Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data cipher and decipher based on device and data authentication

A technology of equipment and cryptographic keys, which is applied in digital transmission systems and key distribution, can solve problems such as too expensive, complex data encryption and decryption, etc.

Inactive Publication Date: 2017-04-19
INFINEON TECH AG
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Implementing complex cryptographic algorithms to encrypt and decrypt data may be too complex or expensive for some low-cost or less complex systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data cipher and decipher based on device and data authentication
  • Data cipher and decipher based on device and data authentication
  • Data cipher and decipher based on device and data authentication

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0124] Clause 8. The method of clause 7, wherein the instance of the MAC tag associated with the communication session is a first instance of the MAC tag associated with the communication session, the method further comprising: determining, by the first device, a second instance of the MAC tag associated with the communication session based on the message, wherein authenticating the message includes determining a second instance of the MAC tag associated with the communication session whether the first instance corresponds to the second instance of the MAC tag associated with the communication session.

[0125] Clause 9. The method of clause 8, further comprising: in response to determining that the first instance of the MAC tag associated with the communication session corresponds to an instance of the MAC tag associated with the communication session said second instance, determining, by said first device, that said message received from said second device is authentic; and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to data cipher and decipher based on a device and data authentication. The device is described that determines a session key for generating a message authentication code (MAC) tag associated with a communication session between the device and a second device. The device determines, based at least in part on the session key, a crypto key for encoding or decoding a message associated with the second device. The device then encodes or decodes the message based on the crypto key.

Description

Background technique [0001] Some devices take steps to ensure the integrity and authenticity of data received from another device by implementing Message Authentication Code (MAC) techniques such as those described in US Patent No. 8,630,411 to Lim et al. MAC techniques may enable a receiving device to implement a challenge-response protocol for authenticating a source device and for confirming that data received from a source device has not been tampered with or altered from its original form. [0002] In some cases, data received from an authenticated source may include valuable and / or sensitive information (eg, passwords, proprietary secrets, personal information, or other sensitive information). Even though MAC techniques may enable receiving devices to ensure data integrity, MAC techniques may not do anything to protect the actual data being transmitted from being intercepted by unauthenticated devices. As such, the data may be vulnerable to attacks from unauthenticated ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0861H04L63/0428H04L63/0807H04L9/3242H04L63/0457H04L63/0876H04L63/123
Inventor 林照源
Owner INFINEON TECH AG
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More