Unlock instant, AI-driven research and patent intelligence for your innovation.

encryption method

A key and equipment technology, applied in the field of encryption, can solve the problems of key information being intercepted, information thieves or others embezzling, etc.

Active Publication Date: 2021-08-17
MICROSOFT TECH LICENSING LLC
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security concern with these methods is that the exchanged key information may be intercepted during the exchange, or the key or other encryption-related information stored on the device may be misappropriated by a thief or others

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • encryption method
  • encryption method
  • encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Systems, devices, and methods will now be described using example embodiments. Example embodiments are presented in this disclosure for purposes of illustration, and are not intended to be limiting or limiting on the scope of the disclosure or the claims presented in this application.

[0019] The disclosed embodiments provide a technical advantage in which two devices can configure encryption / decryption for secure communications over a channel between the two devices without exchanging keys over any channel or by any other exchange method or key-related information as part of configuring or initiating encryption / decryption. An advantage is also provided wherein the key or key-related information need not be provided to or stored on any device prior to configuring secure communications. In contrast to encryption methods that require the exchange of keys or key-related information by communication devices when setting up secure communications, the embodiment avoids the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This embodiment provides encryption performed in each of the two communicating devices and based on information known only to those two devices. The above information is determined in each of these two devices at the time of communication. Each device determines encryption-related key information without communicating this information to each other. The interplay of channel characteristics between two devices allows the creation of identical keys in each device. Each device transmits a first setup signal to the other device, receives a second setup signal from the other device, wherein the second setup signal may be a looped-back version of the first setup signal, and the second setup signal A sample is taken, a result of the sample is generated, a key is created based on the result of the sample, and the key is utilized to exchange one or more secure data signals with another device.

Description

Background technique [0001] Many encryption methods require the exchange of key information between two devices, or require keys or other encryption-related information to be stored in each of the two devices in order to encrypt communications between the devices and decrypt. A security problem with these methods is that the exchanged key information may be intercepted during the exchange, or the keys or other encryption-related information stored on the device may be misappropriated by a thief or other person. The communication between the two devices can then be intercepted and decrypted by someone in possession of the key information or other relevant information related to encryption. Key distribution is considered one of the most important elements in secure communications. SUMMARY OF THE INVENTION [0002] This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L25/02H04W12/50H04W12/65
CPCH04L9/0861H04L9/0866H04L9/0875H04L63/0428H04L63/061H04L2209/80H04W12/041H04W12/0431H04W12/0433H04L25/0202H04L25/0212H04L63/0442H04L63/06H04L2209/24
Inventor A·哈桑
Owner MICROSOFT TECH LICENSING LLC