System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys

a portable device and cryptokey technology, applied in the field of system, a portable device and a digital authentication, encryption and signing method, can solve problems such as the abuse of stored information

Inactive Publication Date: 2012-05-03
LYSEGGEN JORN +2
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007]The object of the present invention is to provide a system and a method for digital authentication, encryption and signing, which system increases the security for the user by never storing sensitive information such as identity, unique codes or encryption keys, thus making it harder for this to end up in unauthorised hands.
[0031]Seen in relation to conventional encryption systems, the present invention provides improved security for the user by never storing the secret keys and only allowing the right user to generate them.
[0032]Seen in relation to conventional encryption systems that make use of biometry, the present invention introduces the benefit of not needing to store bio-input anywhere, which is essential, among other things with regard to privacy protection.

Problems solved by technology

Such stored information may be abused in order to find sensitive user biometry or the user's secret keys.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
  • System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
  • System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

4.1 General Method

[0066]The present invention introduces a generic method for generation of encryption keys uniquely connected to each user by means of biometry.

[0067]The general method of the present invention is:[0068]a) To define an n-dimensional characteristic vector fq(n) from key input (101), so that fq(n) is unique to each user and repeatable even in the case of natural variations in the analogue input 101.[0069]b) To determine fq(n) from the user's key input.[0070]c) To generate one or more prime numbers uniquely defined by fq(n) and a pre-defined prime number generator G.[0071]d) To determine one or more encryption keys for the user, uniquely defined by function K, using generated prime numbers as input. The function K will be uniquely defined by the type of encryption technology being used.[0072]e) The encryption keys are ready for use.

4.2 Method of Public Key Encryption

[0073]a) Define an n-dimensional characteristic vector fq(n) from key input (101, so that fq(n) is uniqu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system for authentication, encryption and / or signing, as well as corresponding devices and methods, that use temporary but repeatable encryption keys uniquely connected to the user and generated from a unique set of input parameters. The system comprises an input device designed to extract predetermined characteristic values from value input by the user, which value is specific to the user, by means of a given algorithm, which algorithm is designed to remove the natural variation in the characteristic values in order to yield an identical set of characteristic values upon input of the same value, and a device designed to generate at least one user specific encryption key comprising said characteristic values.

Description

[0001]This application is a continuation of pending U.S. patent application Ser. No. 10 / 491,330, filed Jan. 4, 2004, which is a national stage application of PCT International Application No. PCT / NO02 / 00352, filed on Oct. 1, 2002, and claims priority to Norway Application No. 20014774, filed on Oct. 1, 2011, each of which are hereby incorporated by reference in their entireties.[0002]The present invention regards a system, a portable device and a method for digital authentication, encryption and signing by generation of temporary but consistent and repeatable encryption keys in accordance with the independent claims.1 PREAMBLE[0003]Authentication and transactions that are carried out by means of hand-held devices such as mobile telephones are becoming an increasing part of our lives. An example of this is the increasing use of mobile telephones to perform services that are invoiced directly in the telephone bill[0004]One of the challenges associated with today's systems is that fact...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06G06K9/00G06F21/00H04L9/08H04L9/32
CPCH04L2209/805H04L9/3231
Inventor LYSEGGEN, JORNLAURITZSEN, ROAR ANDREOYHUS, KIM GUNNAR STEVRING
Owner LYSEGGEN JORN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products