Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, electronic device and computer program for providing a hash value for a piece of data

An electronic device, hash value technology, applied in digital data protection, electrical components, digital transmission systems, etc.

Active Publication Date: 2021-03-23
TELEFON AB LM ERICSSON (PUBL)
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, considerable effort is required to arrange the keys in each leaf of the tree to be used for authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, electronic device and computer program for providing a hash value for a piece of data
  • Method, electronic device and computer program for providing a hash value for a piece of data
  • Method, electronic device and computer program for providing a hash value for a piece of data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Certain embodiments disclosed herein relate generally to the technical field of security, and more specifically to the field of hash functions. In order to more easily understand the contribution of the present invention, an introduction to the mechanism for providing the hash function used for timestamping is presented below. To further facilitate reading of this disclosure, commonly used abbreviations are listed below.

[0031] abbreviation

[0032] abbreviation word Explanation

[0033] Expansion of BLT KSI

[0034] CRH Calendar Root Hash

[0035] GW Gateway

[0036] KSI Keyless Signature Infrastructure

[0037] HMAC specific message authentication code algorithm construction

[0038] MAC message authentication code algorithm (general)

[0039] PKI public key infrastructure

[0040] TSA Timestamp Authorization

[0041] PKI public key infrastructure

[0042] QI-KSI Quantum immune KSI, such as BLT

[0043] Root hash of RH Merkle type tree

[0044] Has...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of providing a hash value for a piece of data is disclosed, wherein the hash value specifies a time stamp for the piece of data when verified, for limiting the risk of collisions between the hash values. The method includes collecting one or more root timestamps for the root of a hash tree structure defining a hash function, where the root timestamp is a root timestamp from the past, determining whether a nonce value can be received from the server, and when the nonce value cannot be received from the server When a nonce is received, a hash value is provided by a hash function of the piece of data and the root timestamp, or when a nonce is successfully received from the server, by the nonce, the piece of data and the root timestamp A hash function of the root timestamp described above is used to provide the hash value. An electronic device and a computer program are also disclosed.

Description

technical field [0001] The present invention generally relates to a method of providing a hash value for a piece of data, wherein the hash value, when verified, timestamps the piece of data. The method aims at limiting the risk of collisions between hash values. The invention further relates to an electronic device for carrying out the method and a computer program for implementing the method. Background technique [0002] "Big data", the cloud, and the Internet of Things (IoT) are examples of rapidly expanding areas of distributed data networks and collection of distributed data. Data generated at multiple source nodes is collected for processing and / or analysis. Examples of source nodes include sensor networks that perform measurements and provide measurement data, eg in a home automation data network or an industrial process data network. Additional examples include servers in data centers that generate event logging, eg, for operational security. [0003] The operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/32
CPCH04L9/006H04L9/321H04L9/3242H04L2209/76H04L9/50G06F21/64H04L9/3268H04L9/3297
Inventor A.马西莫夫B.斯米特斯M.赫尔
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products