Cryptographic data verification method

A technology of data and data sets, used in digital data authentication, digital data protection, electrical digital data processing, etc.

Pending Publication Date: 2021-12-17
布鲁诺桑格勒费列雷
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Furthermore, encrypting the entire message has the disadvantage that if such encryption uses a one-time encryptor (which is considered uncrackable), it requires both counterparts to have access to such a shared key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic data verification method
  • Cryptographic data verification method
  • Cryptographic data verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0128] figure 1 Schematically shows the data and functions for implementing the invention according to the first variant or the second variant, where a message 101 has to be sent by device A to device B via a data transmission channel 109, possibly a secure or unsafe.

[0129] Device A may be a personal computer or a smart phone, device B is an email server, and message 101 is, for example, an email sent by a computer or phone over the Internet.

[0130] Device A can also be a server that sends emails or web pages, and device B is a personal computer or smart phone that receives said emails or web pages.

[0131] Device A could even be a measuring device, for example for measuring the consumption of electricity, gas or water, or for measuring the wear of parts in a machine, message 101 being the result of such a measurement, device B collecting the measurements and passing A server that communicates with a measurement device in a telecommunication network (eg IoT, Wi-Fi netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a comparison method implemented by at least one apparatus (A; B), between a first and a second dataset, in particular with a view to determining whether these two datasets are identical, this method not requiring the presence of these two datasets on the apparatus, and comprising the following steps: a) mixing a number, referred to as the mixing number, with the first dataset, using a mixing function (105; 405), in order to obtain mixed data, b) hashing the mixed data using a hash function (106); 406), and c) comparing the hash thus obtained in step b) with a third dataset assumed to be the hash of the second dataset mixed with the same mixing number as that used in step a) and with the same mixing function (105; 405).

Description

technical field [0001] The present invention relates to digital encryption and security of computing and electronic devices, and more particularly to digital signatures. Background technique [0002] Computers and electronic devices are often connected to networks physically, wirelessly, via RFID, or by any other secure or insecure means, and sometimes need to know the identity of the device sending them certain data, for example to ensure that the data has not been accessed by another user. transmissions by one device, another device intercepts and modifies these data before sending them to a legitimate recipient, or computers and electronic devices simply need to establish beyond doubt the identity of the sender of the data, such as a car on a road network or RFID tags worn by athletes during sporting events, or for any other reason where the identity of the sender of data needs to be known to the recipient for any reason that the identity of the sender of data is importan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/64H04L9/06H04L9/08H04L9/32H04L29/06
CPCH04L63/123H04L9/0869G06F21/64G06F21/44H04L9/3239G06F21/602H04L9/0643
Inventor 布鲁诺·桑格勒费列雷
Owner 布鲁诺桑格勒费列雷
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products