04L63/0823H04L9/3263H04L9/3226H04L2209/24H04L63/062H04L9/14H04L9/0825H04L2463/062G06Q20/4012G06Q2220/00
Inventor H·拜德尔E·赫迪J·绍尔胡贝尔
Owner FINALOGIC BUSINESS TECH